SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
International Journal of Engineering Research and Development
ISSN: 2278-067X, Volume 1, Issue 3 (June 2012), PP.01-07
www.ijerd.com

  Improvement the Performance Of Mobility Pattern In Mobile
          Ad-Hoc Sensor Network using Qualnet 5.0
                        Manoj Rana1, Shubham Kumar2Upasana Sharma3,
               1
                   Assistant Professor and Head of Department, Computer Science Engineering Department,
                                  College of Engineering and Rural Technology Meerut, India
                               2
                                 Assistant Professor, Computer Science Engineering Department,
                                  College of Engineering and Rural Technology Meerut, India
                               3
                                 Assistant Professor, Computer Science Engineering Department,
                                                  Amity University Noida, India.

Abstract––A mobile ad-hoc sensor network usually consists of large number of sensor nodes (stationary or mobile)
deployed over an area to be monitored. Each sensor node is a self-contained, battery-powered device that is capable of
sensing, communication and some level of computation and data processing. Due to the large amount usage of sensors in
the network, it is important to keep each node small and inexpensive. This strictly restricts its resources in terms of
energy, memory, processing speed bandwidth. We simulate the Mobile ad-hoc sensor network for its performance
analysis. we introduced the concept of communication range remoteness for mobile nodes through random way point
mobility model. We characterized the mobility of nodes with new mobility patterns through AODV protocol, without
breaking the backward compatibility with earlier versions. In this paper we will proposed two model as non mobility
model and mobility model. And in this paper we will compare both models using the concept of mobile ad-hoc sensor
network. The performance through the multiple node of non mobility model was found better in comparison of mobility
model. . than we design the concept of antenna and improve the frequency of transmitting signal for mobility model,this
model is known as design mobility model. In this paper we improve the performance of design mobility in comparison of
non mobility model and mobility model. The performance analysis of mobility and non-mobility and design mobility
model is done through simulations on a commercial simulator called Qualnet version 5.0, software that provides scalable
simulations of Wireless networks.

Keywords––AODV, CBR, LRPAN, WSN, FFD, RFD, Zig Bee.

                                            I.         INTRODUCTION
           A wireless sensor network usually consists of a large number of sensor nodes (stationary or mobile) deployed
over an area to be monitored. Each sensor node is a self-contained, battery-powered device that is capable of sensing,
communication and some level of computation and data processing. Due to the large amount usage of sensors in the
network, it is important to keep each node small and inexpensive. This strictly restricts its resources in terms of energy,
memory, processing speed and bandwidth. A wireless sensor network (WSN) is a wireless computer network consisting
of spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions,
such as temperature, sound, vibration, pressure, motion or pollutants, at different locations. A sensor, in its simplest
definition, is a device that is capable of observing and recording a phenomenon. This is termed as sensing. Sensors are
used in various applications such as industry, military, healthcare, disaster relief, meteorology, etc. For example, sensors
are used to study the formation of tornadoes by measuring the pressure, humidity, temperature, and wind direction when
a tornado occurs. In rescue operations, seismic sensors are used to detect survivors caught in landslides and earthquakes.
With advances in electronics, sensors now have the capability to sense, process, and communicate data. These small-
sized sensor nodes have low cost, low power needs, and the ability to communicate over short distances. This has led to
the development of sensor networks, which capitalize on the sensor node's ability to communicate. A sensor network
consists of possibly several hundred sensor nodes, deployed in close proximity to the phenomenon that they are designed
to observe. The position of sensor nodes within a sensor network need not be pre-determined. Sensor networks must have
the robustness to work in extreme environmental conditions with scarce or zero interference from humans. This also
means that they should be able to overcome frequent node failures. In this paper sensor node are mobiles deployed over
the area so it is called mobile ad-hoc sensor network.

                            II.      OVERVIEW OF CURRENT LITERATURE
           Some of the most important properties of a mobile user population are the characteristics and pattern of the user
mobility. In simulating mobile systems, it is important to use a realistic mobility model so that the evaluation results from
the simulation correctly indicate the real world performance of the system. A.K. Saha and D.B. Johnson [5] proposed a
realistic model of node motion based on vehicular traffic, suitable for evaluating vehicular ad hoc networks. Y. Lu, H.
Lin, Y. Gu, and A. Helmy [6] classified various mobility models, in addition to proposing the contraction, expansion,
circling, hybrid contraction and random waypoint and hybrid Manhattan and RWP mobility models. These models
covered scenarios in which nodes merge, scatter or switch to different mobility patterns over time. Mobility metrics like,
node degree, link duration, relative speed, temporal dependence, and spatial dependence are studied to differentiate the
characteristics of proposed and existing mobility models. They showed that average node degree and link duration are
very useful in capturing mobility dynamics.
                                                             1
Improvement the Performance Of Mobility Pattern In Mobile Ad-Hoc Sensor Network

          T. Camp, J. Boleng, and V. Davies [7] investigated characteristics of different mobility models including
random walk, random waypoint, random direction, and reference point group mobility model. They compared these
mobility models using mobility metrics like data packet delivery ratio, average end to end delay, average hop count,
control packet transmissions per data packet delivered and control byte transmissions per data packet delivered against
average node speed. But the problem with this is that if the nodes are moving in the same direction with the same speed
so we cannot have a better idea of the mobility of nodes as they seem static with respect to each other.

           J. W. Wilson [8] combined several features of the existing individual and group mobility models to explore the
sensitivity of routing protocol performance, to mobility patterns. Reference point group mobility model is combined with
mobility vector model and the resulted model is used to examine sensitivity of existing ad hoc routing protocols, to
changes in mobility generated by that model. Basic approach used is that, objects in real world react to accelerations. At
each interval time in simulation, individual participant positions are calculated and their velocity vectors are adjusted. For
different network participants maximum throughput is plotted against maximum velocity and a decrease in throughput is
observed with increase in maximum participant velocity. This is due to the increased number of broken links due to
increased average participant velocity. But for different mobility models we can have different link change rate and if
nodes are moving with same velocity, we cannot have better idea of mobility.

           There are two possible approaches to tackle the problem of designing realistic and reproducible mobility and
communication models. In the first approach, mobility models are created that most closely represent the real world, after
conceiving actual use of the systems. Although this approach guarantees realistic and relevant models but it could
potentially lead to overly complex models that are hard to analyze. In the second approach, such models are created much
like the creation of benchmark programs for computer systems. D.S. Tan, S. Zhou, J. Ho, J.S. Mehta, and H. Tanabe [9]
used a combination of the two approaches and presented a general purpose method that may be used to reliably generate
realistic mobility patterns with different characteristics. D. Shukla [10] investigated different mobility models and uses
mobility parameters: average speed and distance traveled, transmission range and link changes, against average speed, to
compare them

                                           III.       ARCHITECTURE
          The concept of wireless sensor networks is based on a simple equation: Sensing + CPU + Radio = Thousands
of potential applications As soon as people understand the capabilities of a wireless sensor network, hundreds of
applications spring to mind. It seems like a straightforward combination of modern technology. However, actually
combining sensors, radios, and CPU’s into an effective wireless sensor network requires a detailed understanding of the
both capabilities and limitations of each of the underlying hardware components, as well as a detailed understanding of
modern networking technologies and distributed systems theory.

                                IV.        MOBILITY MODEL STRATEGIES
In WSNs, three different types of mobility have been suggested: random, predictable or fixed, and controlled.

Rand om Mobility
Random-walk mobility is assumed to be independent of the network topology, traffic flows and residual energy of
nodes.

Predictable Mobility
The predictable or fixed trajectory of a mobile sink is fully deterministic as the sink always follows the same path
through the network. In some cases, the path actually selected is, in fact, enforced by artificial or natural obstacles in
the environment. One should observe that both in the case of random and predictable mobility, the actual speed of the
sink can influence the amount of control data generated in the network, possibly limiting the benefits of sink mobility.

Controlled Mobility
In the case of controlled mobility, the path of the sink becomes a function of the current state of network flows and
nodes’ energy consumption, and it keeps adjusting itself to ensure optimal network performance at all times. From the
application perspective, controlled mobility can find its use in both continuous and event -base WSNs.

                                  V.         SIMULATION ENVIRONMENT
           Performance evaluation of wireless ad-hoc sensor networks is done through simulations on a provides scalable
simulations of Wireless networks. In our simulation, we consider a mobile ad-hoc sensor network with 10 mobile nodes
and a statically placed data sink (root node). Data sink node (1) is a full function device and work as a PAN Coordinator.
Here we used IEEE 802.15.4, wireless standard for PHY and MAC layer, non commercial simulator called Qualnet
version 5.0, software Mobility Model and mobility model for the mobile nodes and AODV (Ad hoc On-Demand
Distance Vector) routing. We take the Scenario for multiple events occurring simultaneously at a time. We are
transmitting 300 packets for per events.
In the model the components used are:
   1 Wireless subnet
   2 10 mobile nodes and a statically placed data sink (root node).
   3 CBR traffic flow.
                                                              2
Improvement the Performance Of Mobility Pattern In Mobile Ad-Hoc Sensor Network

Wireless Subnet: White cloud in the n/w is ZigBee subnet. This subnet is responsible for giving ZigBee properties to all
the nodes.

Nodes: we consider a mobile ad-hoc sensor network with 10 mobile nodes and a statically placed data sink (root node).
Data sink node (1) is a full function device and work as a PAN Coordinator.

Trffic Flow: We used the application of constant bit rate (CBR).We have taken node 2,3,4,5,6,7,8,910,11 as source and
node 1 is taken in Scenario as sink node. We will send 300 packet of each size 50 bytes at start 1s. We have send all
packet at 1s interval of time and ending time of simulation is 301s.

1 Physical layer parameters:The parameters used to configure PHY802.15.4 for FFD and RFD are

                                            Table 1.1 Physical layer parameter

                            Physical layer Parameter

                            Radio type                           802.15.4 Radio

                            Transmission Power                   3 db

                            Packet Reception Model               Phy 802.15.4

                            Modulation Scheme                    O-QPSK

                            CCA Mode                             Carrier sense

 2 MAC Layer Parameters: The parameters used to configure MAC802.16e for FFD and RFD are:


                            Mac layer parameter

                            Mac protocol                         802.15.4

                            Device type                          RFD(2-10)

                            Device type                          FFD(1)

                            FFD mode                             Pan Co-ordinator

Network layer parameters: At network layer IPv4 queue type is FIFO (First in First Out). AODV algorithm is used as
routing protocol.

Application layer parameters: Constant bit rate application is run with packet size of 50 bytes and inter packet interval
of 1s. Packet transmission starts at 1s and continue till end of simulation.

Scenario: In the model the components used are Wireless subnet, nodes configured and CBR traffic flow. Simulation
parameters as shown below in table and all remaining parameters are by default.

                              VI.         SIMULATION RESULTS ANALYSIS
Non Mobility Model: In this model sensor nodes and pan co-coordinator both are static. In the performance evaluation
of a protocol for a wireless sensor network, the protocol should be tested under realistic conditions including, but limited
to a sensible transmission range, limited buffer space for the storage of messages, representative data traffic models, and
realistic no movements of the mobile users (i.e., a non mobility model). This model is a journey through non mobility
models that are used in the simulations of mobile Ad-hoc sensor networks. Here the descriptions of non mobility models
that represent mobile nodes whose movements are static.




                                                             3
Improvement the Performance Of Mobility Pattern In Mobile Ad-Hoc Sensor Network




                                      Running Scenarios for Non Mobility Model

Mobility Models: In this model sensor nodes are dynamic and pan co-coordinator are static In the performance
evaluation of a protocol for a wireless sensor network, the protocol should be tested under realistic conditions including,
but not limited to, a sensible transmission range, limited buffer space for the storage of messages, representative data
traffic models, and realistic movements of the mobile users (i.e., a mobility model). This model is a journey through
mobility models that are used in the simulations of mobile Ad-hoc sensor networks. Here the descriptions of mobility
models that represent mobile nodes whose movements are independent of each other (i.e., entity Mobility models) and
mobility models that represent mobile nodes whose movements are dependent on each other (i.e., group mobility
models).




                                        Running Scenarios for Mobility Model

Design Mobility Model: In this model we have to design antenna so that the frequency of transmitting signal may be
improved.




                                    Running Scenarios for design Mobility Model




                                                            4
Improvement the Performance Of Mobility Pattern In Mobile Ad-Hoc Sensor Network

                                                             VII.       GRAPHICAL RESULT
          We compared these mobility models using mobility metrics like total packet received, average end to end
delay, throughput, average jitter, signal received but with error. Now we will show one by one all case and also we will
give conclusion of this paper.

1.        Total Packet Received
In these graph we want to show that in Non-Mobility model we have received total 1618 packets, in mobility model 1518
packets, in design Mobility model 1756 packets. In graph 1, 2, 3 in x-Axis shows- 1 for experiment no 1 Non-Mobility
model, 2 for Mobility model, 3 for design Mobility. After compare three case we have to find that design Mobility
received maximum packets.




                                                                              Total packet received

                                                            1800
                                                            1750
                                    Total packet received




                                                            1700
                                                            1650
                                                            1600
                                                                                                      Total packet received
                                                            1550
                                                            1500
                                                            1450
                                                            1400
                                                            1350
                                                                    1          2            3
                                                                        No of experiment




2.        Average end to end delay
In these graph the average end to end delay in Non-Mobility is 1.0376 bits per second, in Mobility model 1.05274 bits
per second, in design Mobility .90688 bits per second were found. So we have to find minimum delay in design mobility
model.




                                                                              Avg end to end Delay

                                                             1.1
                                    Avg end to end Delay




                                                            1.05

                                                              1

                                                            0.95                                      Avg end to end Delay

                                                             0.9

                                                            0.85

                                                             0.8
                                                                    1          2            3
                                                                        No of experiment




3.        Throughput
In these graph the Throughput- in Non-mobility model 2195 bits per second, in mobility model 2062 bits per second, in
Design mobility model 2387 bits per second were found. We have to find maximum Throughput in Design mobility
model.




                                                                                       5
Improvement the Performance Of Mobility Pattern In Mobile Ad-Hoc Sensor Network




                                                                                                   Throughput

                                                                 2500
                                                                 2400
                                                                 2300




                                    Throughput
                                                                 2200
                                                                                                                                Throughput
                                                                 2100
                                                                 2000
                                                                 1900
                                                                 1800
                                                                                  1                 2                3
                                                                                            No of experiment




4.        Average jitter
In these graph the average Jitter – in Non-mobility model 0.419833 bits per second, in mobility model 0.418002 bits per
second, in Design mobility model 0.374959 bits per second were found. So the average Jitter in design mobility is
minimum.




                                                                                                   Avg jitter

                                                                       0.43
                                                                       0.42
                                                                       0.41
                                       Avg jitter




                                                                        0.4
                                                                       0.39                                                    Avg jitter
                                                                       0.38
                                                                       0.37
                                                                       0.36
                                                                       0.35
                                                                                      1             2            3
                                                                                          No of e x pe rime nt




5.       Signal received but with error
On physical Layer the Signal received but with error in Non-mobility model 45.2727, in mobility model 58.6364, in
Design mobility model 18.2727 were found. So we have to find signal received but with error is minimum in Design
mobility model.




                                                                                      Signal received but with error

                                                                       70
                                       Signal recived but with error




                                                                       60
                                                                       50
                                                                       40                                                Signal received
                                                                       30                                                but with error

                                                                       20
                                                                       10
                                                                        0
                                                                              1                2            3
                                                                              No of experiment




                                                                                                        6
Improvement the Performance Of Mobility Pattern In Mobile Ad-Hoc Sensor Network

                                                 VIII.      CONCLUSION
          We have to find that in the Design mobility model packet loss, end to end delay, Average jitter ,Signal
received but with error are minimum and Throughput is maximum in comparison of mobility and non mobility model. So
design mobility model is better in comparisons of other two models.

                                                       REFERENCES
[1].    H. Cam, S. Ozdemir, P. Nair, and D. Muthuavinashiappan, “ESPDA: Energy -Efficient and Secure Pattern-based Data
        Aggregation for Wireless Sensor Networks”, in Proceedings of IEEE Sensor- The Second IEEE Conference on Sensors,
        Toronto, Canada, Oct. 22-24, 2003, pp. 732-736.
[2].    M. Sanchez, P.M. Anejos, A java based simulator for ad-hoc networks, Future Generation Computer Systems, 17(5):573-583,
        2001.
[3].    D.B. Johnson, D.A. Maltz, Dynamic source routing in ad hoc wireless networks, in mobile Computing, edited by Tomasz
        Imielinski and Hank Korth, Chapter 5, pages 153-181, Kluwer Academic Publishers, 1996.
[4].    E. Royer, P.M. Melliar-Smith, L. Moser, An analysis of the optimum node density for ad hoc mobile networks, Proceedings of
        the IEEE International Conference on Communications (ICC), 2001.
[5].    A.K. Saha. D.B. Johnson, Modeling mobility for vehicular ad hoc networks, Appeared as a poster in the First ACM Workshop
        on Vehicular Ad Hoc Networks (VANET'04), Philadelphia, Pennsylvania, Oct, 2004.
[6].    Y. Lu, H. Lin, Y. Gu. A. Helmy, towards mobility-rich analysis in ad hoc networks: using contraction, expansion and hybrid
        models, USC Technical Report. Mar. 2004.
[7].    T. Camp, J. Boleng, V. Davies, A survey of mobility for ad hoc network research, Wireless Communication and Mobile
        Computing (WCMC): Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications, pp. 483 -502, 2002.
[8].    J.W. Wilson, The importance of mobility model assumptions on route discovery, data delivery, and route maintenance protocols
        for ad hoc mobile networks, Virginia Polytechnic Institute and State University, Dec, 2001.
[9].    D.S. Tan, S. Zhou, J. Ho, J.S. Mehta, H. Tanabe, Design and evaluation of an individually simulated mobility model in wireless
        ad hoc networks, Proceedings of Communication Networks and Distributed Systems Modeling and Simulation Conf., San
        Antonio, TX, 2002.
[10].    D. Shukla, Mobility models in ad hoc networks, Master's thesis, KRESIT-ITT Bombay, Nov, 2001.
[11].    ZigBee Specification, Document 053474r17 (2008)
[12].   Karen Wang, Baochun Li, "Group Mobility and Partition Prediction in Wireless Ad-hoc Networks," Proceedings of
        IEEE International Conference on Communications, Vol. 2, pp. 1017-1021, Apr. 2002
[13].   L. Feeney, B. Ahlgren, and A. Westerlund, "Spontaneous networking: An Application-             oriented Approach to Ad Hoc
        Networking", IEEE Communications Magazine, pp. 176-181, June 2001.
[14].   B. Kwak, N. Song, L. E. Miller, A Mobility measure for mobile ad-hoc networks, Proceedings of Military Communications
        Conf. MILCOM'03, Boston MA, Oct, 2003.
[15].   E. Shi and A. Perrig, "Designing Secure Sensor Networks", IEEE WirelessCommunications Magazine, pp. 38-43, December
        2004.
[16].   Y. Law, S. Dulman, S. Etalle , "Assessing Security-Critical Energy-Efficient Sensor Networks", Department of Computer
        Science, University of Twente, Tech. Rep. TR-CTIT-02-18, 2002.
[17].   S. Mahlknecht and M. Rotzer, "Energy-Self-Sufficient Wireless Sensor Networks",Technical University of Vienna, Tech. Rep.,
        2005
[18].   P. Ganesan, R. Venugopalan, P. Peddabachagari “Analyzing and Modeling Encryption Overhead for Sensor Network Nodes",
        Proceedings of the r d ACM international conference on Wireless sensor networks and applications, San Diego, USA, 2003.




                                                                 7

Mais conteúdo relacionado

Mais procurados

An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...IRJET Journal
 
An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...
 An Efficient Approach for Data Gathering and Sharing with Inter Node Communi... An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...
An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...cscpconf
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...IRJET Journal
 
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...Alexander Decker
 
5.a robust frame of wsn utilizing localization technique 36-46
5.a robust frame of wsn utilizing localization technique  36-465.a robust frame of wsn utilizing localization technique  36-46
5.a robust frame of wsn utilizing localization technique 36-46Alexander Decker
 
Analysis and Performance evaluation of Traditional and Hierarchal Sensor Network
Analysis and Performance evaluation of Traditional and Hierarchal Sensor NetworkAnalysis and Performance evaluation of Traditional and Hierarchal Sensor Network
Analysis and Performance evaluation of Traditional and Hierarchal Sensor NetworkIJMER
 
Secure Spectrum Sensing In Cognitive Radio Sensor Networks: A Survey
Secure Spectrum Sensing In Cognitive Radio Sensor Networks: A SurveySecure Spectrum Sensing In Cognitive Radio Sensor Networks: A Survey
Secure Spectrum Sensing In Cognitive Radio Sensor Networks: A Surveyijceronline
 
Chapter 5 applications of neural networks
Chapter 5           applications of neural networksChapter 5           applications of neural networks
Chapter 5 applications of neural networksPunit Saini
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 
Priority Based Spectrum Sensing and Security System using Radio Cognitive Net...
Priority Based Spectrum Sensing and Security System using Radio Cognitive Net...Priority Based Spectrum Sensing and Security System using Radio Cognitive Net...
Priority Based Spectrum Sensing and Security System using Radio Cognitive Net...IJASRD Journal
 
IRJET- An Hybrid Approach for Enhancement of Energy and Network Life Time...
IRJET-  	  An Hybrid Approach for Enhancement of Energy and Network Life Time...IRJET-  	  An Hybrid Approach for Enhancement of Energy and Network Life Time...
IRJET- An Hybrid Approach for Enhancement of Energy and Network Life Time...IRJET Journal
 
A Review on Architecture, Issues, Challenges and Applications in Underwater W...
A Review on Architecture, Issues, Challenges and Applications in Underwater W...A Review on Architecture, Issues, Challenges and Applications in Underwater W...
A Review on Architecture, Issues, Challenges and Applications in Underwater W...ijtsrd
 
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...IJMER
 
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET Journal
 
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...ijtsrd
 
Wireless Sensor Network Simulators: A Survey and Comparisons
Wireless Sensor Network Simulators: A Survey and ComparisonsWireless Sensor Network Simulators: A Survey and Comparisons
Wireless Sensor Network Simulators: A Survey and ComparisonsCSCJournals
 
IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNCJournal
 

Mais procurados (20)

An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
 
An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...
 An Efficient Approach for Data Gathering and Sharing with Inter Node Communi... An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...
An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
 
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...
 
5.a robust frame of wsn utilizing localization technique 36-46
5.a robust frame of wsn utilizing localization technique  36-465.a robust frame of wsn utilizing localization technique  36-46
5.a robust frame of wsn utilizing localization technique 36-46
 
Analysis and Performance evaluation of Traditional and Hierarchal Sensor Network
Analysis and Performance evaluation of Traditional and Hierarchal Sensor NetworkAnalysis and Performance evaluation of Traditional and Hierarchal Sensor Network
Analysis and Performance evaluation of Traditional and Hierarchal Sensor Network
 
Secure Spectrum Sensing In Cognitive Radio Sensor Networks: A Survey
Secure Spectrum Sensing In Cognitive Radio Sensor Networks: A SurveySecure Spectrum Sensing In Cognitive Radio Sensor Networks: A Survey
Secure Spectrum Sensing In Cognitive Radio Sensor Networks: A Survey
 
Chapter 5 applications of neural networks
Chapter 5           applications of neural networksChapter 5           applications of neural networks
Chapter 5 applications of neural networks
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
0512ijdps26
0512ijdps260512ijdps26
0512ijdps26
 
Priority Based Spectrum Sensing and Security System using Radio Cognitive Net...
Priority Based Spectrum Sensing and Security System using Radio Cognitive Net...Priority Based Spectrum Sensing and Security System using Radio Cognitive Net...
Priority Based Spectrum Sensing and Security System using Radio Cognitive Net...
 
IRJET- An Hybrid Approach for Enhancement of Energy and Network Life Time...
IRJET-  	  An Hybrid Approach for Enhancement of Energy and Network Life Time...IRJET-  	  An Hybrid Approach for Enhancement of Energy and Network Life Time...
IRJET- An Hybrid Approach for Enhancement of Energy and Network Life Time...
 
A Review on Architecture, Issues, Challenges and Applications in Underwater W...
A Review on Architecture, Issues, Challenges and Applications in Underwater W...A Review on Architecture, Issues, Challenges and Applications in Underwater W...
A Review on Architecture, Issues, Challenges and Applications in Underwater W...
 
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
 
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
 
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
Wireless Sensor Network Based Clustering Architecture for Cooperative Communi...
 
Wireless Sensor Network Simulators: A Survey and Comparisons
Wireless Sensor Network Simulators: A Survey and ComparisonsWireless Sensor Network Simulators: A Survey and Comparisons
Wireless Sensor Network Simulators: A Survey and Comparisons
 
M.tech projects 2012 13
M.tech projects 2012 13M.tech projects 2012 13
M.tech projects 2012 13
 
Ijnsa050204
Ijnsa050204Ijnsa050204
Ijnsa050204
 
IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!
 

Destaque

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 

Destaque (9)

www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 

Semelhante a www.ijerd.com

Mobility_Research_paper
Mobility_Research_paperMobility_Research_paper
Mobility_Research_paperPiyush Jalan
 
Performance Evaluation of Mini-sinks Mobility Using Multiple Paths in Wireles...
Performance Evaluation of Mini-sinks Mobility Using Multiple Paths in Wireles...Performance Evaluation of Mini-sinks Mobility Using Multiple Paths in Wireles...
Performance Evaluation of Mini-sinks Mobility Using Multiple Paths in Wireles...CSCJournals
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
 
IEEE Mobile computing Title and Abstract 2016
IEEE Mobile computing Title and Abstract 2016 IEEE Mobile computing Title and Abstract 2016
IEEE Mobile computing Title and Abstract 2016 tsysglobalsolutions
 
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...Editor IJMTER
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Networkijtsrd
 
Communication cost minimization in wireless sensor and actor networks for roa...
Communication cost minimization in wireless sensor and actor networks for roa...Communication cost minimization in wireless sensor and actor networks for roa...
Communication cost minimization in wireless sensor and actor networks for roa...ambitlick
 
emerging_2015_3_20_50041
emerging_2015_3_20_50041emerging_2015_3_20_50041
emerging_2015_3_20_50041Hanin Almutairi
 
Iaetsd use of mobile communication in data-intensive
Iaetsd use of mobile communication in data-intensiveIaetsd use of mobile communication in data-intensive
Iaetsd use of mobile communication in data-intensiveIaetsd Iaetsd
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkijwmn
 
A Survey on routing protocols for mobile sink based WSN
A Survey on routing protocols for mobile sink based WSNA Survey on routing protocols for mobile sink based WSN
A Survey on routing protocols for mobile sink based WSNIRJET Journal
 
Energy-Balanced Dispatch of Mobile Sensors in a Hybrid Wireless Sensor Network
Energy-Balanced Dispatch of Mobile Sensors in a Hybrid Wireless Sensor NetworkEnergy-Balanced Dispatch of Mobile Sensors in a Hybrid Wireless Sensor Network
Energy-Balanced Dispatch of Mobile Sensors in a Hybrid Wireless Sensor Networkambitlick
 
Advancement in VANET Routing by Optimize the Centrality with ANT Colony Approach
Advancement in VANET Routing by Optimize the Centrality with ANT Colony ApproachAdvancement in VANET Routing by Optimize the Centrality with ANT Colony Approach
Advancement in VANET Routing by Optimize the Centrality with ANT Colony Approachijceronline
 
DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...
DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...
DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...IJNSA Journal
 
Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsIOSR Journals
 

Semelhante a www.ijerd.com (20)

Mobility_Research_paper
Mobility_Research_paperMobility_Research_paper
Mobility_Research_paper
 
Performance Evaluation of Mini-sinks Mobility Using Multiple Paths in Wireles...
Performance Evaluation of Mini-sinks Mobility Using Multiple Paths in Wireles...Performance Evaluation of Mini-sinks Mobility Using Multiple Paths in Wireles...
Performance Evaluation of Mini-sinks Mobility Using Multiple Paths in Wireles...
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
 
IEEE Mobile computing Title and Abstract 2016
IEEE Mobile computing Title and Abstract 2016 IEEE Mobile computing Title and Abstract 2016
IEEE Mobile computing Title and Abstract 2016
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...
 
Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
Opportunistic Routing in Delay Tolerant Network with Different Routing AlgorithmOpportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
 
Communication cost minimization in wireless sensor and actor networks for roa...
Communication cost minimization in wireless sensor and actor networks for roa...Communication cost minimization in wireless sensor and actor networks for roa...
Communication cost minimization in wireless sensor and actor networks for roa...
 
emerging_2015_3_20_50041
emerging_2015_3_20_50041emerging_2015_3_20_50041
emerging_2015_3_20_50041
 
Iaetsd use of mobile communication in data-intensive
Iaetsd use of mobile communication in data-intensiveIaetsd use of mobile communication in data-intensive
Iaetsd use of mobile communication in data-intensive
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
 
C04953540
C04953540C04953540
C04953540
 
A Survey on routing protocols for mobile sink based WSN
A Survey on routing protocols for mobile sink based WSNA Survey on routing protocols for mobile sink based WSN
A Survey on routing protocols for mobile sink based WSN
 
Energy-Balanced Dispatch of Mobile Sensors in a Hybrid Wireless Sensor Network
Energy-Balanced Dispatch of Mobile Sensors in a Hybrid Wireless Sensor NetworkEnergy-Balanced Dispatch of Mobile Sensors in a Hybrid Wireless Sensor Network
Energy-Balanced Dispatch of Mobile Sensors in a Hybrid Wireless Sensor Network
 
Advancement in VANET Routing by Optimize the Centrality with ANT Colony Approach
Advancement in VANET Routing by Optimize the Centrality with ANT Colony ApproachAdvancement in VANET Routing by Optimize the Centrality with ANT Colony Approach
Advancement in VANET Routing by Optimize the Centrality with ANT Colony Approach
 
T0440899104
T0440899104T0440899104
T0440899104
 
DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...
DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...
DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...
 
C1804011117
C1804011117C1804011117
C1804011117
 
Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network Models
 

Mais de IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 
Seismic Drift Consideration in soft storied RCC buildings: A Critical Review
Seismic Drift Consideration in soft storied RCC buildings: A Critical ReviewSeismic Drift Consideration in soft storied RCC buildings: A Critical Review
Seismic Drift Consideration in soft storied RCC buildings: A Critical ReviewIJERD Editor
 
Post processing of SLM Ti-6Al-4V Alloy in accordance with AMS 4928 standards
Post processing of SLM Ti-6Al-4V Alloy in accordance with AMS 4928 standardsPost processing of SLM Ti-6Al-4V Alloy in accordance with AMS 4928 standards
Post processing of SLM Ti-6Al-4V Alloy in accordance with AMS 4928 standardsIJERD Editor
 
Treatment of Waste Water from Organic Fraction Incineration of Municipal Soli...
Treatment of Waste Water from Organic Fraction Incineration of Municipal Soli...Treatment of Waste Water from Organic Fraction Incineration of Municipal Soli...
Treatment of Waste Water from Organic Fraction Incineration of Municipal Soli...IJERD Editor
 
Content Based Video Retrieval Using Integrated Feature Extraction and Persona...
Content Based Video Retrieval Using Integrated Feature Extraction and Persona...Content Based Video Retrieval Using Integrated Feature Extraction and Persona...
Content Based Video Retrieval Using Integrated Feature Extraction and Persona...IJERD Editor
 
Planar Internal Antenna Design for Cellular Applications & SAR Analysis
Planar Internal Antenna Design for Cellular Applications & SAR AnalysisPlanar Internal Antenna Design for Cellular Applications & SAR Analysis
Planar Internal Antenna Design for Cellular Applications & SAR AnalysisIJERD Editor
 

Mais de IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 
Seismic Drift Consideration in soft storied RCC buildings: A Critical Review
Seismic Drift Consideration in soft storied RCC buildings: A Critical ReviewSeismic Drift Consideration in soft storied RCC buildings: A Critical Review
Seismic Drift Consideration in soft storied RCC buildings: A Critical Review
 
Post processing of SLM Ti-6Al-4V Alloy in accordance with AMS 4928 standards
Post processing of SLM Ti-6Al-4V Alloy in accordance with AMS 4928 standardsPost processing of SLM Ti-6Al-4V Alloy in accordance with AMS 4928 standards
Post processing of SLM Ti-6Al-4V Alloy in accordance with AMS 4928 standards
 
Treatment of Waste Water from Organic Fraction Incineration of Municipal Soli...
Treatment of Waste Water from Organic Fraction Incineration of Municipal Soli...Treatment of Waste Water from Organic Fraction Incineration of Municipal Soli...
Treatment of Waste Water from Organic Fraction Incineration of Municipal Soli...
 
Content Based Video Retrieval Using Integrated Feature Extraction and Persona...
Content Based Video Retrieval Using Integrated Feature Extraction and Persona...Content Based Video Retrieval Using Integrated Feature Extraction and Persona...
Content Based Video Retrieval Using Integrated Feature Extraction and Persona...
 
Planar Internal Antenna Design for Cellular Applications & SAR Analysis
Planar Internal Antenna Design for Cellular Applications & SAR AnalysisPlanar Internal Antenna Design for Cellular Applications & SAR Analysis
Planar Internal Antenna Design for Cellular Applications & SAR Analysis
 

Último

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Último (20)

Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

www.ijerd.com

  • 1. International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 3 (June 2012), PP.01-07 www.ijerd.com Improvement the Performance Of Mobility Pattern In Mobile Ad-Hoc Sensor Network using Qualnet 5.0 Manoj Rana1, Shubham Kumar2Upasana Sharma3, 1 Assistant Professor and Head of Department, Computer Science Engineering Department, College of Engineering and Rural Technology Meerut, India 2 Assistant Professor, Computer Science Engineering Department, College of Engineering and Rural Technology Meerut, India 3 Assistant Professor, Computer Science Engineering Department, Amity University Noida, India. Abstract––A mobile ad-hoc sensor network usually consists of large number of sensor nodes (stationary or mobile) deployed over an area to be monitored. Each sensor node is a self-contained, battery-powered device that is capable of sensing, communication and some level of computation and data processing. Due to the large amount usage of sensors in the network, it is important to keep each node small and inexpensive. This strictly restricts its resources in terms of energy, memory, processing speed bandwidth. We simulate the Mobile ad-hoc sensor network for its performance analysis. we introduced the concept of communication range remoteness for mobile nodes through random way point mobility model. We characterized the mobility of nodes with new mobility patterns through AODV protocol, without breaking the backward compatibility with earlier versions. In this paper we will proposed two model as non mobility model and mobility model. And in this paper we will compare both models using the concept of mobile ad-hoc sensor network. The performance through the multiple node of non mobility model was found better in comparison of mobility model. . than we design the concept of antenna and improve the frequency of transmitting signal for mobility model,this model is known as design mobility model. In this paper we improve the performance of design mobility in comparison of non mobility model and mobility model. The performance analysis of mobility and non-mobility and design mobility model is done through simulations on a commercial simulator called Qualnet version 5.0, software that provides scalable simulations of Wireless networks. Keywords––AODV, CBR, LRPAN, WSN, FFD, RFD, Zig Bee. I. INTRODUCTION A wireless sensor network usually consists of a large number of sensor nodes (stationary or mobile) deployed over an area to be monitored. Each sensor node is a self-contained, battery-powered device that is capable of sensing, communication and some level of computation and data processing. Due to the large amount usage of sensors in the network, it is important to keep each node small and inexpensive. This strictly restricts its resources in terms of energy, memory, processing speed and bandwidth. A wireless sensor network (WSN) is a wireless computer network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants, at different locations. A sensor, in its simplest definition, is a device that is capable of observing and recording a phenomenon. This is termed as sensing. Sensors are used in various applications such as industry, military, healthcare, disaster relief, meteorology, etc. For example, sensors are used to study the formation of tornadoes by measuring the pressure, humidity, temperature, and wind direction when a tornado occurs. In rescue operations, seismic sensors are used to detect survivors caught in landslides and earthquakes. With advances in electronics, sensors now have the capability to sense, process, and communicate data. These small- sized sensor nodes have low cost, low power needs, and the ability to communicate over short distances. This has led to the development of sensor networks, which capitalize on the sensor node's ability to communicate. A sensor network consists of possibly several hundred sensor nodes, deployed in close proximity to the phenomenon that they are designed to observe. The position of sensor nodes within a sensor network need not be pre-determined. Sensor networks must have the robustness to work in extreme environmental conditions with scarce or zero interference from humans. This also means that they should be able to overcome frequent node failures. In this paper sensor node are mobiles deployed over the area so it is called mobile ad-hoc sensor network. II. OVERVIEW OF CURRENT LITERATURE Some of the most important properties of a mobile user population are the characteristics and pattern of the user mobility. In simulating mobile systems, it is important to use a realistic mobility model so that the evaluation results from the simulation correctly indicate the real world performance of the system. A.K. Saha and D.B. Johnson [5] proposed a realistic model of node motion based on vehicular traffic, suitable for evaluating vehicular ad hoc networks. Y. Lu, H. Lin, Y. Gu, and A. Helmy [6] classified various mobility models, in addition to proposing the contraction, expansion, circling, hybrid contraction and random waypoint and hybrid Manhattan and RWP mobility models. These models covered scenarios in which nodes merge, scatter or switch to different mobility patterns over time. Mobility metrics like, node degree, link duration, relative speed, temporal dependence, and spatial dependence are studied to differentiate the characteristics of proposed and existing mobility models. They showed that average node degree and link duration are very useful in capturing mobility dynamics. 1
  • 2. Improvement the Performance Of Mobility Pattern In Mobile Ad-Hoc Sensor Network T. Camp, J. Boleng, and V. Davies [7] investigated characteristics of different mobility models including random walk, random waypoint, random direction, and reference point group mobility model. They compared these mobility models using mobility metrics like data packet delivery ratio, average end to end delay, average hop count, control packet transmissions per data packet delivered and control byte transmissions per data packet delivered against average node speed. But the problem with this is that if the nodes are moving in the same direction with the same speed so we cannot have a better idea of the mobility of nodes as they seem static with respect to each other. J. W. Wilson [8] combined several features of the existing individual and group mobility models to explore the sensitivity of routing protocol performance, to mobility patterns. Reference point group mobility model is combined with mobility vector model and the resulted model is used to examine sensitivity of existing ad hoc routing protocols, to changes in mobility generated by that model. Basic approach used is that, objects in real world react to accelerations. At each interval time in simulation, individual participant positions are calculated and their velocity vectors are adjusted. For different network participants maximum throughput is plotted against maximum velocity and a decrease in throughput is observed with increase in maximum participant velocity. This is due to the increased number of broken links due to increased average participant velocity. But for different mobility models we can have different link change rate and if nodes are moving with same velocity, we cannot have better idea of mobility. There are two possible approaches to tackle the problem of designing realistic and reproducible mobility and communication models. In the first approach, mobility models are created that most closely represent the real world, after conceiving actual use of the systems. Although this approach guarantees realistic and relevant models but it could potentially lead to overly complex models that are hard to analyze. In the second approach, such models are created much like the creation of benchmark programs for computer systems. D.S. Tan, S. Zhou, J. Ho, J.S. Mehta, and H. Tanabe [9] used a combination of the two approaches and presented a general purpose method that may be used to reliably generate realistic mobility patterns with different characteristics. D. Shukla [10] investigated different mobility models and uses mobility parameters: average speed and distance traveled, transmission range and link changes, against average speed, to compare them III. ARCHITECTURE The concept of wireless sensor networks is based on a simple equation: Sensing + CPU + Radio = Thousands of potential applications As soon as people understand the capabilities of a wireless sensor network, hundreds of applications spring to mind. It seems like a straightforward combination of modern technology. However, actually combining sensors, radios, and CPU’s into an effective wireless sensor network requires a detailed understanding of the both capabilities and limitations of each of the underlying hardware components, as well as a detailed understanding of modern networking technologies and distributed systems theory. IV. MOBILITY MODEL STRATEGIES In WSNs, three different types of mobility have been suggested: random, predictable or fixed, and controlled. Rand om Mobility Random-walk mobility is assumed to be independent of the network topology, traffic flows and residual energy of nodes. Predictable Mobility The predictable or fixed trajectory of a mobile sink is fully deterministic as the sink always follows the same path through the network. In some cases, the path actually selected is, in fact, enforced by artificial or natural obstacles in the environment. One should observe that both in the case of random and predictable mobility, the actual speed of the sink can influence the amount of control data generated in the network, possibly limiting the benefits of sink mobility. Controlled Mobility In the case of controlled mobility, the path of the sink becomes a function of the current state of network flows and nodes’ energy consumption, and it keeps adjusting itself to ensure optimal network performance at all times. From the application perspective, controlled mobility can find its use in both continuous and event -base WSNs. V. SIMULATION ENVIRONMENT Performance evaluation of wireless ad-hoc sensor networks is done through simulations on a provides scalable simulations of Wireless networks. In our simulation, we consider a mobile ad-hoc sensor network with 10 mobile nodes and a statically placed data sink (root node). Data sink node (1) is a full function device and work as a PAN Coordinator. Here we used IEEE 802.15.4, wireless standard for PHY and MAC layer, non commercial simulator called Qualnet version 5.0, software Mobility Model and mobility model for the mobile nodes and AODV (Ad hoc On-Demand Distance Vector) routing. We take the Scenario for multiple events occurring simultaneously at a time. We are transmitting 300 packets for per events. In the model the components used are: 1 Wireless subnet 2 10 mobile nodes and a statically placed data sink (root node). 3 CBR traffic flow. 2
  • 3. Improvement the Performance Of Mobility Pattern In Mobile Ad-Hoc Sensor Network Wireless Subnet: White cloud in the n/w is ZigBee subnet. This subnet is responsible for giving ZigBee properties to all the nodes. Nodes: we consider a mobile ad-hoc sensor network with 10 mobile nodes and a statically placed data sink (root node). Data sink node (1) is a full function device and work as a PAN Coordinator. Trffic Flow: We used the application of constant bit rate (CBR).We have taken node 2,3,4,5,6,7,8,910,11 as source and node 1 is taken in Scenario as sink node. We will send 300 packet of each size 50 bytes at start 1s. We have send all packet at 1s interval of time and ending time of simulation is 301s. 1 Physical layer parameters:The parameters used to configure PHY802.15.4 for FFD and RFD are Table 1.1 Physical layer parameter Physical layer Parameter Radio type 802.15.4 Radio Transmission Power 3 db Packet Reception Model Phy 802.15.4 Modulation Scheme O-QPSK CCA Mode Carrier sense 2 MAC Layer Parameters: The parameters used to configure MAC802.16e for FFD and RFD are: Mac layer parameter Mac protocol 802.15.4 Device type RFD(2-10) Device type FFD(1) FFD mode Pan Co-ordinator Network layer parameters: At network layer IPv4 queue type is FIFO (First in First Out). AODV algorithm is used as routing protocol. Application layer parameters: Constant bit rate application is run with packet size of 50 bytes and inter packet interval of 1s. Packet transmission starts at 1s and continue till end of simulation. Scenario: In the model the components used are Wireless subnet, nodes configured and CBR traffic flow. Simulation parameters as shown below in table and all remaining parameters are by default. VI. SIMULATION RESULTS ANALYSIS Non Mobility Model: In this model sensor nodes and pan co-coordinator both are static. In the performance evaluation of a protocol for a wireless sensor network, the protocol should be tested under realistic conditions including, but limited to a sensible transmission range, limited buffer space for the storage of messages, representative data traffic models, and realistic no movements of the mobile users (i.e., a non mobility model). This model is a journey through non mobility models that are used in the simulations of mobile Ad-hoc sensor networks. Here the descriptions of non mobility models that represent mobile nodes whose movements are static. 3
  • 4. Improvement the Performance Of Mobility Pattern In Mobile Ad-Hoc Sensor Network Running Scenarios for Non Mobility Model Mobility Models: In this model sensor nodes are dynamic and pan co-coordinator are static In the performance evaluation of a protocol for a wireless sensor network, the protocol should be tested under realistic conditions including, but not limited to, a sensible transmission range, limited buffer space for the storage of messages, representative data traffic models, and realistic movements of the mobile users (i.e., a mobility model). This model is a journey through mobility models that are used in the simulations of mobile Ad-hoc sensor networks. Here the descriptions of mobility models that represent mobile nodes whose movements are independent of each other (i.e., entity Mobility models) and mobility models that represent mobile nodes whose movements are dependent on each other (i.e., group mobility models). Running Scenarios for Mobility Model Design Mobility Model: In this model we have to design antenna so that the frequency of transmitting signal may be improved. Running Scenarios for design Mobility Model 4
  • 5. Improvement the Performance Of Mobility Pattern In Mobile Ad-Hoc Sensor Network VII. GRAPHICAL RESULT We compared these mobility models using mobility metrics like total packet received, average end to end delay, throughput, average jitter, signal received but with error. Now we will show one by one all case and also we will give conclusion of this paper. 1. Total Packet Received In these graph we want to show that in Non-Mobility model we have received total 1618 packets, in mobility model 1518 packets, in design Mobility model 1756 packets. In graph 1, 2, 3 in x-Axis shows- 1 for experiment no 1 Non-Mobility model, 2 for Mobility model, 3 for design Mobility. After compare three case we have to find that design Mobility received maximum packets. Total packet received 1800 1750 Total packet received 1700 1650 1600 Total packet received 1550 1500 1450 1400 1350 1 2 3 No of experiment 2. Average end to end delay In these graph the average end to end delay in Non-Mobility is 1.0376 bits per second, in Mobility model 1.05274 bits per second, in design Mobility .90688 bits per second were found. So we have to find minimum delay in design mobility model. Avg end to end Delay 1.1 Avg end to end Delay 1.05 1 0.95 Avg end to end Delay 0.9 0.85 0.8 1 2 3 No of experiment 3. Throughput In these graph the Throughput- in Non-mobility model 2195 bits per second, in mobility model 2062 bits per second, in Design mobility model 2387 bits per second were found. We have to find maximum Throughput in Design mobility model. 5
  • 6. Improvement the Performance Of Mobility Pattern In Mobile Ad-Hoc Sensor Network Throughput 2500 2400 2300 Throughput 2200 Throughput 2100 2000 1900 1800 1 2 3 No of experiment 4. Average jitter In these graph the average Jitter – in Non-mobility model 0.419833 bits per second, in mobility model 0.418002 bits per second, in Design mobility model 0.374959 bits per second were found. So the average Jitter in design mobility is minimum. Avg jitter 0.43 0.42 0.41 Avg jitter 0.4 0.39 Avg jitter 0.38 0.37 0.36 0.35 1 2 3 No of e x pe rime nt 5. Signal received but with error On physical Layer the Signal received but with error in Non-mobility model 45.2727, in mobility model 58.6364, in Design mobility model 18.2727 were found. So we have to find signal received but with error is minimum in Design mobility model. Signal received but with error 70 Signal recived but with error 60 50 40 Signal received 30 but with error 20 10 0 1 2 3 No of experiment 6
  • 7. Improvement the Performance Of Mobility Pattern In Mobile Ad-Hoc Sensor Network VIII. CONCLUSION We have to find that in the Design mobility model packet loss, end to end delay, Average jitter ,Signal received but with error are minimum and Throughput is maximum in comparison of mobility and non mobility model. So design mobility model is better in comparisons of other two models. REFERENCES [1]. H. Cam, S. Ozdemir, P. Nair, and D. Muthuavinashiappan, “ESPDA: Energy -Efficient and Secure Pattern-based Data Aggregation for Wireless Sensor Networks”, in Proceedings of IEEE Sensor- The Second IEEE Conference on Sensors, Toronto, Canada, Oct. 22-24, 2003, pp. 732-736. [2]. M. Sanchez, P.M. Anejos, A java based simulator for ad-hoc networks, Future Generation Computer Systems, 17(5):573-583, 2001. [3]. D.B. Johnson, D.A. Maltz, Dynamic source routing in ad hoc wireless networks, in mobile Computing, edited by Tomasz Imielinski and Hank Korth, Chapter 5, pages 153-181, Kluwer Academic Publishers, 1996. [4]. E. Royer, P.M. Melliar-Smith, L. Moser, An analysis of the optimum node density for ad hoc mobile networks, Proceedings of the IEEE International Conference on Communications (ICC), 2001. [5]. A.K. Saha. D.B. Johnson, Modeling mobility for vehicular ad hoc networks, Appeared as a poster in the First ACM Workshop on Vehicular Ad Hoc Networks (VANET'04), Philadelphia, Pennsylvania, Oct, 2004. [6]. Y. Lu, H. Lin, Y. Gu. A. Helmy, towards mobility-rich analysis in ad hoc networks: using contraction, expansion and hybrid models, USC Technical Report. Mar. 2004. [7]. T. Camp, J. Boleng, V. Davies, A survey of mobility for ad hoc network research, Wireless Communication and Mobile Computing (WCMC): Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications, pp. 483 -502, 2002. [8]. J.W. Wilson, The importance of mobility model assumptions on route discovery, data delivery, and route maintenance protocols for ad hoc mobile networks, Virginia Polytechnic Institute and State University, Dec, 2001. [9]. D.S. Tan, S. Zhou, J. Ho, J.S. Mehta, H. Tanabe, Design and evaluation of an individually simulated mobility model in wireless ad hoc networks, Proceedings of Communication Networks and Distributed Systems Modeling and Simulation Conf., San Antonio, TX, 2002. [10]. D. Shukla, Mobility models in ad hoc networks, Master's thesis, KRESIT-ITT Bombay, Nov, 2001. [11]. ZigBee Specification, Document 053474r17 (2008) [12]. Karen Wang, Baochun Li, "Group Mobility and Partition Prediction in Wireless Ad-hoc Networks," Proceedings of IEEE International Conference on Communications, Vol. 2, pp. 1017-1021, Apr. 2002 [13]. L. Feeney, B. Ahlgren, and A. Westerlund, "Spontaneous networking: An Application- oriented Approach to Ad Hoc Networking", IEEE Communications Magazine, pp. 176-181, June 2001. [14]. B. Kwak, N. Song, L. E. Miller, A Mobility measure for mobile ad-hoc networks, Proceedings of Military Communications Conf. MILCOM'03, Boston MA, Oct, 2003. [15]. E. Shi and A. Perrig, "Designing Secure Sensor Networks", IEEE WirelessCommunications Magazine, pp. 38-43, December 2004. [16]. Y. Law, S. Dulman, S. Etalle , "Assessing Security-Critical Energy-Efficient Sensor Networks", Department of Computer Science, University of Twente, Tech. Rep. TR-CTIT-02-18, 2002. [17]. S. Mahlknecht and M. Rotzer, "Energy-Self-Sufficient Wireless Sensor Networks",Technical University of Vienna, Tech. Rep., 2005 [18]. P. Ganesan, R. Venugopalan, P. Peddabachagari “Analyzing and Modeling Encryption Overhead for Sensor Network Nodes", Proceedings of the r d ACM international conference on Wireless sensor networks and applications, San Diego, USA, 2003. 7