SlideShare a Scribd company logo
1 of 8
MITIGATING PERFORMANCE DEGRADATION IN
CONGESTED SENSORNETWORKS

Synopsis
Introduction
CAR comprises three steps: HP network formation, conzone discovery,
and

differentiated

routing.

The

combination

of

these

functions

segments the network into on-conzone and off-conzone nodes. Only
HP traffic is routed by on-conzone nodes. Note that the protocol
specifically accommodates LP traffic, albeit with less efficient routes
than HP traffic. For the purposes of this discussion, we assume that
there is one HP sink and a contiguous part of the network (critical
area) that generates HP data in the presence of network wide
background LP traffic. We also assume that nodes are location aware
and densely deployed with uniform distribution. Since nodes in the
scenario in Fig. 1 send all HP data to a single sink, tree-based routing,
with the HP sink being the root, is most appropriate. However, Hull et
al. show that tree-based routing schemes suffer from congestion,
especially if the number of messages generated at the leaves is high.
This problem becomes even worse when we have a mixture of LP and
HP traffic traveling through the network.
Therefore, even when the rate of HP data is relatively low, the
background noise created by LP traffic will create a conzone that spans
the network from the critical area to the HP sink. Due to this
congestion, service provided to HP data may degrade, and nodes
within this area may die sooner than others, leading to only
suboptimal paths being available for HP data, or a network partition
may result, isolating the sink from the critical area. If a standard ad
hoc routing scheme (e.g., AODV or DSR ) is used to route the burst of
HP data instead of the tree-based routing scheme, congestion occurs.
the conzone that is formed when AODV is used for routing all data in a
deployment of 120 nodes. There is one HP sink and two LP sinks, as
shown in the figure. Only critical area nodes send HP data, while all
other nodes in the network send LP data to either of the LP sinks. We
do not show a similar figure for Directed Diffusion (using the OnePhase Pull Filter), because the control overhead of the initial flooding
required with such a large number of data sources of LP and HP traffic
was prohibitive and led to no HP data to be delivered. We now present
the algorithms used by CAR to build HP routing networks, to perform
dynamic conzone discovery, and to provide differentiated routing. This
is followed by the description of two enhancements of the basic CAR.

Mac-Enhanced Congested Aware Routing
MCAR,

a

combined

MAC

and

routing

scheme

designed to support situations in which critical events may move or
the sensors generating HP data may move. Though conzone discovery
is dynamic in CAR, the overhead required to maintain the HiNet in a
dynamic environment may be prohibitive. As a result, we use a
lightweight dynamic differentiated routing mechanism to accommodate
mobile data sources. MCAR is based on MAC-layer enhancements that
enable the formation of a conzone on the fly with each burst of data.
The trade-off is that it effectively preempts the flow of LP data,
thereby seriously degrading its service. Unlike CAR, MCAR does not
form an HP network. Instead, HP paths are dynamically created, since
the sources (or the sinks) are expected to be mobile. Thus, MCAR
discovers the conzone while discovering the paths from HP sources to
the sink. The enhanced MAC-layer of MCAR uses an RTS/CTS protocol
that is augmented to carry information about the priority level of the
data being transferred. Each RTS and CTS packet is tagged with a
priority level. During channel contention, if a node has HP data to send
and overhears an LP RTS, it jams the channel with an HP CTS, causing
nodes forwarding LP data to back off. Furthermore, if a node with LP
data overhears an HP RTS or CTS, it will back off the channel, as
described in the following section. Though 802.11e is similar to MCAR
in that they both prioritize access to the medium, the prioritized
RTS/CTS messages in highly congested networks may be dropped.
802.11e’s policy of guarding every transmission with an RTS/CTS
exchange leads to a prohibitive overhead.

Wooand Culler state that

RTS/CTS exchange imposes an overhead of up to 40 percent. The
extent of overhead experienced depends on the relative size of the
RTS/CTS packets and the data packets. In sensor networks, data
packet sizes are not large enough to justify the cost of RTS/CTS
exchange to guard every packet. Hence, 802.11e is unsuitable for
sensor networks. MCAR uses a silencing mechanism that does not
require preempting all LP data transmissions in the neighborhood for
each HP data to be sent. Rather, MCAR silences the conzone and its
neighborhood during route discovery and/or maintenance. though the
cost of an RTS/CTS exchange for each data packet may be
considerable for a sensor network, even S-MAC. a widely used MAC
scheme for sensor networks, uses one RTS/CTS exchange for a
collection of message fragments. Similarly, the cost of RTS/CTS
imposed by MCAR is not prohibitive, since it uses these RTS/CTS
packets only during the route discovery/maintenance phase. Hence,
the scalability of the RTS/CTS overhead for MCAR is not an issue. In
MCAR, nodes discover if they are on the conzone by using the conzone
discovery explained in the following. Like CAR, this conzone discovery
is triggered when an area starts generating HP data. For the conzone
to be discovered dynamically, MCAR uses two timers to regulate when
a node decides it is no longer part of the HP path. One timer, called
the overhearing timer, monitors how long it has been since the last HP
packet was heard. This timer is used to control nodes in the
communication range of the conzone but that are not necessarily
involved in forwarding the packets. The overhearing timer is reset any
time an HP packet is overheard or any time an HP packet is received
(since nodes involved in forwarding packets are clearly within the
communication range of nodes transmitting those packets). The
second timer, called the received timer, controls nodes either
generating or forwarding HP data. In MCAR, each node in the network
can be in one of three states, dictating whether it is a part of the
conzone or not or within the communication range of the conzone but
not a part of it This last mode creates a shadow area that separates HP
traffic from LP traffic.
Abstract
Data’s generated in Wireless Sensor Networks may not all
alike, some Data’s are more important than other Data’s and they may
have Different Delivery Requirements. If Congestion occurs in the
Wireless Network. Some or More Important data’s may be dropped.
But in our Project we handle this problem by addressing Differentiated
Delivery Requirements. We propose a class of algorithms that enforce
differentiated routing based on the congested areas of a network and
data priority.
The

basic

protocol,

called

Congestion-Aware

Routing (CAR), discovers the congested zone of the network that
exists between high-priority data sources and the data sink and, using
simple forwarding rules, dedicates this portion of the network to
forwarding primarily high-priority traffic. Since CAR requires some
overhead for establishing the high-priority routing zone, it is unsuitable
for highly mobile data sources. To accommodate these, we define
MAC-Enhanced

CAR

(MCAR),

which

includes

MAC-layer

enhancements and a protocol for forming high-priority paths on the fly
for each burst of data. MCAR effectively handles the mobility of highpriority data sources, at the expense of degrading the performance of
low-priority traffic.
Existing System:
•

Existing Schemes detect Congestion but they Consider all
Data’s to be Equally Important.

•

Average Data delivery is low.

Disadvantages:
Congestion may lead to ,
• Indiscriminate dropping of data (i.e., high-priority (HP)
packets maybe dropped while low-priority (LP) packets
are delivered).

Proposed System:
•

Proposed System maintain separate route for both LowPriority and High-Priority data

Advantages:


Use energy more uniformly in the deployment and reduce
the energy consumed in the nodes that lie on the
conzone(Congested Zone), which leads to an increase in
connectivity lifetime



CAR & MCAR provides very low Jitter.



Both CAR & MCAR lead to a significant increase in
Successful Packet delivery ratio of HP data.



Both CAR & MCAR lead to a
average delivery delay.

clear decrease in the
Hardware Requirements:



PROCESSOR

: PENTIUM IV 2.6 GHz



RAM

:512 MB DD RAM



MONITOR

:15” COLOR



HARD DISK



FLOPPY DRIVE



CDDRIVE



KEYBOARD



MOUSE

:
:

20 GB
1.44 MB

:LG 52X
:

STANDARD 102 KEYS

:3 BUTTONS

Software Requirements:



FRONT END

: Java, Swing



OPERATING SYSTEM : Window’s XP



BACK END

:Ms Access

More Related Content

What's hot

A maximum residual multicast protocol for large scale mobile ad hoc networks
A maximum residual multicast protocol for large scale mobile ad hoc networksA maximum residual multicast protocol for large scale mobile ad hoc networks
A maximum residual multicast protocol for large scale mobile ad hoc networksChandan Thakur
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSNMahbubur Rahman
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Divya Tiwari
 
cluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networkscluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networksNarendra Singh Yadav
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..Chandra Meena
 
IRJET- Optimum Routing Algorithm for MANET
IRJET-  	  Optimum Routing Algorithm for MANETIRJET-  	  Optimum Routing Algorithm for MANET
IRJET- Optimum Routing Algorithm for MANETIRJET Journal
 
Network Routing | Computer Science
Network Routing | Computer ScienceNetwork Routing | Computer Science
Network Routing | Computer ScienceTransweb Global Inc
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolPrafull Johri
 
TOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKS
TOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKSTOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKS
TOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKScaijjournal
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manetshiujinghan
 
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
Performance Analysis and Simulation of  OLSR Routing Protocol in MANET Performance Analysis and Simulation of  OLSR Routing Protocol in MANET
Performance Analysis and Simulation of OLSR Routing Protocol in MANET ijcnac
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewYoav Francis
 
(Paper Presentation) DSDV
(Paper Presentation) DSDV(Paper Presentation) DSDV
(Paper Presentation) DSDVRajesh Piryani
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)Gaurav Dalvi
 

What's hot (20)

A maximum residual multicast protocol for large scale mobile ad hoc networks
A maximum residual multicast protocol for large scale mobile ad hoc networksA maximum residual multicast protocol for large scale mobile ad hoc networks
A maximum residual multicast protocol for large scale mobile ad hoc networks
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
cluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networkscluster based routing protocol for ad hoc networks
cluster based routing protocol for ad hoc networks
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 
IRJET- Optimum Routing Algorithm for MANET
IRJET-  	  Optimum Routing Algorithm for MANETIRJET-  	  Optimum Routing Algorithm for MANET
IRJET- Optimum Routing Algorithm for MANET
 
Network Routing | Computer Science
Network Routing | Computer ScienceNetwork Routing | Computer Science
Network Routing | Computer Science
 
Chapter4 l4
Chapter4 l4Chapter4 l4
Chapter4 l4
 
A41040105
A41040105A41040105
A41040105
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocol
 
TOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKS
TOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKSTOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKS
TOPOLOGY DISCOVERY IN MULTI-HOP CLUSTERING VEHICULAR NETWORKS
 
Network layer
Network layerNetwork layer
Network layer
 
Routing in Manet
Routing in ManetRouting in Manet
Routing in Manet
 
Topic5
Topic5Topic5
Topic5
 
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
Performance Analysis and Simulation of  OLSR Routing Protocol in MANET Performance Analysis and Simulation of  OLSR Routing Protocol in MANET
Performance Analysis and Simulation of OLSR Routing Protocol in MANET
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
 
(Paper Presentation) DSDV
(Paper Presentation) DSDV(Paper Presentation) DSDV
(Paper Presentation) DSDV
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)CSGR(cluster switch gateway routing)
CSGR(cluster switch gateway routing)
 

Viewers also liked

Computation efficient multicast key distribution(synopsis)
Computation efficient multicast key distribution(synopsis)Computation efficient multicast key distribution(synopsis)
Computation efficient multicast key distribution(synopsis)Mumbai Academisc
 
Benefit based data caching in ad hoc networks (synopsis)
Benefit based data caching in ad hoc networks (synopsis)Benefit based data caching in ad hoc networks (synopsis)
Benefit based data caching in ad hoc networks (synopsis)Mumbai Academisc
 
One to many distribution using recursive unicast trees(synopsis)
One to many distribution using recursive unicast trees(synopsis)One to many distribution using recursive unicast trees(synopsis)
One to many distribution using recursive unicast trees(synopsis)Mumbai Academisc
 
An efficient concept based mining model for enhancing text clustering(synopsis)
An efficient concept based mining model for enhancing text clustering(synopsis)An efficient concept based mining model for enhancing text clustering(synopsis)
An efficient concept based mining model for enhancing text clustering(synopsis)Mumbai Academisc
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Mumbai Academisc
 

Viewers also liked (8)

Java tutorial part 4
Java tutorial part 4Java tutorial part 4
Java tutorial part 4
 
Computation efficient multicast key distribution(synopsis)
Computation efficient multicast key distribution(synopsis)Computation efficient multicast key distribution(synopsis)
Computation efficient multicast key distribution(synopsis)
 
Engineering
EngineeringEngineering
Engineering
 
Benefit based data caching in ad hoc networks (synopsis)
Benefit based data caching in ad hoc networks (synopsis)Benefit based data caching in ad hoc networks (synopsis)
Benefit based data caching in ad hoc networks (synopsis)
 
One to many distribution using recursive unicast trees(synopsis)
One to many distribution using recursive unicast trees(synopsis)One to many distribution using recursive unicast trees(synopsis)
One to many distribution using recursive unicast trees(synopsis)
 
An efficient concept based mining model for enhancing text clustering(synopsis)
An efficient concept based mining model for enhancing text clustering(synopsis)An efficient concept based mining model for enhancing text clustering(synopsis)
An efficient concept based mining model for enhancing text clustering(synopsis)
 
Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)Personal authentication using 3 d finger geometry (synopsis)
Personal authentication using 3 d finger geometry (synopsis)
 
Web based development
Web based developmentWeb based development
Web based development
 

Similar to Mitigating performance degradation in congested sensor networks(synopsis)

NS2 IEEE projects 2014
NS2 IEEE projects 2014NS2 IEEE projects 2014
NS2 IEEE projects 2014Senthilvel S
 
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...RESHAN FARAZ
 
Load Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANETLoad Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANETijsrd.com
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkJamia Hamdard
 
Routing protocols of wsn
Routing protocols of wsnRouting protocols of wsn
Routing protocols of wsnAyman Adel
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetijctet
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetijctet
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmnmmjalbiaty
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...IJCSIS Research Publications
 
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesAnalysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesIOSR Journals
 
Effects of location awareness on concurrent transmissions for cognitive ad ho...
Effects of location awareness on concurrent transmissions for cognitive ad ho...Effects of location awareness on concurrent transmissions for cognitive ad ho...
Effects of location awareness on concurrent transmissions for cognitive ad ho...Mumbai Academisc
 
A distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase theA distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase theKamal Spring
 
Distributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radioDistributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radioIffat Anjum
 
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Sitamarhi Institute of Technology
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2csandit
 
Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)IISRT
 
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Narendra Singh Yadav
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
 
Cm chou 20050124
Cm chou 20050124Cm chou 20050124
Cm chou 20050124hinalala
 

Similar to Mitigating performance degradation in congested sensor networks(synopsis) (20)

NS2 IEEE projects 2014
NS2 IEEE projects 2014NS2 IEEE projects 2014
NS2 IEEE projects 2014
 
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...
Rm literature survey_on_scheduling_and_resource_allocation_for_ieee_80211ax_p...
 
Overview and Basics of LTE
Overview and Basics of LTEOverview and Basics of LTE
Overview and Basics of LTE
 
Load Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANETLoad Balancing and Congestion Control in MANET
Load Balancing and Congestion Control in MANET
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Routing protocols of wsn
Routing protocols of wsnRouting protocols of wsn
Routing protocols of wsn
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manet
 
Load aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manetLoad aware and load balancing using aomdv routing in manet
Load aware and load balancing using aomdv routing in manet
 
Mac protocol for wmn
Mac protocol for wmnMac protocol for wmn
Mac protocol for wmn
 
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
Cross Layer Based Hybrid Fuzzy Ad-Hoc Rate Based Congestion Control (CLHCC) A...
 
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesAnalysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
 
Effects of location awareness on concurrent transmissions for cognitive ad ho...
Effects of location awareness on concurrent transmissions for cognitive ad ho...Effects of location awareness on concurrent transmissions for cognitive ad ho...
Effects of location awareness on concurrent transmissions for cognitive ad ho...
 
A distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase theA distributed three hop routing protocol to increase the
A distributed three hop routing protocol to increase the
 
Distributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radioDistributed contention based mac protocol for cognitive radio
Distributed contention based mac protocol for cognitive radio
 
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
Module 3: Routing Protocols and Transport Layer in Ad-hoc Networks
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
 
Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)
 
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
 
Cm chou 20050124
Cm chou 20050124Cm chou 20050124
Cm chou 20050124
 

More from Mumbai Academisc

More from Mumbai Academisc (20)

Non ieee java projects list
Non  ieee java projects list Non  ieee java projects list
Non ieee java projects list
 
Non ieee dot net projects list
Non  ieee dot net projects list Non  ieee dot net projects list
Non ieee dot net projects list
 
Ieee java projects list
Ieee java projects list Ieee java projects list
Ieee java projects list
 
Ieee 2014 java projects list
Ieee 2014 java projects list Ieee 2014 java projects list
Ieee 2014 java projects list
 
Ieee 2014 dot net projects list
Ieee 2014 dot net projects list Ieee 2014 dot net projects list
Ieee 2014 dot net projects list
 
Ieee 2013 java projects list
Ieee 2013 java projects list Ieee 2013 java projects list
Ieee 2013 java projects list
 
Ieee 2013 dot net projects list
Ieee 2013 dot net projects listIeee 2013 dot net projects list
Ieee 2013 dot net projects list
 
Ieee 2012 dot net projects list
Ieee 2012 dot net projects listIeee 2012 dot net projects list
Ieee 2012 dot net projects list
 
Spring ppt
Spring pptSpring ppt
Spring ppt
 
Ejb notes
Ejb notesEjb notes
Ejb notes
 
Java web programming
Java web programmingJava web programming
Java web programming
 
Java programming-examples
Java programming-examplesJava programming-examples
Java programming-examples
 
Hibernate tutorial
Hibernate tutorialHibernate tutorial
Hibernate tutorial
 
J2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai AcademicsJ2ee project lists:-Mumbai Academics
J2ee project lists:-Mumbai Academics
 
Jdbc
JdbcJdbc
Jdbc
 
Java tutorial part 3
Java tutorial part 3Java tutorial part 3
Java tutorial part 3
 
Java tutorial part 2
Java tutorial part 2Java tutorial part 2
Java tutorial part 2
 
Jsp
JspJsp
Jsp
 
Project list
Project listProject list
Project list
 
Predictive job scheduling in a connection limited system using parallel genet...
Predictive job scheduling in a connection limited system using parallel genet...Predictive job scheduling in a connection limited system using parallel genet...
Predictive job scheduling in a connection limited system using parallel genet...
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Mitigating performance degradation in congested sensor networks(synopsis)

  • 1. MITIGATING PERFORMANCE DEGRADATION IN CONGESTED SENSORNETWORKS Synopsis
  • 2. Introduction CAR comprises three steps: HP network formation, conzone discovery, and differentiated routing. The combination of these functions segments the network into on-conzone and off-conzone nodes. Only HP traffic is routed by on-conzone nodes. Note that the protocol specifically accommodates LP traffic, albeit with less efficient routes than HP traffic. For the purposes of this discussion, we assume that there is one HP sink and a contiguous part of the network (critical area) that generates HP data in the presence of network wide background LP traffic. We also assume that nodes are location aware and densely deployed with uniform distribution. Since nodes in the scenario in Fig. 1 send all HP data to a single sink, tree-based routing, with the HP sink being the root, is most appropriate. However, Hull et al. show that tree-based routing schemes suffer from congestion, especially if the number of messages generated at the leaves is high. This problem becomes even worse when we have a mixture of LP and HP traffic traveling through the network. Therefore, even when the rate of HP data is relatively low, the background noise created by LP traffic will create a conzone that spans the network from the critical area to the HP sink. Due to this congestion, service provided to HP data may degrade, and nodes within this area may die sooner than others, leading to only suboptimal paths being available for HP data, or a network partition may result, isolating the sink from the critical area. If a standard ad hoc routing scheme (e.g., AODV or DSR ) is used to route the burst of HP data instead of the tree-based routing scheme, congestion occurs. the conzone that is formed when AODV is used for routing all data in a deployment of 120 nodes. There is one HP sink and two LP sinks, as
  • 3. shown in the figure. Only critical area nodes send HP data, while all other nodes in the network send LP data to either of the LP sinks. We do not show a similar figure for Directed Diffusion (using the OnePhase Pull Filter), because the control overhead of the initial flooding required with such a large number of data sources of LP and HP traffic was prohibitive and led to no HP data to be delivered. We now present the algorithms used by CAR to build HP routing networks, to perform dynamic conzone discovery, and to provide differentiated routing. This is followed by the description of two enhancements of the basic CAR. Mac-Enhanced Congested Aware Routing MCAR, a combined MAC and routing scheme designed to support situations in which critical events may move or the sensors generating HP data may move. Though conzone discovery is dynamic in CAR, the overhead required to maintain the HiNet in a dynamic environment may be prohibitive. As a result, we use a lightweight dynamic differentiated routing mechanism to accommodate mobile data sources. MCAR is based on MAC-layer enhancements that enable the formation of a conzone on the fly with each burst of data. The trade-off is that it effectively preempts the flow of LP data, thereby seriously degrading its service. Unlike CAR, MCAR does not form an HP network. Instead, HP paths are dynamically created, since the sources (or the sinks) are expected to be mobile. Thus, MCAR discovers the conzone while discovering the paths from HP sources to the sink. The enhanced MAC-layer of MCAR uses an RTS/CTS protocol that is augmented to carry information about the priority level of the data being transferred. Each RTS and CTS packet is tagged with a priority level. During channel contention, if a node has HP data to send and overhears an LP RTS, it jams the channel with an HP CTS, causing
  • 4. nodes forwarding LP data to back off. Furthermore, if a node with LP data overhears an HP RTS or CTS, it will back off the channel, as described in the following section. Though 802.11e is similar to MCAR in that they both prioritize access to the medium, the prioritized RTS/CTS messages in highly congested networks may be dropped. 802.11e’s policy of guarding every transmission with an RTS/CTS exchange leads to a prohibitive overhead. Wooand Culler state that RTS/CTS exchange imposes an overhead of up to 40 percent. The extent of overhead experienced depends on the relative size of the RTS/CTS packets and the data packets. In sensor networks, data packet sizes are not large enough to justify the cost of RTS/CTS exchange to guard every packet. Hence, 802.11e is unsuitable for sensor networks. MCAR uses a silencing mechanism that does not require preempting all LP data transmissions in the neighborhood for each HP data to be sent. Rather, MCAR silences the conzone and its neighborhood during route discovery and/or maintenance. though the cost of an RTS/CTS exchange for each data packet may be considerable for a sensor network, even S-MAC. a widely used MAC scheme for sensor networks, uses one RTS/CTS exchange for a collection of message fragments. Similarly, the cost of RTS/CTS imposed by MCAR is not prohibitive, since it uses these RTS/CTS packets only during the route discovery/maintenance phase. Hence, the scalability of the RTS/CTS overhead for MCAR is not an issue. In MCAR, nodes discover if they are on the conzone by using the conzone discovery explained in the following. Like CAR, this conzone discovery is triggered when an area starts generating HP data. For the conzone to be discovered dynamically, MCAR uses two timers to regulate when a node decides it is no longer part of the HP path. One timer, called the overhearing timer, monitors how long it has been since the last HP
  • 5. packet was heard. This timer is used to control nodes in the communication range of the conzone but that are not necessarily involved in forwarding the packets. The overhearing timer is reset any time an HP packet is overheard or any time an HP packet is received (since nodes involved in forwarding packets are clearly within the communication range of nodes transmitting those packets). The second timer, called the received timer, controls nodes either generating or forwarding HP data. In MCAR, each node in the network can be in one of three states, dictating whether it is a part of the conzone or not or within the communication range of the conzone but not a part of it This last mode creates a shadow area that separates HP traffic from LP traffic.
  • 6. Abstract Data’s generated in Wireless Sensor Networks may not all alike, some Data’s are more important than other Data’s and they may have Different Delivery Requirements. If Congestion occurs in the Wireless Network. Some or More Important data’s may be dropped. But in our Project we handle this problem by addressing Differentiated Delivery Requirements. We propose a class of algorithms that enforce differentiated routing based on the congested areas of a network and data priority. The basic protocol, called Congestion-Aware Routing (CAR), discovers the congested zone of the network that exists between high-priority data sources and the data sink and, using simple forwarding rules, dedicates this portion of the network to forwarding primarily high-priority traffic. Since CAR requires some overhead for establishing the high-priority routing zone, it is unsuitable for highly mobile data sources. To accommodate these, we define MAC-Enhanced CAR (MCAR), which includes MAC-layer enhancements and a protocol for forming high-priority paths on the fly for each burst of data. MCAR effectively handles the mobility of highpriority data sources, at the expense of degrading the performance of low-priority traffic.
  • 7. Existing System: • Existing Schemes detect Congestion but they Consider all Data’s to be Equally Important. • Average Data delivery is low. Disadvantages: Congestion may lead to , • Indiscriminate dropping of data (i.e., high-priority (HP) packets maybe dropped while low-priority (LP) packets are delivered). Proposed System: • Proposed System maintain separate route for both LowPriority and High-Priority data Advantages:  Use energy more uniformly in the deployment and reduce the energy consumed in the nodes that lie on the conzone(Congested Zone), which leads to an increase in connectivity lifetime  CAR & MCAR provides very low Jitter.  Both CAR & MCAR lead to a significant increase in Successful Packet delivery ratio of HP data.  Both CAR & MCAR lead to a average delivery delay. clear decrease in the
  • 8. Hardware Requirements:  PROCESSOR : PENTIUM IV 2.6 GHz  RAM :512 MB DD RAM  MONITOR :15” COLOR  HARD DISK  FLOPPY DRIVE  CDDRIVE  KEYBOARD  MOUSE : : 20 GB 1.44 MB :LG 52X : STANDARD 102 KEYS :3 BUTTONS Software Requirements:  FRONT END : Java, Swing  OPERATING SYSTEM : Window’s XP  BACK END :Ms Access