SlideShare uma empresa Scribd logo
1 de 3
Energy Aware Fault Tolerant Shortest Minded
               Path SPIN (SPMS)
             Nishanth Reddy Kommidi                                            Prajwal Panchmahalkar
          Department Of Computer Science
                                                                          Department Of Computer Science
              Texas Tech University
                                                                               Texas Tech University
               Lubbock, Texas, USA
                                                                               Lubbock, Texas, USA
            nishanth.kommidi@ttu.edu
                                                                          prajwal.panchmahalkar@ttu.edu



Abstract— In this paper we present an energy efficient           remainder of the protocol and data transfer can occur in
data dissemination protocol for efficiently distributing the     multiple hops using the lowest energy level. In this
data through a sensor network. We also consider energy           paper, we propose a protocol called EA-SPMS (Energy
consumption at each and every node in order to balance           Aware SPMS) that balances the load on the relay nodes
the load in the sensor network and maintain energy
                                                                 between source and destination. We achieve this by
efficient data disseminations. This paper works efficiently
even in the face of node and link failures. Our work is
                                                                 using the fact that every node has the information of its
motivated by the SPMS protocol in which every node has a         neighbor’s zone along with its own zone. This protocol
zone defined. If a node requests the data, the data is sent to   is just an extension to SPMS; here also nodes can
the requested node using the shortest path. We propose a         operate at multiple power levels. We run distributed
protocol called EA-SPMS (Energy Aware SPMS) in which             Bellman Ford algorithm among the nodes in the zone, to
every node has a node defined by its maximum                     find out the routes (shortest paths) to other nodes in the
transmission radius and every node has the information of        zone. Each node maintains routes to other nodes in the
its neighbor’s zone and its own zone. The nodes which are        zone and also maintains the energy that it consumes in
in common to the other two neighboring nodes overhears           receiving the ADV, sending the request and then
the transmission messages and react only when the En-bit
                                                                 broadcasting the ADV it its zone neighbors, then
is set i.e. when the calculated energy at each node is less
then threshold value.
                                                                 receiving the request and transmitting the data to the
                                                                 requested node every time it receives the adv message.
    Keywords- Sensor network, energy          efficient, data    Each node calculates the energy that it required to
dissemintaion                                                    process the above scenario. We maintain a fixed energy
                                                                 threshold value throughout the network lifetime. The En-
                    I.  INTRODUCTION                             Bit (Energy Bit) is set accordingly. En-bit set when the
   Wireless Sensor Networks have recently emerged as a           calculated energy at each node is less then threshold
core technology to be applied in home applications,              value.
military applications, and environmental applications.
Sensor nodes are typically battery powered and since
replacing or recharging battery is often very difficult,                II.   RELATED WORK AND MOTIVATION
reducing energy consumption and maintaining a load               A. Related Work
balance between the nodes is an important design                 SPIN
consideration for the sensor networks. Sensor nodes are
used for gathering the data, such physical, environmental        SPIN is proposed to solve the data implosion problem of
conditions from remote areas and disseminating them.             flooding since a node transmits data to its neighbors
   The protocol called SPMS (Shortest Path Minded                irrespective of whether the neighbor already received the
SPIN) which is motivated by SPIN (Sensor Protocols for           data via flooding. Nodes negotiate with their neighbors
                                                                 before transmitting data in SPIN to overcome this
Information     via    Negotiation)    reduces     energy
                                                                 problem. SPIN guarantees only required data will be
consumption and end-to-end delay of SPIN. This was
                                                                 transmitted. SPIN uses high-level data descriptors called
achieved by the fact that nodes can operate at multiple          meta-data in negotiation to determine if a node needs the
power levels and once the meta-data is initiated, the            data prior to real data exchange.
SPIN involves the following steps:                            B. Motivation
   ADV- new data advertisement. A node broadcasts an         SPMS reduces the energy consumption by transmitting
    advertisement message including metadata to its           the data through the shortest path; this may result in
    neighbor nodes.                                           overusing of a specific node, since the shortest path has
   REQ- Request for data. If a node requires the data, it    been already selected. SPMS did not guarantee the
    sends a request message to the sensor node that sent      energy efficiency in the case of node failure, since some
    the advertisement.                                        other nodes in the network can no longer use the shortest
   DATA- Data message. When a node receives the              path. Moreover the relay nodes in SPMS have high
    request message, it transmits the data to the             additional overhead as they have to relay the data
    neighbors that have sent the requests.                    between the source and destination. SPMS did not
SPIN disseminates data throughout the entire network by       provide and solution when the node in shortest path fails
the repeated use these three steps.                           and the SCONE is not in the range of the node.

SPMS
                                                                      III.   DESIGN OF ENERGY AWARE SPMS
SPMS (Shortest Path Minded SPIN) borrows the concept
of meta-data exchange from SPIN, and uses a multi-hop
model for data transmission among the nodes with                  The idea is formed on the basis of the SPMS protocol
variable transmission power levels. In SPMS each node         which implements the idea of three-way hand-shake of
has its own zone. A zone for a node is the region that the    SPIN protocol through metadata exchange and also
node can reach by transmitting at the maximum power           implements the shortest-path routing along with the
level. Each node maintains a routing table for each of its    relaying of intermediate nodes. SPIN however, suffers
neighbors. The Distribute Bellman Ford (DBF) algorithm        from a drawback that nodes that are relaying are
is executed in each zone to form the routes. Each entry of    constantly in communication and have a higher energy
the routing table at each node has a destination field and    overhead due the relaying. The relay nodes have to
the cost of going to the destination through each of its      constantly relay the data between a given pair of source
neighbors.                                                    and destination for communication, and SPMS has not
                                                              considered the energy constraints at relay node.
SPMS involves the following steps:
   It involves a metadata exchange, similar to that in
    SPIN, if a node has a data to send, broadcasts an
    advertisement message to its neighbor nodes in the
    same zone.
   If a node wants the data, it sends a requests message
    through the shortest path.
To send the data through the shortest path, if the adv
message received by the node is not the next hop
neighbor in the computed shortest path., then it should
wait for a certain period of time before sending the
request message. After each node sends a request
message, it receives the data through the shortest path. If
there is no adv message during the fixed period of time,
the node sends the request message to the source node.
        Whenever a node in between the source node and
the destination node fails, the current node sends the           Fig1: A sample network. Each node maintains a
request message to the node, from which it initially          cost table associated with it to reach to its neighbor
received an adv message instead of using the shortest         within the zone along with the cost table of its
path. If a node that broadcasts the adv message fails,        neighbors.
there is no way to receive the data. Therefore, in this
protocol the destination node maintains the primary           In EA-SPMS (Energy Aware SPMS) we consider that
originator node (PRONE) and a secondary Originator            each node maintains the routing tables of costs of the
Node (SCONE). SCONE is the alternative node that can          nodes within its zone along with the cost table tables of
be used to request the data when the PRONE fails.             the neighbors in its zone, which underlies our assumption
                                                              that the overhead of communication is too high than the
                                                              storage overhead .
In EA-SPMS we call the relay nodes as smart relay nodes,      smart relay node overhear the REQ and look up into
which are aware of their own residual energy and the          their tables to check if the destination node and the
energy they have to spend to relay the data between the       PRONE of the node are in its range and if they both are
source and the destination. And based on the energy costs     present these smart relays calculate their own En-Bit and
other nodes in the zone can take over the route if they       if their En-bit is greater than the actual relay node, they
prove effective in energy balance and fault tolerance.        take over the route and send request to the PRONE and
              IV.   THE PROPOSED APPROACH                     energy balance is achieved.

                                                              Also relay nodes doesn’t have to continuously
 When smart-relays get the REQ from the destination           participate in the communication as other relay nodes
they estimate the cost they have to spend in relaying the     can take over the path to balance the energy
data by utilizing the data present in the REQ data; the       consumption among with relay nodes. Through smart-
REQ packet contains the data about the data that is           relay nodes we theoretically assume that the energy load
requested along with the source and destination of the        balance is effectively achieved and the life of the
communication, the smart-relays use this data to calculate    network is increased
the cost and estimate the energy they will be left over
after the relaying and calculate the Energy bit               B. Node Failure case
Er = Ep – (Erec + Et)                                         The node failure case is similar to the energy aware case,
                                                              just the difference is that the no REQ is heard from the
                                                              node, however nodes which are in common zone with
Where,                                                        the failed node, destination node and the PRONE of the
                                                              failed node can overhear the REQ from the destination
Er = energy expected to remain after the relaying.            node and doesn’t hear any REQ from the failed node, so
Ep = energy present at the node at current time ie, when it   they take over the route just as the Energy Aware case.
receives the REQ from the destination node
Erec = Energy needed to spend on receiving the data from       EA-SPMS is effective even in case where if the SCONE
the source.                                                   is not in range of the destination node; as we maintain a
                                                              routing table of neighbors in two-hops it can prove
Et = Energy needed to spend on transmitting the data to       effective beyond SPMS in being more fault tolerant.
the destination node.
Based on the Er value calculated the smart relay node sets
a En-bit (Energy bit) of 4bits which constitute the 10                            V. REFERENCES
levels which we considered for the energy balance in the          1. Negotiation-based protocols for disseminating
relay nodes. The smart relay adds this En-bit in its                 information in wireless sensor networks,
request to its PRONE node. We set a threshold value for              Wireless Networks, 2002, J. Kulik, W.
these En-bits based on which if the En-Bit is below the              Heinzelman, and H. Balakrishnan
threshold value the node which receives this REQ packet           2. Fault    Tolerant   Energy     Aware    Data
goes into a waiting state. Meanwhile the other nodes in              Dissemination Protocol in Sensor Networks,
the range of the smart relay overhear and look up into               DSN 2004, Gunjan Khanna, Saurabh Bagchi,
their tables and calculate if they have more En-bit value            Yu-Sung Wu
than the actual smart-relay in the path and if they have          3. Performance Comparison of SPIN based Push-
more En-bit than the actual node they take over the route
                                                                     Pull Protocols, WCNC 2007, Ravish Khosla,
and send REQ to its PRONE.
                                                                     Xuan Zhong, Gunjan Khanna, Saurabh Bagchi,
A. Energy Aware case                                                 and Edward J. Coyle
The smart relays send the En-bit along with the REQ
packet to its PRONE node, the prone node based on the
En-bit if it is below threshold goes into a waiting state.
Meanwhile the other nodes which are in the range of this

Mais conteúdo relacionado

Mais procurados

Wireless Sensor Grids Energy Efficiency Enrichment Using Quorum Techniques
Wireless Sensor Grids Energy Efficiency Enrichment Using Quorum TechniquesWireless Sensor Grids Energy Efficiency Enrichment Using Quorum Techniques
Wireless Sensor Grids Energy Efficiency Enrichment Using Quorum TechniquesIOSR Journals
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingHabibur Rahman
 
FTTCP: Fault Tolerant Two-level Clustering Protocol for WSN
FTTCP: Fault Tolerant Two-level Clustering Protocol for WSNFTTCP: Fault Tolerant Two-level Clustering Protocol for WSN
FTTCP: Fault Tolerant Two-level Clustering Protocol for WSNIDES Editor
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
 
Performance Analysis of Distributed Spatial Multiplexing with Multi-hop Ampli...
Performance Analysis of Distributed Spatial Multiplexing with Multi-hop Ampli...Performance Analysis of Distributed Spatial Multiplexing with Multi-hop Ampli...
Performance Analysis of Distributed Spatial Multiplexing with Multi-hop Ampli...IJCSEA Journal
 
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...IOSR Journals
 
Power Optimization Technique for Sensor Network
Power Optimization Technique for Sensor NetworkPower Optimization Technique for Sensor Network
Power Optimization Technique for Sensor NetworkEditor IJCATR
 
Secured Data Aggregation using SRL Protocol for Wireless Sensor Networks
Secured Data Aggregation using SRL Protocol for Wireless Sensor NetworksSecured Data Aggregation using SRL Protocol for Wireless Sensor Networks
Secured Data Aggregation using SRL Protocol for Wireless Sensor NetworksAssociate Professor in VSB Coimbatore
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...eSAT Journals
 
Survey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocolSurvey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocoleSAT Journals
 
Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...
Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...
Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...IOSR Journals
 
Network structure routing_protocols_in_wsn
Network structure routing_protocols_in_wsnNetwork structure routing_protocols_in_wsn
Network structure routing_protocols_in_wsnGr Patel
 
An Improvement to Sensor Protocol for Information via Negotiation (SPIN) Pro...
An Improvement to Sensor Protocol for Information via  Negotiation (SPIN) Pro...An Improvement to Sensor Protocol for Information via  Negotiation (SPIN) Pro...
An Improvement to Sensor Protocol for Information via Negotiation (SPIN) Pro...IJMER
 
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN Sathish Silence
 
An Energy Efficient Protocol To Increase Network Life In WSN
An Energy Efficient Protocol To Increase Network Life In WSNAn Energy Efficient Protocol To Increase Network Life In WSN
An Energy Efficient Protocol To Increase Network Life In WSNIOSR Journals
 
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...ambitlick
 
2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stackSyed Ariful Islam Emon
 

Mais procurados (19)

Wireless Sensor Grids Energy Efficiency Enrichment Using Quorum Techniques
Wireless Sensor Grids Energy Efficiency Enrichment Using Quorum TechniquesWireless Sensor Grids Energy Efficiency Enrichment Using Quorum Techniques
Wireless Sensor Grids Energy Efficiency Enrichment Using Quorum Techniques
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
 
FTTCP: Fault Tolerant Two-level Clustering Protocol for WSN
FTTCP: Fault Tolerant Two-level Clustering Protocol for WSNFTTCP: Fault Tolerant Two-level Clustering Protocol for WSN
FTTCP: Fault Tolerant Two-level Clustering Protocol for WSN
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
Fo2510211029
Fo2510211029Fo2510211029
Fo2510211029
 
Performance Analysis of Distributed Spatial Multiplexing with Multi-hop Ampli...
Performance Analysis of Distributed Spatial Multiplexing with Multi-hop Ampli...Performance Analysis of Distributed Spatial Multiplexing with Multi-hop Ampli...
Performance Analysis of Distributed Spatial Multiplexing with Multi-hop Ampli...
 
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
 
Bn25384390
Bn25384390Bn25384390
Bn25384390
 
Power Optimization Technique for Sensor Network
Power Optimization Technique for Sensor NetworkPower Optimization Technique for Sensor Network
Power Optimization Technique for Sensor Network
 
Secured Data Aggregation using SRL Protocol for Wireless Sensor Networks
Secured Data Aggregation using SRL Protocol for Wireless Sensor NetworksSecured Data Aggregation using SRL Protocol for Wireless Sensor Networks
Secured Data Aggregation using SRL Protocol for Wireless Sensor Networks
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...
 
Survey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocolSurvey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocol
 
Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...
Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...
Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...
 
Network structure routing_protocols_in_wsn
Network structure routing_protocols_in_wsnNetwork structure routing_protocols_in_wsn
Network structure routing_protocols_in_wsn
 
An Improvement to Sensor Protocol for Information via Negotiation (SPIN) Pro...
An Improvement to Sensor Protocol for Information via  Negotiation (SPIN) Pro...An Improvement to Sensor Protocol for Information via  Negotiation (SPIN) Pro...
An Improvement to Sensor Protocol for Information via Negotiation (SPIN) Pro...
 
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
 
An Energy Efficient Protocol To Increase Network Life In WSN
An Energy Efficient Protocol To Increase Network Life In WSNAn Energy Efficient Protocol To Increase Network Life In WSN
An Energy Efficient Protocol To Increase Network Life In WSN
 
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
Enhancing Downlink Performance in Wireless Networks by Simultaneous Multiple ...
 
2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack
 

Destaque (7)

Matriux
MatriuxMatriux
Matriux
 
Null who and_where (1)
Null who and_where (1)Null who and_where (1)
Null who and_where (1)
 
W3AF|null
W3AF|nullW3AF|null
W3AF|null
 
[null]Metapwn - Pwn at a puff by Prajwal Panchmahalkar
[null]Metapwn - Pwn at a puff by Prajwal Panchmahalkar[null]Metapwn - Pwn at a puff by Prajwal Panchmahalkar
[null]Metapwn - Pwn at a puff by Prajwal Panchmahalkar
 
Maanav Jugaad - Social Engineering
Maanav Jugaad - Social EngineeringMaanav Jugaad - Social Engineering
Maanav Jugaad - Social Engineering
 
Energy Aware Fault Tolerant SPMS Protocol in Wireless Sensor Networks
Energy Aware Fault Tolerant SPMS Protocol in Wireless Sensor NetworksEnergy Aware Fault Tolerant SPMS Protocol in Wireless Sensor Networks
Energy Aware Fault Tolerant SPMS Protocol in Wireless Sensor Networks
 
Matriux Leandros - BSidesLV 2013
Matriux Leandros - BSidesLV 2013Matriux Leandros - BSidesLV 2013
Matriux Leandros - BSidesLV 2013
 

Semelhante a Energy Aware Fault Tolerant Shortest Path SPIN (EA-SPMS

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Computing localized power efficient data
Computing localized power efficient dataComputing localized power efficient data
Computing localized power efficient dataambitlick
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Editor IJARCET
 
Power control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulatorPower control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulatorIRJET Journal
 
Iaetsd load stabilizing and energy conserving routing
Iaetsd load stabilizing and energy conserving routingIaetsd load stabilizing and energy conserving routing
Iaetsd load stabilizing and energy conserving routingIaetsd Iaetsd
 
Comparison of energy efficient data transmission approaches for flat wireless...
Comparison of energy efficient data transmission approaches for flat wireless...Comparison of energy efficient data transmission approaches for flat wireless...
Comparison of energy efficient data transmission approaches for flat wireless...ijassn
 
COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...
COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...
COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...ijassn
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioIJLT EMAS
 
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor Networks
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor NetworksEnergy Efficient Multipath Data Fusion Technique for Wireless Sensor Networks
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor NetworksIDES Editor
 
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...Editor IJMTER
 
Energy aware routing for adhoc
Energy aware routing for adhocEnergy aware routing for adhoc
Energy aware routing for adhocijasuc
 

Semelhante a Energy Aware Fault Tolerant Shortest Path SPIN (EA-SPMS (20)

Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Computing localized power efficient data
Computing localized power efficient dataComputing localized power efficient data
Computing localized power efficient data
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Ly2520762079
Ly2520762079Ly2520762079
Ly2520762079
 
Ly2520762079
Ly2520762079Ly2520762079
Ly2520762079
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581
 
Power control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulatorPower control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulator
 
ROUTING STRATEGIES IN DTN
ROUTING STRATEGIES IN DTNROUTING STRATEGIES IN DTN
ROUTING STRATEGIES IN DTN
 
Iaetsd load stabilizing and energy conserving routing
Iaetsd load stabilizing and energy conserving routingIaetsd load stabilizing and energy conserving routing
Iaetsd load stabilizing and energy conserving routing
 
Aa35152156
Aa35152156Aa35152156
Aa35152156
 
Comparison of energy efficient data transmission approaches for flat wireless...
Comparison of energy efficient data transmission approaches for flat wireless...Comparison of energy efficient data transmission approaches for flat wireless...
Comparison of energy efficient data transmission approaches for flat wireless...
 
COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...
COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...
COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratio
 
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor Networks
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor NetworksEnergy Efficient Multipath Data Fusion Technique for Wireless Sensor Networks
Energy Efficient Multipath Data Fusion Technique for Wireless Sensor Networks
 
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANETStudy of Location Based Energy Efficient AODV Routing Protocols In MANET
Study of Location Based Energy Efficient AODV Routing Protocols In MANET
 
Final PPT.pptx
Final PPT.pptxFinal PPT.pptx
Final PPT.pptx
 
A04560105
A04560105A04560105
A04560105
 
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
 
Energy aware routing for adhoc
Energy aware routing for adhocEnergy aware routing for adhoc
Energy aware routing for adhoc
 

Mais de Prajwal Panchmahalkar

Fault tolerant energy aware data dissemination protocol in WSN
Fault tolerant energy aware data dissemination protocol in WSNFault tolerant energy aware data dissemination protocol in WSN
Fault tolerant energy aware data dissemination protocol in WSNPrajwal Panchmahalkar
 
Energy aware efficient geographic routing in lossy wireless Networks
Energy aware efficient geographic routing in lossy wireless NetworksEnergy aware efficient geographic routing in lossy wireless Networks
Energy aware efficient geographic routing in lossy wireless NetworksPrajwal Panchmahalkar
 
An analysis of a facebook spam exploited through browser addons
An analysis of a facebook spam exploited through browser addonsAn analysis of a facebook spam exploited through browser addons
An analysis of a facebook spam exploited through browser addonsPrajwal Panchmahalkar
 
[null] Iso 27001 a business view by Sripathi
[null] Iso 27001   a business view by Sripathi[null] Iso 27001   a business view by Sripathi
[null] Iso 27001 a business view by SripathiPrajwal Panchmahalkar
 

Mais de Prajwal Panchmahalkar (9)

Fault tolerant energy aware data dissemination protocol in WSN
Fault tolerant energy aware data dissemination protocol in WSNFault tolerant energy aware data dissemination protocol in WSN
Fault tolerant energy aware data dissemination protocol in WSN
 
Energy aware efficient geographic routing in lossy wireless Networks
Energy aware efficient geographic routing in lossy wireless NetworksEnergy aware efficient geographic routing in lossy wireless Networks
Energy aware efficient geographic routing in lossy wireless Networks
 
An analysis of a facebook spam exploited through browser addons
An analysis of a facebook spam exploited through browser addonsAn analysis of a facebook spam exploited through browser addons
An analysis of a facebook spam exploited through browser addons
 
[null]Iso 27001 a business view
[null]Iso 27001   a business view[null]Iso 27001   a business view
[null]Iso 27001 a business view
 
[null] Iso 27001 a business view by Sripathi
[null] Iso 27001   a business view by Sripathi[null] Iso 27001   a business view by Sripathi
[null] Iso 27001 a business view by Sripathi
 
Facebook Attacks By dinesh
Facebook Attacks By dineshFacebook Attacks By dinesh
Facebook Attacks By dinesh
 
Brute force
Brute forceBrute force
Brute force
 
Network concepts
Network conceptsNetwork concepts
Network concepts
 
Security
SecuritySecurity
Security
 

Último

ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 

Último (20)

ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 

Energy Aware Fault Tolerant Shortest Path SPIN (EA-SPMS

  • 1. Energy Aware Fault Tolerant Shortest Minded Path SPIN (SPMS) Nishanth Reddy Kommidi Prajwal Panchmahalkar Department Of Computer Science Department Of Computer Science Texas Tech University Texas Tech University Lubbock, Texas, USA Lubbock, Texas, USA nishanth.kommidi@ttu.edu prajwal.panchmahalkar@ttu.edu Abstract— In this paper we present an energy efficient remainder of the protocol and data transfer can occur in data dissemination protocol for efficiently distributing the multiple hops using the lowest energy level. In this data through a sensor network. We also consider energy paper, we propose a protocol called EA-SPMS (Energy consumption at each and every node in order to balance Aware SPMS) that balances the load on the relay nodes the load in the sensor network and maintain energy between source and destination. We achieve this by efficient data disseminations. This paper works efficiently even in the face of node and link failures. Our work is using the fact that every node has the information of its motivated by the SPMS protocol in which every node has a neighbor’s zone along with its own zone. This protocol zone defined. If a node requests the data, the data is sent to is just an extension to SPMS; here also nodes can the requested node using the shortest path. We propose a operate at multiple power levels. We run distributed protocol called EA-SPMS (Energy Aware SPMS) in which Bellman Ford algorithm among the nodes in the zone, to every node has a node defined by its maximum find out the routes (shortest paths) to other nodes in the transmission radius and every node has the information of zone. Each node maintains routes to other nodes in the its neighbor’s zone and its own zone. The nodes which are zone and also maintains the energy that it consumes in in common to the other two neighboring nodes overhears receiving the ADV, sending the request and then the transmission messages and react only when the En-bit broadcasting the ADV it its zone neighbors, then is set i.e. when the calculated energy at each node is less then threshold value. receiving the request and transmitting the data to the requested node every time it receives the adv message. Keywords- Sensor network, energy efficient, data Each node calculates the energy that it required to dissemintaion process the above scenario. We maintain a fixed energy threshold value throughout the network lifetime. The En- I. INTRODUCTION Bit (Energy Bit) is set accordingly. En-bit set when the Wireless Sensor Networks have recently emerged as a calculated energy at each node is less then threshold core technology to be applied in home applications, value. military applications, and environmental applications. Sensor nodes are typically battery powered and since replacing or recharging battery is often very difficult, II. RELATED WORK AND MOTIVATION reducing energy consumption and maintaining a load A. Related Work balance between the nodes is an important design SPIN consideration for the sensor networks. Sensor nodes are used for gathering the data, such physical, environmental SPIN is proposed to solve the data implosion problem of conditions from remote areas and disseminating them. flooding since a node transmits data to its neighbors The protocol called SPMS (Shortest Path Minded irrespective of whether the neighbor already received the SPIN) which is motivated by SPIN (Sensor Protocols for data via flooding. Nodes negotiate with their neighbors before transmitting data in SPIN to overcome this Information via Negotiation) reduces energy problem. SPIN guarantees only required data will be consumption and end-to-end delay of SPIN. This was transmitted. SPIN uses high-level data descriptors called achieved by the fact that nodes can operate at multiple meta-data in negotiation to determine if a node needs the power levels and once the meta-data is initiated, the data prior to real data exchange.
  • 2. SPIN involves the following steps: B. Motivation  ADV- new data advertisement. A node broadcasts an SPMS reduces the energy consumption by transmitting advertisement message including metadata to its the data through the shortest path; this may result in neighbor nodes. overusing of a specific node, since the shortest path has  REQ- Request for data. If a node requires the data, it been already selected. SPMS did not guarantee the sends a request message to the sensor node that sent energy efficiency in the case of node failure, since some the advertisement. other nodes in the network can no longer use the shortest  DATA- Data message. When a node receives the path. Moreover the relay nodes in SPMS have high request message, it transmits the data to the additional overhead as they have to relay the data neighbors that have sent the requests. between the source and destination. SPMS did not SPIN disseminates data throughout the entire network by provide and solution when the node in shortest path fails the repeated use these three steps. and the SCONE is not in the range of the node. SPMS III. DESIGN OF ENERGY AWARE SPMS SPMS (Shortest Path Minded SPIN) borrows the concept of meta-data exchange from SPIN, and uses a multi-hop model for data transmission among the nodes with The idea is formed on the basis of the SPMS protocol variable transmission power levels. In SPMS each node which implements the idea of three-way hand-shake of has its own zone. A zone for a node is the region that the SPIN protocol through metadata exchange and also node can reach by transmitting at the maximum power implements the shortest-path routing along with the level. Each node maintains a routing table for each of its relaying of intermediate nodes. SPIN however, suffers neighbors. The Distribute Bellman Ford (DBF) algorithm from a drawback that nodes that are relaying are is executed in each zone to form the routes. Each entry of constantly in communication and have a higher energy the routing table at each node has a destination field and overhead due the relaying. The relay nodes have to the cost of going to the destination through each of its constantly relay the data between a given pair of source neighbors. and destination for communication, and SPMS has not considered the energy constraints at relay node. SPMS involves the following steps:  It involves a metadata exchange, similar to that in SPIN, if a node has a data to send, broadcasts an advertisement message to its neighbor nodes in the same zone.  If a node wants the data, it sends a requests message through the shortest path. To send the data through the shortest path, if the adv message received by the node is not the next hop neighbor in the computed shortest path., then it should wait for a certain period of time before sending the request message. After each node sends a request message, it receives the data through the shortest path. If there is no adv message during the fixed period of time, the node sends the request message to the source node. Whenever a node in between the source node and the destination node fails, the current node sends the Fig1: A sample network. Each node maintains a request message to the node, from which it initially cost table associated with it to reach to its neighbor received an adv message instead of using the shortest within the zone along with the cost table of its path. If a node that broadcasts the adv message fails, neighbors. there is no way to receive the data. Therefore, in this protocol the destination node maintains the primary In EA-SPMS (Energy Aware SPMS) we consider that originator node (PRONE) and a secondary Originator each node maintains the routing tables of costs of the Node (SCONE). SCONE is the alternative node that can nodes within its zone along with the cost table tables of be used to request the data when the PRONE fails. the neighbors in its zone, which underlies our assumption that the overhead of communication is too high than the storage overhead .
  • 3. In EA-SPMS we call the relay nodes as smart relay nodes, smart relay node overhear the REQ and look up into which are aware of their own residual energy and the their tables to check if the destination node and the energy they have to spend to relay the data between the PRONE of the node are in its range and if they both are source and the destination. And based on the energy costs present these smart relays calculate their own En-Bit and other nodes in the zone can take over the route if they if their En-bit is greater than the actual relay node, they prove effective in energy balance and fault tolerance. take over the route and send request to the PRONE and IV. THE PROPOSED APPROACH energy balance is achieved. Also relay nodes doesn’t have to continuously When smart-relays get the REQ from the destination participate in the communication as other relay nodes they estimate the cost they have to spend in relaying the can take over the path to balance the energy data by utilizing the data present in the REQ data; the consumption among with relay nodes. Through smart- REQ packet contains the data about the data that is relay nodes we theoretically assume that the energy load requested along with the source and destination of the balance is effectively achieved and the life of the communication, the smart-relays use this data to calculate network is increased the cost and estimate the energy they will be left over after the relaying and calculate the Energy bit B. Node Failure case Er = Ep – (Erec + Et) The node failure case is similar to the energy aware case, just the difference is that the no REQ is heard from the node, however nodes which are in common zone with Where, the failed node, destination node and the PRONE of the failed node can overhear the REQ from the destination Er = energy expected to remain after the relaying. node and doesn’t hear any REQ from the failed node, so Ep = energy present at the node at current time ie, when it they take over the route just as the Energy Aware case. receives the REQ from the destination node Erec = Energy needed to spend on receiving the data from EA-SPMS is effective even in case where if the SCONE the source. is not in range of the destination node; as we maintain a routing table of neighbors in two-hops it can prove Et = Energy needed to spend on transmitting the data to effective beyond SPMS in being more fault tolerant. the destination node. Based on the Er value calculated the smart relay node sets a En-bit (Energy bit) of 4bits which constitute the 10 V. REFERENCES levels which we considered for the energy balance in the 1. Negotiation-based protocols for disseminating relay nodes. The smart relay adds this En-bit in its information in wireless sensor networks, request to its PRONE node. We set a threshold value for Wireless Networks, 2002, J. Kulik, W. these En-bits based on which if the En-Bit is below the Heinzelman, and H. Balakrishnan threshold value the node which receives this REQ packet 2. Fault Tolerant Energy Aware Data goes into a waiting state. Meanwhile the other nodes in Dissemination Protocol in Sensor Networks, the range of the smart relay overhear and look up into DSN 2004, Gunjan Khanna, Saurabh Bagchi, their tables and calculate if they have more En-bit value Yu-Sung Wu than the actual smart-relay in the path and if they have 3. Performance Comparison of SPIN based Push- more En-bit than the actual node they take over the route Pull Protocols, WCNC 2007, Ravish Khosla, and send REQ to its PRONE. Xuan Zhong, Gunjan Khanna, Saurabh Bagchi, A. Energy Aware case and Edward J. Coyle The smart relays send the En-bit along with the REQ packet to its PRONE node, the prone node based on the En-bit if it is below threshold goes into a waiting state. Meanwhile the other nodes which are in the range of this