SlideShare uma empresa Scribd logo
1 de 9
Baixar para ler offline
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME

TECHNOLOGY (IJCET)

ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 5, Issue 1, January (2014), pp. 153-161
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2013): 6.1302 (Calculated by GISI)
www.jifactor.com

IJCET
©IAEME

LOCATION BASED STORE AND FORWARD PACKET ROUTING
ALGORITHM FOR WIRELESS BODY AREA NETWORKS: A SURVEY
Shivam Wadhwa1,

Kusum Dangi2

1

2

Dept of Computer Science and Engineering, ITM University Gurgaon, India
Dept of Electronics and Communication Engineering, ITM University Gurgaon, India

ABSTRACT
The increasing use of wireless networks and the constant miniaturization of electrical devices
have empowered the development of Wireless Body Area Networks (WBANs). WBAN is an
application of Wireless Sensor network that is used in health monitoring. Wireless sensor nodes are
either placed inside or on the body and transmit the data in form of packets .Packet Routing is very
crucial technique in WBAN. Packet Routing is used to send the data which is being monitored by
various sensor nodes implanted on the body. In this paper we discuss about location based store-and
forward packet routing algorithm for WBAN with general body postures.
Keyword: Communication Architecture, Location Based Routing, Packet Routing, QoS, WBAN,
WPAN.
1. INTRODUCTION
WBAN consists of tiny sensors attached or implanted in the body which are capable of
establishing a wireless communication link. The on body sensors continuously monitor the human
physiological changes occurring periodically. This physiological data is in form of packets that are to
be sent to the destination. In this paper we will discuss about various aspects of WBAN and on-body
store-and forward packet routing algorithm for WBAN.
2. WIRELESS BODY AREA NETWORK: OVERVIEW
WBAN technology came into existence around 1995 with the idea of using Wireless personal
area network (WPAN) which help in communication on or around the human body[1,2].

153
International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME
2.1 Types of Devices
(Wireless) Sensor node: A Sensor node is a device whose function is, gathering and
responding to any kind of physiological change, happening in the human body and reports this data
with wireless means.
(Wireless) Actuator node: Its function is to act according to the data received from the
sensors.
(Wireless) Personal Device (PD): Its function is to inform the patient about all the
information gathered from the sensors and actuators.
3. WBAN COMMUNICATION ARCHITECTURE
WBAN posse’s three tier communication architecture

Figure1: Three tier communication architecture
In fig.1, a three-tier architecture based on a BAN communication system is shown. The figure
shows that all the sensors send their data to the personal server and finally the data is streamed to a
medical practioner. The whole communication takes place in three-tier:
3.1 Tier1-communication
In Tier-1, the communication occurs around 2 metres of the human body which comprises of
two actions first is the communication between the body sensors and the other is the communication
between the body sensors and portable personal server.
3.2 Tier2-communication
In Tier -2, the communication occurs between the personal server and the access points. The
basic functionality of this tier is interconnecting various BANs with various networks.
154
International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME
3.3 Tier3-communication
In Tier-3, the communication is intended for metropolitan areas. It is used to bridge the
network for inter- BAN and beyond- BAN communication.
4. SENSORS USED IN WBAN
Accelerometer/Gyroscope: Accelerometer sensor is used to monitor the various body
positions like walking, sitting, standing. . The accelerometer-based posture monitoring for BANs are
used to measure the vibration happening in the human body and also acceleration due to gravity.
Gyroscope uses the principle of conservation of angular momentum to measure or maintain the body
orientation.
Blood glucose: The amount of glucose circulating in the blood is called as blood glucose. It is also
called as blood sugar. Glucose is measured by extracting blood from the finger and then applying it
to a test strip composed of chemicals sensitive to the glucose in blood sample. An optical meter
(glucometer) is used to analyze the blood sample and gives a numerical glucose reading.
Blood pressure: The blood pressure sensor uses the principle of oscilimetric to measure the blood
pressure of the body.
CO2 gas sensor: This sensor is used to measure the changes in carbon-dioxide happening in the
human body.
ECG sensor: ECG is also known as electro cardio gram that is used to record the electric activity of
the heart which is helpful in diagnosing a heart disease. ECG signal is obtained by placing several
electrodes on the skin (e.g., arms, and chest), and then measuring potential differences between these
electrodes.
EEG sensor: Electro encephalogram sensor is used to measure the electrical activity happening
inside the brain. It is done by attaching tiny electrodes to the human’s scalp at multiple locations.
The information that is sensed by the electrodes is forwarded to an amplifier for producing a pattern
of tracings.
EMG sensor: EMG sensor is used to measure the electric signals produced by the muscles. Nerve
conduction is usually done to measure the electrical activity in muscles as nerves control the muscles
in the body.
Temperature and Humidity sensor: The temperature and humidity sensors are used to measure the
temperature and humidity of the environment around the human body.
5. PACKET ROUTING IN WBAN
Packet routing is important aspect in Wireless body area network .A number of small sensors
as discussed above strategically placed on human body can create a Wireless Body Area Network
which can monitor vital signs and collect the data in the form of packets. This data movement across
such sensors can be point to point or multi-point. In this section we will discuss on-body packet
routing issues in case of various body postures [3].

155
International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME
Goal of packet routing: The goal of this discussion is to develop on-body store and forward packet
routing and minimising end-to-end packet delay by dynamically choosing routes on which the
storage delay is low. The main goals of this packet routing are: 1.) end-to-end delay, 2.) packet loss,
and 3.) transmission energy consumption.
In fig.2, various sensors are placed on the human body that will transmit the data to a sink
node which in turn will send the data to the sink node which in turn communicates with the out of
body server.
Two store and forward routing algorithms have been developed based on location based
routing protocol.
5.1 Relative Location based Forwarding (RLOCF)
The main logic of packet forwarding in RLOCF is that a node forwards a packet to other
neighbouring nodes that are known to be closer to the sink node. The main logic behind this
forwarding algorithm is to give information to every node about the relative distances between all
other neighbouring nodes in the network and the sink node. It can be easily implemented on typical
on-body networks (as shown in Fig.2) containing only a few nodes. The packet forwarding logic in
RLOCF can be formally stated as follows.
For an M-node body sensor network, a sorted list [n1, n2, ni,. .,nM] is created based on the
distances of the individual nodes from the sink node (e.g. node-6 in Fig. 1). Node n1 represents the
sink, and the nodes are placed in the list such that: d(n1) =0 or 1 and d(ni) ≤d (ni+1) , i = 1, 2, 3, …,M1, where the quantity d(ni) represents the distance of node ni from the sink node n1.Based on the
known sensor placement locations and the usual body configurations, the quantities d(ni) are first
estimated manually and then the above sorted list is created.

Figure 2: Body Area Sensor Network
156
International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME
RLOCF packet forwarding logic at node-i
for (j = 1; j ≤ i-1; j++){
if ( Li,j = 1){
// if link Li,j is now connected
Forward the packet to node-j;
Break;
}
}
if (the packet is not forwarded)
Buffer it at node-I;
// Execute the above logic every time nodei receives a
// new packet to be forwarded OR it has
buffered
// packets AND a new link Li,k (for all k =
1, 2, …, M
// except k = i is formed

In the Figure2, node-6 is considered as the sink, the sorted list can be evaluated as [6, 7, 4, 5,
1, 2, 3 ]. The packet forwarding logic for node-i is to forward a packet to node-j, where node nj is the
first currently connected node in the sub-list [n1, n2, ni-1] in that order.
In other words, the packet is forwarded to a node which is nearest to the sink node among all
the currently connected nodes that are closer to the sink than node-i itself. If there is no single node
that is closer to the sink is c connected, node-i continues buffering the packet till the connectivity
status changes, which is when the above logic is again executed for finding an appropriate node to
which the packet can be forwarded. Relative LOCation based Forwarding (RLOCF) logic gives an
option of multiple possible next hops. The advantage of the above forwarding logic is that in addition
to ensuring that a packet is always forwarded closer to sink node, it can enjoy the phenomenon of
expedited forwarding when nodes that are very close to the sink are directly in touch with a
forwarding node This feature improves both packet delivery delay and hop-count performance of the
routing.
Relative Location based Forwarding (RLOCF) logic has been described for a multi-point-topoint application in which all the nodes present on the body send their packets to a single sink node.
The same logic can be further expanded for multi-point-to-multi-point applications. In multi-pointto-multi-point applications case, instead of a single list, each node maintains M-1 separate lists for
each other node.. The same forwarding logic can then be applied using the appropriate list for the
node which a packet is destined towards.
5.2 On-body Store and Flood Routing (OBSFR)
A modified flooding protocol has been implemented i.e. the On-body Store and Flood
Routing to determine the best case delay performance. . In the case of flooding mechanism multiple
copies of a single packet are dispatched and they reach the destination via multiple routes and the
first arrived copy to reach destination indicates the minimum possible end-to-end delay that can be
achieved by RLOCF.
157
International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME
Mechanism:
In this flooding mechanism a packet carries a unique identifier {source_id. seq_no.} and also
carries a list of node-ids that indicates its path from the source node. When a node-i receives a packet
for the first time (detected from its unique identifier), the pack is buffered there till it encounters at
least one node which is not present in the list of node-ids found in the packet. When it encounters
such a node the packet is handed over to that node and is deleted from its own buffer.
If the packet is subsequently received by the same node-i then it will be ignored. The main
benefit of this flooding protocol. The main benefit of using this approach is reducing the number of
packet drops. Now let us assume a situation in conventional flooding (i.e. without using the list of
node-ids) node-i broadcasts the packet to node-j which already had that packet and it already had
broad cast forwarded the same packet then it simply will discard it after receiving from the node-i. If
node-i and j are forming a network partition that does not contain the destination address then that
packet is dropped from the partition.
The OBSFR mechanism for a multipoint-to-point implementation is summarized in the
pseudo-code in the following algorithm:
OBSFR logic:
Process followed at node-i that forward packets to sink-d
while (true){
for(all buffered packets to be forwarded to node-d){
for (all node j [ j∈vN, j ≠ i ]){
if ( Lti,j = 1 and j∉list of node _ ids in packet ){
// j is a neighbor of i, and the packet did not vist node-j before
Broadcast the packet;
Remove it from node-i’s buffer
Break; // done with this packet forwarding
} else
Continue buffering the packet at node-i;
}
}
}
Process for node-i after receiving a packet
{
if ( the packet was not received before)
if (this is not the destination)
Buffer the packet in for further forwarding;
else
Discard the packet; // it was received before
}
In the modified flooding that used the list of node-ids, However, with the modified flooding
that uses the list of node-ids, node –i will broad cast the packet to all nodes that are not present in the
list of node-ids carried by the packet so node –j will not receive this packet as it is not present in that
list. So the buffering continues till it is not able to find such a node. This improves the chance the
packet is forwarded to the nodes that are out of this partition. Hence, it reduces the overall packet
loss probability. But this technique is applicable only to network having lesser nodes and not for
those networks that contains large number of nodes.
158
International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME
Partition Packet Saturation:
In the above flooding modification there exists a partition packet saturation in which due to
some scenario a packet may have a chance to get lost. Consider a scenario that node-i receives a
packet and it is into a partition with two other nodes p and q such all of them is inter-connected. Now
node-i broadcasts the packet to other nodes p and q as they are not present in the list of node-ids of
the packet and delete it from its own buffer. Now, the nodes p and q broadcast the packet to each
other and as they are not appearing in each other copy of the packet i.e node q does not appear in the
list of p’s copy and node p does not appear in the list of q’s copy of the packet. After forwarding the
packet they will delete from their own buffer, eventually causing the packet to be dropped from the
partition and it will not be able to reach its destination
Goal of On-body Store and Flood Routing:
Inspite of all this On-body Store and Flood Routing (OBSFR) ensures the successful flooding
of the packet to reach the destination with minimum packet delivery delay. But the transmission
energy cost of OBSFR is significantly larger as compared to RLOCF.
6. RADIO TECHNOLOGIES
To have communication possible between the various nodes radio technologies are used. In
this section there is a list of radio technologies are used for BANs and WPANs such as Bluetooth,
Bluetooth Low Energy (Wibree) and ZigBee (IEEE 802.15.4.)[4,5,6].
6.1 Bluetooth
For short range wireless communication Bluetooth technology was designed which was
further used for
connecting various portable devices. These devices support data and voice
application. The current Bluetooth standard in operation is version 2.0 that supports data rate of
3Mbit/s.
6.2 Bluetooth low energy technology
In 2004 Nokia introduced a new technology for providing ultra-low power consumption and
cost which was popularly known as Bluetooth Low End Extension (LEE), and which was later
recognised by the name of Wibree. It was designed to connect small devices to mobile terminals
wirelessly.
This technology provides a data rate of 1 Mbps and uses a simpler protocol stack and focus on shortrange, star-configured networks.
6.3 ZigBee( IEEE 802.15.4)
After the existence of Bluetooth and Wibree a new radio standard was introduced known as
Zigbee (IEEE 802.15.4) that supports low power consumption and is a cost-effective technology.
Zigbee operates in two modes: (1) beacon enabled and (2) non-beacon enabled modes.
(1)Beacon enabled mode: In a beacon enabled mode, a structure of super frame is used which is
divided into two portions: active and inactive. During the inactive portion, devices enter a low-power
mode. During the active portion it has two periods’ contention access period (CAP) and contention
free period (CFP). If any device wants to communicate during the CAP period it competes the other
devices using a slotted CSMA/CA mechanism, while in the CFP it has no contentions and has
guaranteed time slots.
(2)Non –beacon enabled mode: This mode is used if a coordinator does not prefer to use the
beacon-enabled mode, so it will turn off the transmissions and it will use unspotted CSMA/CA
algorithm.
159
International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME
7. QUALITY OF SERVICE IN WBAN
The sensor nodes and human body should be compatible so that no adverse effects or reaction
should occur. Quality of service is sometimes supported by prioritized QoS. Prioritized QoS first
categorizes the services into different Access Classes (ACs), like real time, non real time, best effort,
etc. Different priority is assigned to each of the access classes. Higher the priority is, higher will be
the chance to access the channel .However, once the priority is set, it remains unchanged on this
approach. In WBAN the level of criticality of QOS parameters vary from application to application
depending upon the situation. In normal day life ECG reading is given more preference over the
body temperature so is assigned a higher priority. But in abnormal situation when the body
temperature is high the priority needs to be interchanged.
8.

APPLICATION OF WBAN

Wireless body area network are a great boon to the modern science and technology. Due its
large number of application such as:
8.1 Medical usage
Hospitals and health care have been the two areas where this technology has been developed
and had a great impact. This technology has a great application in monitoring the patient’s health
condition continuously over a period of time. Several nodes are placed at the most appropriate
position of the human body which actually test its specific parameter. Doctors could really make
diagnosis based on the information gathered over a period of time.
8.2 Sports usage
Wireless body area network has a great use in the life of a sportsperson who are young, who
exercise a lot and who need to have accurate and constant information about their training progress.
In this nodes placed at different area of the body could give different type of information. The
sensors may be the heart sensor, temperature sensor etc. that perform their corresponding function.
8.3 Other usage
There are various areas that could use WBAN technology such as it is used as a modern
solution on the areas of war conflicts. It is possible that the commercial standard will give it more
possibilities and performance.
9. CONCLUSION AND FUTURE SCOPE
From this paper we can conclude that WBAN is a promising technology that can have a great
impact on health care in the future. In this paper we have discussed about what is wireless body area
network, what are the devices involved in WBAN, BAN communication architecture, sensors used
on human body, packet routing, quality of service, applications of Wireless body area network.
Despite advances in the above areas there are many challenges that need to be addressed such
as energy efficient communication protocol, interoperability between BANs and design of successful
applications. Packet routing uses the mechanism of forwarding the packet based on relative node
distances from on-body sink node. It is proposed that with the help of successful leveraging of the
node location, it could provide better routing delay performance.

160
International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME
REFERENCES
[1]

[2]

[3]
[4]
[5]
[6]

[7]

[8]

[9]

Khan, J.; Yuce, M.; Karami, F.,” Performance Evaluation of a Wireless Body Area Sensor
Network for Remote Patient Monitoring”, 30th Annual International IEEE EMBS
Conference, 2008.
Ali,Q. ; Abdulmaowjod, A. ; Mohammed, H. ,”Simulation & Performance Study of Wireless
Sensor Network (WSN) Using MATLAB”, 1st International Conference on Energy, Power
and Control (EPC-IQ),2010.
Quwaider, M. ; Biswas, S., “On-body Packet Routing Algorithms for Body Sensor
Networks”, First International Conference on Networks & Communications, 2009.
Latre, B. ; Braem, B. ; Moerman, I. ; Blondia, C.; Demeester, P. “A Survey on Wireless Body
Area Networks”.2011
Chen, M. ; Gonzalez, S. ; Vasilakos, A. ; Cao, H. ; Leung, V. ,” Body Area Networks: A
Survey”, Mobile Netw Appl (2011).
Rahim, A. ; Javaid, N. ; Aslam, M. ; Rahman, Z. ; Qasim, U. ; Khan, Z. ,” A Comprehensive
Survey
of
MAC
Protocols
for
Wireless
Body
Area
Networks”,
http://arxiv.org/abs/1208.2351v1,2012.
Basavaraj S. Mathapati, Siddarama. R. Patil and V. D. Mytri, “Power Control with Energy
Efficient and Reliable Routing MAC Protocol for Wireless Sensor Networks”, International
Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 1, 2012,
pp. 223 - 231, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
Revathi Venkataraman, K.Sornalakshmi, M.Pushpalatha and T.Rama Rao, “Implementation
of Authentication and Confidentiality in Wireless Sensor Network”, International Journal of
Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 553 - 560,
ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
Neeraj Tiwari, Rahul Anshumali and Prabal Pratap Singh, “Wireless Sensor Networks:
Limitation, Layerwise Security Threats, Intruder Detection”, International Journal of
Electronics and Communication Engineering & Technology (IJECET), Volume 3, Issue 2,
2012, pp. 22 - 31, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472.

161

Mais conteúdo relacionado

Mais procurados

Wearable motion tracking for clinical gait analysis
Wearable motion tracking for clinical gait analysis Wearable motion tracking for clinical gait analysis
Wearable motion tracking for clinical gait analysis HayleyBoyd5
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor NetworksIOSR Journals
 
Resource aware and reliable cluster based communication scheme for wireless b...
Resource aware and reliable cluster based communication scheme for wireless b...Resource aware and reliable cluster based communication scheme for wireless b...
Resource aware and reliable cluster based communication scheme for wireless b...IAEME Publication
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2IAEME Publication
 
Design of a Wireless Sensor Network from an Energy Management Perspective
Design of a Wireless Sensor Network from an Energy Management PerspectiveDesign of a Wireless Sensor Network from an Energy Management Perspective
Design of a Wireless Sensor Network from an Energy Management Perspective?? ?
 
localization in wsn
localization in wsnlocalization in wsn
localization in wsnnehabsairam
 
Wireless Sensor Network for Radiation Detection
Wireless Sensor Network for Radiation DetectionWireless Sensor Network for Radiation Detection
Wireless Sensor Network for Radiation Detectionijeei-iaes
 
Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using eSAT Journals
 
Discovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizerDiscovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizereSAT Publishing House
 
Wireless sensor networks localization algorithms a comprehensive survey
Wireless sensor networks localization algorithms a comprehensive surveyWireless sensor networks localization algorithms a comprehensive survey
Wireless sensor networks localization algorithms a comprehensive surveyIJCNCJournal
 
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...ijasuc
 
All optical circuits and for digital logic
All optical circuits and for digital logicAll optical circuits and for digital logic
All optical circuits and for digital logicM. Faisal Halim
 

Mais procurados (19)

Wearable motion tracking for clinical gait analysis
Wearable motion tracking for clinical gait analysis Wearable motion tracking for clinical gait analysis
Wearable motion tracking for clinical gait analysis
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks
 
Resource aware and reliable cluster based communication scheme for wireless b...
Resource aware and reliable cluster based communication scheme for wireless b...Resource aware and reliable cluster based communication scheme for wireless b...
Resource aware and reliable cluster based communication scheme for wireless b...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2Energy efficient k target coverage in wireless sensor net-2
Energy efficient k target coverage in wireless sensor net-2
 
3 ijcse-01222-5
3 ijcse-01222-53 ijcse-01222-5
3 ijcse-01222-5
 
Thesis
ThesisThesis
Thesis
 
Design of a Wireless Sensor Network from an Energy Management Perspective
Design of a Wireless Sensor Network from an Energy Management PerspectiveDesign of a Wireless Sensor Network from an Energy Management Perspective
Design of a Wireless Sensor Network from an Energy Management Perspective
 
1569736195
15697361951569736195
1569736195
 
40120140503013 2
40120140503013 240120140503013 2
40120140503013 2
 
localization in wsn
localization in wsnlocalization in wsn
localization in wsn
 
Wireless Sensor Network for Radiation Detection
Wireless Sensor Network for Radiation DetectionWireless Sensor Network for Radiation Detection
Wireless Sensor Network for Radiation Detection
 
Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using
 
Discovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizerDiscovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizer
 
Automatic Movement of Fire Brigade to Emergency Spot- An Intelligent Transpo...
Automatic Movement of Fire Brigade to Emergency Spot- An  Intelligent Transpo...Automatic Movement of Fire Brigade to Emergency Spot- An  Intelligent Transpo...
Automatic Movement of Fire Brigade to Emergency Spot- An Intelligent Transpo...
 
K010526570
K010526570K010526570
K010526570
 
Wireless sensor networks localization algorithms a comprehensive survey
Wireless sensor networks localization algorithms a comprehensive surveyWireless sensor networks localization algorithms a comprehensive survey
Wireless sensor networks localization algorithms a comprehensive survey
 
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...
LOCALIZATION ALGORITHM USING VARYING SPEED MOBILE SINK FOR WIRELESS SENSOR NE...
 
All optical circuits and for digital logic
All optical circuits and for digital logicAll optical circuits and for digital logic
All optical circuits and for digital logic
 

Semelhante a 50120140501017

IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET Journal
 
IRJET- Energy Efficiency Enhancement in Body Area Network using IEEE 802.15.6...
IRJET- Energy Efficiency Enhancement in Body Area Network using IEEE 802.15.6...IRJET- Energy Efficiency Enhancement in Body Area Network using IEEE 802.15.6...
IRJET- Energy Efficiency Enhancement in Body Area Network using IEEE 802.15.6...IRJET Journal
 
On improvement of performance for transport protocol using sectoring sche
On improvement of performance for transport protocol using sectoring scheOn improvement of performance for transport protocol using sectoring sche
On improvement of performance for transport protocol using sectoring scheIAEME Publication
 
Ant Colony Optimization for Wireless Sensor Network: A Review
Ant Colony Optimization for Wireless Sensor Network: A ReviewAnt Colony Optimization for Wireless Sensor Network: A Review
Ant Colony Optimization for Wireless Sensor Network: A Reviewiosrjce
 
IRJET- Clustering the Real Time Moving Object Adjacent Tracking
IRJET-  	  Clustering the Real Time Moving Object Adjacent TrackingIRJET-  	  Clustering the Real Time Moving Object Adjacent Tracking
IRJET- Clustering the Real Time Moving Object Adjacent TrackingIRJET Journal
 
Various Techniques Used in Wireless Sensor Networks for Data Transfer
Various Techniques Used in Wireless Sensor Networks for Data TransferVarious Techniques Used in Wireless Sensor Networks for Data Transfer
Various Techniques Used in Wireless Sensor Networks for Data TransferIJAEMSJORNAL
 
Pm-EEMRP: Postural Movement Based Energy Efficient Multi-hop Routing Protocol...
Pm-EEMRP: Postural Movement Based Energy Efficient Multi-hop Routing Protocol...Pm-EEMRP: Postural Movement Based Energy Efficient Multi-hop Routing Protocol...
Pm-EEMRP: Postural Movement Based Energy Efficient Multi-hop Routing Protocol...TELKOMNIKA JOURNAL
 
Particle Swarm Optimization Based QoS Aware Routing for Wireless Sensor Networks
Particle Swarm Optimization Based QoS Aware Routing for Wireless Sensor NetworksParticle Swarm Optimization Based QoS Aware Routing for Wireless Sensor Networks
Particle Swarm Optimization Based QoS Aware Routing for Wireless Sensor Networksijsrd.com
 
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...IJMTST Journal
 
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKComplete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKRutvik Pensionwar
 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksijasuc
 
Energy Efficiency in Key Management of Body Sensor Network
Energy Efficiency in Key Management of Body Sensor NetworkEnergy Efficiency in Key Management of Body Sensor Network
Energy Efficiency in Key Management of Body Sensor Networkiosrjce
 
MINIMIZATION OF HANDOFF LATENCY BY CO-ORDINATE EVALUATION METHOD USING GPS BA...
MINIMIZATION OF HANDOFF LATENCY BY CO-ORDINATE EVALUATION METHOD USING GPS BA...MINIMIZATION OF HANDOFF LATENCY BY CO-ORDINATE EVALUATION METHOD USING GPS BA...
MINIMIZATION OF HANDOFF LATENCY BY CO-ORDINATE EVALUATION METHOD USING GPS BA...VLSICS Design
 
Minimization of Handoff Latency by Co-ordinate Evaluation Method Using GPS Ba...
Minimization of Handoff Latency by Co-ordinate Evaluation Method Using GPS Ba...Minimization of Handoff Latency by Co-ordinate Evaluation Method Using GPS Ba...
Minimization of Handoff Latency by Co-ordinate Evaluation Method Using GPS Ba...VLSICS Design
 

Semelhante a 50120140501017 (20)

IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
 
50120140506010
5012014050601050120140506010
50120140506010
 
IRJET- Energy Efficiency Enhancement in Body Area Network using IEEE 802.15.6...
IRJET- Energy Efficiency Enhancement in Body Area Network using IEEE 802.15.6...IRJET- Energy Efficiency Enhancement in Body Area Network using IEEE 802.15.6...
IRJET- Energy Efficiency Enhancement in Body Area Network using IEEE 802.15.6...
 
2512ijcsea02
2512ijcsea022512ijcsea02
2512ijcsea02
 
On improvement of performance for transport protocol using sectoring sche
On improvement of performance for transport protocol using sectoring scheOn improvement of performance for transport protocol using sectoring sche
On improvement of performance for transport protocol using sectoring sche
 
Ant Colony Optimization for Wireless Sensor Network: A Review
Ant Colony Optimization for Wireless Sensor Network: A ReviewAnt Colony Optimization for Wireless Sensor Network: A Review
Ant Colony Optimization for Wireless Sensor Network: A Review
 
N017318992
N017318992N017318992
N017318992
 
IRJET- Clustering the Real Time Moving Object Adjacent Tracking
IRJET-  	  Clustering the Real Time Moving Object Adjacent TrackingIRJET-  	  Clustering the Real Time Moving Object Adjacent Tracking
IRJET- Clustering the Real Time Moving Object Adjacent Tracking
 
Various Techniques Used in Wireless Sensor Networks for Data Transfer
Various Techniques Used in Wireless Sensor Networks for Data TransferVarious Techniques Used in Wireless Sensor Networks for Data Transfer
Various Techniques Used in Wireless Sensor Networks for Data Transfer
 
Pm-EEMRP: Postural Movement Based Energy Efficient Multi-hop Routing Protocol...
Pm-EEMRP: Postural Movement Based Energy Efficient Multi-hop Routing Protocol...Pm-EEMRP: Postural Movement Based Energy Efficient Multi-hop Routing Protocol...
Pm-EEMRP: Postural Movement Based Energy Efficient Multi-hop Routing Protocol...
 
Particle Swarm Optimization Based QoS Aware Routing for Wireless Sensor Networks
Particle Swarm Optimization Based QoS Aware Routing for Wireless Sensor NetworksParticle Swarm Optimization Based QoS Aware Routing for Wireless Sensor Networks
Particle Swarm Optimization Based QoS Aware Routing for Wireless Sensor Networks
 
Ijnsa050209
Ijnsa050209Ijnsa050209
Ijnsa050209
 
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
An Energy-Efficient Min-Max Optimization with RSA Security in Wireless Sensor...
 
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKComplete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
 
I018135565
I018135565I018135565
I018135565
 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
 
E017342231
E017342231E017342231
E017342231
 
Energy Efficiency in Key Management of Body Sensor Network
Energy Efficiency in Key Management of Body Sensor NetworkEnergy Efficiency in Key Management of Body Sensor Network
Energy Efficiency in Key Management of Body Sensor Network
 
MINIMIZATION OF HANDOFF LATENCY BY CO-ORDINATE EVALUATION METHOD USING GPS BA...
MINIMIZATION OF HANDOFF LATENCY BY CO-ORDINATE EVALUATION METHOD USING GPS BA...MINIMIZATION OF HANDOFF LATENCY BY CO-ORDINATE EVALUATION METHOD USING GPS BA...
MINIMIZATION OF HANDOFF LATENCY BY CO-ORDINATE EVALUATION METHOD USING GPS BA...
 
Minimization of Handoff Latency by Co-ordinate Evaluation Method Using GPS Ba...
Minimization of Handoff Latency by Co-ordinate Evaluation Method Using GPS Ba...Minimization of Handoff Latency by Co-ordinate Evaluation Method Using GPS Ba...
Minimization of Handoff Latency by Co-ordinate Evaluation Method Using GPS Ba...
 

Mais de IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Mais de IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Último

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Último (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

50120140501017

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & 6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 1, January (2014), pp. 153-161 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com IJCET ©IAEME LOCATION BASED STORE AND FORWARD PACKET ROUTING ALGORITHM FOR WIRELESS BODY AREA NETWORKS: A SURVEY Shivam Wadhwa1, Kusum Dangi2 1 2 Dept of Computer Science and Engineering, ITM University Gurgaon, India Dept of Electronics and Communication Engineering, ITM University Gurgaon, India ABSTRACT The increasing use of wireless networks and the constant miniaturization of electrical devices have empowered the development of Wireless Body Area Networks (WBANs). WBAN is an application of Wireless Sensor network that is used in health monitoring. Wireless sensor nodes are either placed inside or on the body and transmit the data in form of packets .Packet Routing is very crucial technique in WBAN. Packet Routing is used to send the data which is being monitored by various sensor nodes implanted on the body. In this paper we discuss about location based store-and forward packet routing algorithm for WBAN with general body postures. Keyword: Communication Architecture, Location Based Routing, Packet Routing, QoS, WBAN, WPAN. 1. INTRODUCTION WBAN consists of tiny sensors attached or implanted in the body which are capable of establishing a wireless communication link. The on body sensors continuously monitor the human physiological changes occurring periodically. This physiological data is in form of packets that are to be sent to the destination. In this paper we will discuss about various aspects of WBAN and on-body store-and forward packet routing algorithm for WBAN. 2. WIRELESS BODY AREA NETWORK: OVERVIEW WBAN technology came into existence around 1995 with the idea of using Wireless personal area network (WPAN) which help in communication on or around the human body[1,2]. 153
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME 2.1 Types of Devices (Wireless) Sensor node: A Sensor node is a device whose function is, gathering and responding to any kind of physiological change, happening in the human body and reports this data with wireless means. (Wireless) Actuator node: Its function is to act according to the data received from the sensors. (Wireless) Personal Device (PD): Its function is to inform the patient about all the information gathered from the sensors and actuators. 3. WBAN COMMUNICATION ARCHITECTURE WBAN posse’s three tier communication architecture Figure1: Three tier communication architecture In fig.1, a three-tier architecture based on a BAN communication system is shown. The figure shows that all the sensors send their data to the personal server and finally the data is streamed to a medical practioner. The whole communication takes place in three-tier: 3.1 Tier1-communication In Tier-1, the communication occurs around 2 metres of the human body which comprises of two actions first is the communication between the body sensors and the other is the communication between the body sensors and portable personal server. 3.2 Tier2-communication In Tier -2, the communication occurs between the personal server and the access points. The basic functionality of this tier is interconnecting various BANs with various networks. 154
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME 3.3 Tier3-communication In Tier-3, the communication is intended for metropolitan areas. It is used to bridge the network for inter- BAN and beyond- BAN communication. 4. SENSORS USED IN WBAN Accelerometer/Gyroscope: Accelerometer sensor is used to monitor the various body positions like walking, sitting, standing. . The accelerometer-based posture monitoring for BANs are used to measure the vibration happening in the human body and also acceleration due to gravity. Gyroscope uses the principle of conservation of angular momentum to measure or maintain the body orientation. Blood glucose: The amount of glucose circulating in the blood is called as blood glucose. It is also called as blood sugar. Glucose is measured by extracting blood from the finger and then applying it to a test strip composed of chemicals sensitive to the glucose in blood sample. An optical meter (glucometer) is used to analyze the blood sample and gives a numerical glucose reading. Blood pressure: The blood pressure sensor uses the principle of oscilimetric to measure the blood pressure of the body. CO2 gas sensor: This sensor is used to measure the changes in carbon-dioxide happening in the human body. ECG sensor: ECG is also known as electro cardio gram that is used to record the electric activity of the heart which is helpful in diagnosing a heart disease. ECG signal is obtained by placing several electrodes on the skin (e.g., arms, and chest), and then measuring potential differences between these electrodes. EEG sensor: Electro encephalogram sensor is used to measure the electrical activity happening inside the brain. It is done by attaching tiny electrodes to the human’s scalp at multiple locations. The information that is sensed by the electrodes is forwarded to an amplifier for producing a pattern of tracings. EMG sensor: EMG sensor is used to measure the electric signals produced by the muscles. Nerve conduction is usually done to measure the electrical activity in muscles as nerves control the muscles in the body. Temperature and Humidity sensor: The temperature and humidity sensors are used to measure the temperature and humidity of the environment around the human body. 5. PACKET ROUTING IN WBAN Packet routing is important aspect in Wireless body area network .A number of small sensors as discussed above strategically placed on human body can create a Wireless Body Area Network which can monitor vital signs and collect the data in the form of packets. This data movement across such sensors can be point to point or multi-point. In this section we will discuss on-body packet routing issues in case of various body postures [3]. 155
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME Goal of packet routing: The goal of this discussion is to develop on-body store and forward packet routing and minimising end-to-end packet delay by dynamically choosing routes on which the storage delay is low. The main goals of this packet routing are: 1.) end-to-end delay, 2.) packet loss, and 3.) transmission energy consumption. In fig.2, various sensors are placed on the human body that will transmit the data to a sink node which in turn will send the data to the sink node which in turn communicates with the out of body server. Two store and forward routing algorithms have been developed based on location based routing protocol. 5.1 Relative Location based Forwarding (RLOCF) The main logic of packet forwarding in RLOCF is that a node forwards a packet to other neighbouring nodes that are known to be closer to the sink node. The main logic behind this forwarding algorithm is to give information to every node about the relative distances between all other neighbouring nodes in the network and the sink node. It can be easily implemented on typical on-body networks (as shown in Fig.2) containing only a few nodes. The packet forwarding logic in RLOCF can be formally stated as follows. For an M-node body sensor network, a sorted list [n1, n2, ni,. .,nM] is created based on the distances of the individual nodes from the sink node (e.g. node-6 in Fig. 1). Node n1 represents the sink, and the nodes are placed in the list such that: d(n1) =0 or 1 and d(ni) ≤d (ni+1) , i = 1, 2, 3, …,M1, where the quantity d(ni) represents the distance of node ni from the sink node n1.Based on the known sensor placement locations and the usual body configurations, the quantities d(ni) are first estimated manually and then the above sorted list is created. Figure 2: Body Area Sensor Network 156
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME RLOCF packet forwarding logic at node-i for (j = 1; j ≤ i-1; j++){ if ( Li,j = 1){ // if link Li,j is now connected Forward the packet to node-j; Break; } } if (the packet is not forwarded) Buffer it at node-I; // Execute the above logic every time nodei receives a // new packet to be forwarded OR it has buffered // packets AND a new link Li,k (for all k = 1, 2, …, M // except k = i is formed In the Figure2, node-6 is considered as the sink, the sorted list can be evaluated as [6, 7, 4, 5, 1, 2, 3 ]. The packet forwarding logic for node-i is to forward a packet to node-j, where node nj is the first currently connected node in the sub-list [n1, n2, ni-1] in that order. In other words, the packet is forwarded to a node which is nearest to the sink node among all the currently connected nodes that are closer to the sink than node-i itself. If there is no single node that is closer to the sink is c connected, node-i continues buffering the packet till the connectivity status changes, which is when the above logic is again executed for finding an appropriate node to which the packet can be forwarded. Relative LOCation based Forwarding (RLOCF) logic gives an option of multiple possible next hops. The advantage of the above forwarding logic is that in addition to ensuring that a packet is always forwarded closer to sink node, it can enjoy the phenomenon of expedited forwarding when nodes that are very close to the sink are directly in touch with a forwarding node This feature improves both packet delivery delay and hop-count performance of the routing. Relative Location based Forwarding (RLOCF) logic has been described for a multi-point-topoint application in which all the nodes present on the body send their packets to a single sink node. The same logic can be further expanded for multi-point-to-multi-point applications. In multi-pointto-multi-point applications case, instead of a single list, each node maintains M-1 separate lists for each other node.. The same forwarding logic can then be applied using the appropriate list for the node which a packet is destined towards. 5.2 On-body Store and Flood Routing (OBSFR) A modified flooding protocol has been implemented i.e. the On-body Store and Flood Routing to determine the best case delay performance. . In the case of flooding mechanism multiple copies of a single packet are dispatched and they reach the destination via multiple routes and the first arrived copy to reach destination indicates the minimum possible end-to-end delay that can be achieved by RLOCF. 157
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME Mechanism: In this flooding mechanism a packet carries a unique identifier {source_id. seq_no.} and also carries a list of node-ids that indicates its path from the source node. When a node-i receives a packet for the first time (detected from its unique identifier), the pack is buffered there till it encounters at least one node which is not present in the list of node-ids found in the packet. When it encounters such a node the packet is handed over to that node and is deleted from its own buffer. If the packet is subsequently received by the same node-i then it will be ignored. The main benefit of this flooding protocol. The main benefit of using this approach is reducing the number of packet drops. Now let us assume a situation in conventional flooding (i.e. without using the list of node-ids) node-i broadcasts the packet to node-j which already had that packet and it already had broad cast forwarded the same packet then it simply will discard it after receiving from the node-i. If node-i and j are forming a network partition that does not contain the destination address then that packet is dropped from the partition. The OBSFR mechanism for a multipoint-to-point implementation is summarized in the pseudo-code in the following algorithm: OBSFR logic: Process followed at node-i that forward packets to sink-d while (true){ for(all buffered packets to be forwarded to node-d){ for (all node j [ j∈vN, j ≠ i ]){ if ( Lti,j = 1 and j∉list of node _ ids in packet ){ // j is a neighbor of i, and the packet did not vist node-j before Broadcast the packet; Remove it from node-i’s buffer Break; // done with this packet forwarding } else Continue buffering the packet at node-i; } } } Process for node-i after receiving a packet { if ( the packet was not received before) if (this is not the destination) Buffer the packet in for further forwarding; else Discard the packet; // it was received before } In the modified flooding that used the list of node-ids, However, with the modified flooding that uses the list of node-ids, node –i will broad cast the packet to all nodes that are not present in the list of node-ids carried by the packet so node –j will not receive this packet as it is not present in that list. So the buffering continues till it is not able to find such a node. This improves the chance the packet is forwarded to the nodes that are out of this partition. Hence, it reduces the overall packet loss probability. But this technique is applicable only to network having lesser nodes and not for those networks that contains large number of nodes. 158
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME Partition Packet Saturation: In the above flooding modification there exists a partition packet saturation in which due to some scenario a packet may have a chance to get lost. Consider a scenario that node-i receives a packet and it is into a partition with two other nodes p and q such all of them is inter-connected. Now node-i broadcasts the packet to other nodes p and q as they are not present in the list of node-ids of the packet and delete it from its own buffer. Now, the nodes p and q broadcast the packet to each other and as they are not appearing in each other copy of the packet i.e node q does not appear in the list of p’s copy and node p does not appear in the list of q’s copy of the packet. After forwarding the packet they will delete from their own buffer, eventually causing the packet to be dropped from the partition and it will not be able to reach its destination Goal of On-body Store and Flood Routing: Inspite of all this On-body Store and Flood Routing (OBSFR) ensures the successful flooding of the packet to reach the destination with minimum packet delivery delay. But the transmission energy cost of OBSFR is significantly larger as compared to RLOCF. 6. RADIO TECHNOLOGIES To have communication possible between the various nodes radio technologies are used. In this section there is a list of radio technologies are used for BANs and WPANs such as Bluetooth, Bluetooth Low Energy (Wibree) and ZigBee (IEEE 802.15.4.)[4,5,6]. 6.1 Bluetooth For short range wireless communication Bluetooth technology was designed which was further used for connecting various portable devices. These devices support data and voice application. The current Bluetooth standard in operation is version 2.0 that supports data rate of 3Mbit/s. 6.2 Bluetooth low energy technology In 2004 Nokia introduced a new technology for providing ultra-low power consumption and cost which was popularly known as Bluetooth Low End Extension (LEE), and which was later recognised by the name of Wibree. It was designed to connect small devices to mobile terminals wirelessly. This technology provides a data rate of 1 Mbps and uses a simpler protocol stack and focus on shortrange, star-configured networks. 6.3 ZigBee( IEEE 802.15.4) After the existence of Bluetooth and Wibree a new radio standard was introduced known as Zigbee (IEEE 802.15.4) that supports low power consumption and is a cost-effective technology. Zigbee operates in two modes: (1) beacon enabled and (2) non-beacon enabled modes. (1)Beacon enabled mode: In a beacon enabled mode, a structure of super frame is used which is divided into two portions: active and inactive. During the inactive portion, devices enter a low-power mode. During the active portion it has two periods’ contention access period (CAP) and contention free period (CFP). If any device wants to communicate during the CAP period it competes the other devices using a slotted CSMA/CA mechanism, while in the CFP it has no contentions and has guaranteed time slots. (2)Non –beacon enabled mode: This mode is used if a coordinator does not prefer to use the beacon-enabled mode, so it will turn off the transmissions and it will use unspotted CSMA/CA algorithm. 159
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME 7. QUALITY OF SERVICE IN WBAN The sensor nodes and human body should be compatible so that no adverse effects or reaction should occur. Quality of service is sometimes supported by prioritized QoS. Prioritized QoS first categorizes the services into different Access Classes (ACs), like real time, non real time, best effort, etc. Different priority is assigned to each of the access classes. Higher the priority is, higher will be the chance to access the channel .However, once the priority is set, it remains unchanged on this approach. In WBAN the level of criticality of QOS parameters vary from application to application depending upon the situation. In normal day life ECG reading is given more preference over the body temperature so is assigned a higher priority. But in abnormal situation when the body temperature is high the priority needs to be interchanged. 8. APPLICATION OF WBAN Wireless body area network are a great boon to the modern science and technology. Due its large number of application such as: 8.1 Medical usage Hospitals and health care have been the two areas where this technology has been developed and had a great impact. This technology has a great application in monitoring the patient’s health condition continuously over a period of time. Several nodes are placed at the most appropriate position of the human body which actually test its specific parameter. Doctors could really make diagnosis based on the information gathered over a period of time. 8.2 Sports usage Wireless body area network has a great use in the life of a sportsperson who are young, who exercise a lot and who need to have accurate and constant information about their training progress. In this nodes placed at different area of the body could give different type of information. The sensors may be the heart sensor, temperature sensor etc. that perform their corresponding function. 8.3 Other usage There are various areas that could use WBAN technology such as it is used as a modern solution on the areas of war conflicts. It is possible that the commercial standard will give it more possibilities and performance. 9. CONCLUSION AND FUTURE SCOPE From this paper we can conclude that WBAN is a promising technology that can have a great impact on health care in the future. In this paper we have discussed about what is wireless body area network, what are the devices involved in WBAN, BAN communication architecture, sensors used on human body, packet routing, quality of service, applications of Wireless body area network. Despite advances in the above areas there are many challenges that need to be addressed such as energy efficient communication protocol, interoperability between BANs and design of successful applications. Packet routing uses the mechanism of forwarding the packet based on relative node distances from on-body sink node. It is proposed that with the help of successful leveraging of the node location, it could provide better routing delay performance. 160
  • 9. International Journal of Computer Engineering and Technology (IJCET), ISSN 09766367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 1, January (2014), © IAEME REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] Khan, J.; Yuce, M.; Karami, F.,” Performance Evaluation of a Wireless Body Area Sensor Network for Remote Patient Monitoring”, 30th Annual International IEEE EMBS Conference, 2008. Ali,Q. ; Abdulmaowjod, A. ; Mohammed, H. ,”Simulation & Performance Study of Wireless Sensor Network (WSN) Using MATLAB”, 1st International Conference on Energy, Power and Control (EPC-IQ),2010. Quwaider, M. ; Biswas, S., “On-body Packet Routing Algorithms for Body Sensor Networks”, First International Conference on Networks & Communications, 2009. Latre, B. ; Braem, B. ; Moerman, I. ; Blondia, C.; Demeester, P. “A Survey on Wireless Body Area Networks”.2011 Chen, M. ; Gonzalez, S. ; Vasilakos, A. ; Cao, H. ; Leung, V. ,” Body Area Networks: A Survey”, Mobile Netw Appl (2011). Rahim, A. ; Javaid, N. ; Aslam, M. ; Rahman, Z. ; Qasim, U. ; Khan, Z. ,” A Comprehensive Survey of MAC Protocols for Wireless Body Area Networks”, http://arxiv.org/abs/1208.2351v1,2012. Basavaraj S. Mathapati, Siddarama. R. Patil and V. D. Mytri, “Power Control with Energy Efficient and Reliable Routing MAC Protocol for Wireless Sensor Networks”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 1, 2012, pp. 223 - 231, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. Revathi Venkataraman, K.Sornalakshmi, M.Pushpalatha and T.Rama Rao, “Implementation of Authentication and Confidentiality in Wireless Sensor Network”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 553 - 560, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. Neeraj Tiwari, Rahul Anshumali and Prabal Pratap Singh, “Wireless Sensor Networks: Limitation, Layerwise Security Threats, Intruder Detection”, International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 3, Issue 2, 2012, pp. 22 - 31, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472. 161