SlideShare a Scribd company logo
1 of 7
Download to read offline
S.Esakki Rajavel et al., International Journal of Advanced Research in Innovative Discoveries in Engineering and
Applications[IJARIDEA]
Vol.2, Issue 1,27 February 2017, pg. 11-17
11
© 2017, IJARIDEA All Rights Reserved
SENSOR NETWORKS BASED ON
DISTRIBUTED WIRELESS SENSING
S.Esakki Rajavel1
, Shubha Shree.P2
, Sushma Thavakumari.A3
, G.ThangaKumari4
1
Assistant Professor, Department of ECE, Francis Xavier Engineering College, Tirunelveli, India
2,3,4
UG Scholar, Francis Xavier Engineering College, Tirunelveli, India
Abstract— Exponential data transfer capacity scaling has been an essential driver of the development and
fame of the Internet. Nonetheless, increments in transmission capacity have been joined by increments in
power utilization, and in spite of maintained framework plan endeavors to address control request,
noteworthy mechanical difficulties remain that debilitate to moderate future data transfer capacity
development. In this paper we depict the power and related warmth administration challenges in today's
switches. We advocate a wide way to deal with tending to this issue incorporates making power-mindfulness
an essential target in the plan and setup of systems, and in the outline and usage of system conventions. We
bolster our contentions by giving a contextual analysis of force requests of two standard switch stages that
empowers us to make a non specific model for switch control utilization. We apply this model in an
arrangement of target system setups and utilize blended whole number enhancement strategies to explore
control utilization, execution and strength in static system outline and in element steering. Our outcomes
show the potential for huge power reserve funds in operational systems by including power-mindfulness.
Keywords— CR; Dynamic Source Routing Protocol; SENMA.
I. INTRODUCTION
In prior circumstances, Sensor Networks included sensor hubs and every one of the hubs
are associated with a typical Central preparing framework. Be that as it may, these days
appropriated remote detecting is utilized. It is favorable in the way, that it detects the nearest
hub when the correct area of a specific wonder is obscure .Also, various sensor hubs would
defeat the hindrances in the earth, for example, Line of sight requirements, checks et cetera.
There is no current foundation for the earth to be checked in the event of either vitality or
correspondence. It is vital for sensor hubs that, it ought to transmit the data through remote
channels utilizing minimum measure of vitality [1].
For this reason SENMA (Wireless Sensor Networks Mobile Access Point) is utilized. This
goes through the system to gather the data from every hub. The benefit of SENMA over
different models is that it generally takes after an observable pathway way to any point inside
the power scope of the hubs. By this procedure the data can be passed on with no steering.
Consequently it is a vitality proficient design for the sensor systems.
Sensor arranges additionally requires conveyed handling ability since, correspondence
requires more measure of vitality. In the event that the separation of correspondence is long
more vitality is expended. So it ought to be prepared locally as the number bits required for
transmission will be lessened.
Here, the modest accumulation administrations, for example, number and whole are
proposed utilizing tree based calculation for registering the totals. Likewise the request
measurement registered utilizing this calculation is proposed. The correspondence misfortune
issue in this calculation can be tended to with a structure known as summary dispersion
utilizing Ring Topology. The term Data Survival is characterized as that how the information
S.Esakki Rajavel et al., International Journal of Advanced Research in Innovative Discoveries in Engineering and
Applications[IJARIDEA]
Vol.2, Issue 1,27 February 2017, pg. 11-17
12
© 2017, IJARIDEA All Rights Reserved
is ensured when there is no accessibility of base station. It survives just when the information
is transmitted to the base station with no progressions because of any contention.
II. SYSTEM MODEL
In proposed framework, the objective restriction issue is examined by making utilization of
minimal effort and less power expending remote sensors. The sensors sends their
approximated estimations over the remote channels and the combination focus ascertains the
area of the objective in view of the got information. In any case, there are a few blemishes in
the framework. One is, the remote correspondence channels between the sensors and the
focuses have some deformity. The other is that, sensors have constraints as far as the extents
they sense, vitality and their computational capacity. For that the disseminated Cryptography
method is utilized so that, the information transmission is successfully secured [2].
The benefits of the proposed framework is that, it utilizes randomized directing to give
obscurity assurance. The info Screen ought to give simple route without abusing the approval
of information.
Input configuration is characterized as the procedure by which the client information is
changed over into PC based arrangement. In the event that the info information is not
legitimate there might be some mistake in the information preparing.
A. Framework Description
The steps followed in System Description are,
The inspected information is tried with a created programming
If any mistake is distinguished it ought to be expelled.
B. Module Description
The execution of this system is computed by the beforehand utilized remote
correspondence organizing components. It can likewise be assessed utilizing a chart. The
chart clarifies about the parcel drop and bundle misfortune investigation. The investigation of
information collection is likewise given in detail by the diagram.
• Network Designing
This module gives the insights about how a system ought to be utilized. That is it gives the
areas where the sensor hubs are put in the remote system. It likewise incorporates the sink
creation handle.
• Collection of Data with MA focuses
In this module the information combination in the remote sensor system is thought about
utilizing SENMA under the Byzantine assault in both static and element conditions. In this,
the vindictive hubs gives a false data .This happens inside a settled or fluctuating likelihood
as for time. The SENMA gathers the information outline the sensor hubs.
• Detection of Malicious Nodes
The malignant hubs can be recognized by a basic and successful approach .It should be
possible by contrasting the choices of the sensors and that of the combination focus.
Therefore of Observation it is said that, it sets aside longer opportunity to distinguish
dynamic assault that the static assaults. It likewise requires complex calculation to be
S.Esakki Rajavel et al., International Journal of Advanced Research in Innovative Discoveries in Engineering and
Applications[IJARIDEA]
Vol.2, Issue 1,27 February 2017, pg. 11-17
13
© 2017, IJARIDEA All Rights Reserved
distinguished. The vindictive location system that has been proposed can distinguish the
pernicious sensors precisely if there is sufficient time for perception. It is investigated
utilizing an entropy based trust show.
C. Dynamic Source Routing Protocol
DSR is a receptive directing convention which can deal with a MANET without utilizing
intermittent table-refresh messages like table-driven steering conventions do. DSR was
particularly intended for use in multi-jump remote impromptu systems. Specially appointed
convention permits the system to be totally self-sorting out and self-arranging which implies
that there is no requirement for a current system foundation or organization.
For confining the data transfer capacity, the procedure to discover a way is just executed
when a way is required by a hub (On-Demand-Routing). In DSR the sender (source, initiator)
decides the entire way from the source to the goal hub (Source-Routing) and stores the
locations of the middle hubs of the course in the bundles.
Contrasted with other receptive directing conventions like ABR or SSA, DSR is signal less
which implies that there are no welcome messages utilized between the hubs to tell their
neighbors about her nearness.
DSR contains 2 stages
• Route Discovery (discover a way)
• Route Maintenance (keep up a way)
D. Route Discovery
Fig.1. Route discovery block diagram
On the off chance that hub A has in his Route Cache a course to the goal E, this course is
quickly utilized. If not, the Route Discovery convention is begun:
1. Node An (initiator) sends a Route Request parcel by flooding the system
2. If hub B has as of late observed another Route Request from a similar target or if the
address of hub B is now recorded in the Route Record Then hub B disposes of the demand!
3. If hub B is the objective of the Route Discovery, it gives back a Route Reply to the
initiator. The Route Reply contains a rundown of the "best" way from the initiator to the
objective. At the point when the initiator gets this Route Reply, it stores this course in its
Route Cache for use in sending consequent bundles to this goal.
4. Otherwise hub B isn't the objective and it advances the Route Request to his
neighbors (but to the initiator).
Way discovering process: Route Request and Route Reply
S.Esakki Rajavel et al., International Journal of Advanced Research in Innovative Discoveries in Engineering and
Applications[IJARIDEA]
Vol.2, Issue 1,27 February 2017, pg. 11-17
14
© 2017, IJARIDEA All Rights Reserved
The figure expresses the procedure of course disclosure through communicating RREQ
course ask for message to neighbors for finding most brief way to goal
Fig.2. Path Finding Process(route request)
Fig.2. states the process of route reply message, the destination node replies a RREP
message to the source node indicating the stable path for transmitting data
Fig.3. Route Reply
E. Route Maintenance
In DSR each hub is in charge of affirming that the following bounce in the Source Route
gets the parcel. Likewise every bundle is just sent once by a hub (bounce by-jump steering).
In the event that a bundle can't be gotten by a hub, it is retransmitted up to some most
extreme number of times until an affirmation is gotten from the following jump. Just if
retransmission comes about then in a disappointment, a Route Error message is sent to the
initiator that can expel that Source Route from its Route Cache. So the initiator can check his
Route Cache for another course to the objective. On the off chance that there is no course in
the reserve, a Route Request parcel is communicated.
S.Esakki Rajavel et al., International Journal of Advanced Research in Innovative Discoveries in Engineering and
Applications[IJARIDEA]
Vol.2, Issue 1,27 February 2017, pg. 11-17
15
© 2017, IJARIDEA All Rights Reserved
1. If hub C does not get an affirmation from hub D after some number of solicitations, it
gives back a Route Error to the initiator A.
2. As soon as hub gets the Route Error message, it erases the broken-interface course
from its store. In the event that A has another course to E, it sends the parcel promptly
utilizing this new course.
3. Otherwise the initiator An is beginning the Route Discovery handle once more.
III. SIMULATION RESULTS
We simulate the proposed algorithm via ns-2(version 2.31) simulator with the CR
transmission model, which is based on Cognitive Radio Cognitive Network Simulator
A. Generation of nodes
Fig.4. Generation of nodes
Fig.4. shows a node creation. The node can be created with its node type, size and
properties. Created node can be located in the network. In this assume 10 nodes
B. Location of secondary users
Fig.2. shows the location of secondary users . Each SU is equipped with one or more
cognitive radios which are capable of identifying available channels (i.e., not occupied by
PUs) and hopping between them. In addition, SUs should locate each other via a
“rendezvous” process. In process process of rendezvous, SUs meet and establish a link.
Fig.2. Location of secondary users
S.Esakki Rajavel et al., International Journal of Advanced Research in Innovative Discoveries in Engineering and
Applications[IJARIDEA]
Vol.2, Issue 1,27 February 2017, pg. 11-17
16
© 2017, IJARIDEA All Rights Reserved
C. Analysis of Packet Delivery
Fig.3. Analysis of Packet Delivery
D. Throughput analysis
Fig.4. Throughput analysis of given protocol
Fig.4. shows the throughput analysis of the given protocol
IV.CONCLUSION
Exponential data transfer capacity scaling has been an essential driver of the development and
fame of the Internet. Nonetheless, increments in transmission capacity have been joined by
increments in power utilization, and in spite of maintained framework plan endeavors to
address control request, noteworthy mechanical difficulties remain that debilitate to moderate
future data transfer capacity development. In this paper we depict the power and related
warmth administration challenges in today's switches. We advocate a wide way to deal with
tending to this issue incorporates making power-mindfulness an essential target in the plan
and setup of systems, and in the outline and usage of system conventions. We bolster our
contentions by giving a contextual analysis of force requests of two standard switch stages
S.Esakki Rajavel et al., International Journal of Advanced Research in Innovative Discoveries in Engineering and
Applications[IJARIDEA]
Vol.2, Issue 1,27 February 2017, pg. 11-17
17
© 2017, IJARIDEA All Rights Reserved
that empowers us to make a non specific model for switch control utilization. We apply this
model in an arrangement of target system setups and utilize blended whole number
enhancement strategies to explore control utilization, execution and strength in static system
outline and in element steering. Our outcomes show the potential for huge power reserve
funds in operational systems by including power-mindfulness.
REFERENCES
[1] S.Esakki Rajavel, C.Jenita Blesslin, “Energetic Spectrum Sensing For Cognitive Radio Enabled
Remote State Estimation Over Wireless Channels”, International Journal of Advanced Research Trends
in Engineering and Technology (IJARTET), Vol. 3, Special Issue 19, April 2016 (12 – 15).
[2] S.Esakki Rajavel, Mr.B.Pradheep T Rajan, E.Edinda Christy, “Energy Efficient Collaborative Spectrum
Sensing in Cognitive Radio Networks” GRD Journals- Global Research and Development Journal for
Engineering, Volume 2 ,Issue 1 ,December 2016.
[3] M. Wegmuller, J. P. von der Weid, P. Oberson, and N. Gisin, “High resolution fiber distributed
measurements with coherent OFDR,” in Proc. ECOC’00, 2000, paper 11.3.4, p. 109.
[4] R. E. Sorace, V. S. Reinhardt, and S. A. Vaughn, “High-speed digital-to-RF converter,” U.S. Patent 5 668
842, Sept. 16, 1997.
[5] (2002) The IEEE website. [Online]. Available: http://www.ieee.org/
[6] M. Shell. (2002) IEEEtran homepage on CTAN. [Online]. Available: http://www.ctan.org/tex-
archive/macros/latex/contrib/supported/IEEEtran/
[7] FLEXChip Signal Processor (MC68175/D), Motorola, 1996.
[8] “PDCA12-70 data sheet,” Opto Speed SA, Mezzovico, Switzerland.
[9] A. Karnik, “Performance of TCP congestion control with rate feedback: TCP/ABR and rate adaptive
TCP/IP,” M. Eng. thesis, Indian Institute of Science, Bangalore, India, Jan. 1999.
[10] J. Padhye, V. Firoiu, and D. Towsley, “A stochastic model of TCP Reno congestion avoidance and
control,” Univ. of Massachusetts, Amherst, MA, CMPSCI Tech. Rep. 99-02, 1999.
[11] Dr. K. Madhavi, N. Ushasree, "A Fuzzy Based Dynamic Queue Management Approach to Improve QOS
in Wireless sensor Networks.", International Journal of Advanced Research in Innovative Discoveries in
Engineering and Applications[IJARIDEA], Volume 1,Issue 1,October 2016, pp:16-21.

More Related Content

What's hot

A seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networksA seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networks
praveen369
 
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
International Journal of Technical Research & Application
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
ijsrd.com
 
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
IJCI JOURNAL
 
Routing techniques in wireless sensor networks a survey
Routing techniques in wireless sensor networks a surveyRouting techniques in wireless sensor networks a survey
Routing techniques in wireless sensor networks a survey
Amandeep Sohal
 

What's hot (19)

A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
 
A seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networksA seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networks
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor Networks
 
Time Orient Multi Attribute Sensor Selection Technique For Data Collection In...
Time Orient Multi Attribute Sensor Selection Technique For Data Collection In...Time Orient Multi Attribute Sensor Selection Technique For Data Collection In...
Time Orient Multi Attribute Sensor Selection Technique For Data Collection In...
 
C018141418
C018141418C018141418
C018141418
 
3 ijcse-01222-5
3 ijcse-01222-53 ijcse-01222-5
3 ijcse-01222-5
 
Dy4301752755
Dy4301752755Dy4301752755
Dy4301752755
 
Optimization of workload prediction based on map reduce frame work in a cloud...
Optimization of workload prediction based on map reduce frame work in a cloud...Optimization of workload prediction based on map reduce frame work in a cloud...
Optimization of workload prediction based on map reduce frame work in a cloud...
 
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...
 
Tdtd-Edr: Time Orient Delay Tolerant Density Estimation Technique Based Data ...
Tdtd-Edr: Time Orient Delay Tolerant Density Estimation Technique Based Data ...Tdtd-Edr: Time Orient Delay Tolerant Density Estimation Technique Based Data ...
Tdtd-Edr: Time Orient Delay Tolerant Density Estimation Technique Based Data ...
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
 
B05630814
B05630814B05630814
B05630814
 
Efficient Cluster Based Data Collection Using Mobile Data Collector for Wirel...
Efficient Cluster Based Data Collection Using Mobile Data Collector for Wirel...Efficient Cluster Based Data Collection Using Mobile Data Collector for Wirel...
Efficient Cluster Based Data Collection Using Mobile Data Collector for Wirel...
 
Ca mwsn clustering algorithm for mobile wireless senor network [
Ca mwsn clustering algorithm for mobile wireless senor network  [Ca mwsn clustering algorithm for mobile wireless senor network  [
Ca mwsn clustering algorithm for mobile wireless senor network [
 
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
 
IRJET- Clustering Protocols in Wireless Sensor Network: A Review
IRJET-  	  Clustering Protocols in Wireless Sensor Network: A ReviewIRJET-  	  Clustering Protocols in Wireless Sensor Network: A Review
IRJET- Clustering Protocols in Wireless Sensor Network: A Review
 
Routing techniques in wireless sensor networks a survey
Routing techniques in wireless sensor networks a surveyRouting techniques in wireless sensor networks a survey
Routing techniques in wireless sensor networks a survey
 
O026084087
O026084087O026084087
O026084087
 

Viewers also liked

CH 10 Crafting the Brand Positioning
CH 10 Crafting the Brand PositioningCH 10 Crafting the Brand Positioning
CH 10 Crafting the Brand Positioning
annaguray06
 
BlueSeed_Credentials_2015
BlueSeed_Credentials_2015BlueSeed_Credentials_2015
BlueSeed_Credentials_2015
Jenda Ha
 
Crafting the brand positioning 11
Crafting the brand positioning   11Crafting the brand positioning   11
Crafting the brand positioning 11
skillfulyards
 
Chapter 12 Setting Product Strategy By Kotler
Chapter 12   Setting Product Strategy By KotlerChapter 12   Setting Product Strategy By Kotler
Chapter 12 Setting Product Strategy By Kotler
NYC1113
 

Viewers also liked (20)

Crafting the brand positioning part 2
Crafting the brand positioning part 2Crafting the brand positioning part 2
Crafting the brand positioning part 2
 
Chap 10 – Crafting the Brand Positioning
Chap 10 – Crafting the Brand PositioningChap 10 – Crafting the Brand Positioning
Chap 10 – Crafting the Brand Positioning
 
Crafting the brand positioning
Crafting the brand positioningCrafting the brand positioning
Crafting the brand positioning
 
brand positioning with examples
brand positioning with examplesbrand positioning with examples
brand positioning with examples
 
ашық сабақ паразитология)
ашық сабақ паразитология)ашық сабақ паразитология)
ашық сабақ паразитология)
 
Gestión de contenido
Gestión de contenidoGestión de contenido
Gestión de contenido
 
Mip2017 mba carrano - abstract
Mip2017 mba carrano - abstractMip2017 mba carrano - abstract
Mip2017 mba carrano - abstract
 
Land Measurement - Session 1
Land Measurement - Session 1Land Measurement - Session 1
Land Measurement - Session 1
 
Iris Recognition Using Active Contours
Iris Recognition Using Active ContoursIris Recognition Using Active Contours
Iris Recognition Using Active Contours
 
CH 10 Crafting the Brand Positioning
CH 10 Crafting the Brand PositioningCH 10 Crafting the Brand Positioning
CH 10 Crafting the Brand Positioning
 
BlueSeed_Credentials_2015
BlueSeed_Credentials_2015BlueSeed_Credentials_2015
BlueSeed_Credentials_2015
 
Brand Positioning and Communicating a Brand Positioning, Strategic Brand
Brand Positioning and Communicating a Brand Positioning, Strategic BrandBrand Positioning and Communicating a Brand Positioning, Strategic Brand
Brand Positioning and Communicating a Brand Positioning, Strategic Brand
 
ашык сабак генератор
ашык сабак генераторашык сабак генератор
ашык сабак генератор
 
Tugas[1] 0317-[tryanita]-[1411511676]
Tugas[1] 0317-[tryanita]-[1411511676]Tugas[1] 0317-[tryanita]-[1411511676]
Tugas[1] 0317-[tryanita]-[1411511676]
 
Crafting the brand positioning 11
Crafting the brand positioning   11Crafting the brand positioning   11
Crafting the brand positioning 11
 
Member report - IAB Italy - The State of Art of Adblocking in Italy
Member report - IAB Italy - The State of Art of Adblocking in ItalyMember report - IAB Italy - The State of Art of Adblocking in Italy
Member report - IAB Italy - The State of Art of Adblocking in Italy
 
IAB Spain - Programmatic Ad Buying & Selling Ecosystem
 IAB Spain - Programmatic Ad Buying & Selling Ecosystem  IAB Spain - Programmatic Ad Buying & Selling Ecosystem
IAB Spain - Programmatic Ad Buying & Selling Ecosystem
 
Philip Kotler Marketing
Philip Kotler MarketingPhilip Kotler Marketing
Philip Kotler Marketing
 
Chapter 12 Setting Product Strategy By Kotler
Chapter 12   Setting Product Strategy By KotlerChapter 12   Setting Product Strategy By Kotler
Chapter 12 Setting Product Strategy By Kotler
 
Kotler Creating Brand Equity
Kotler Creating Brand EquityKotler Creating Brand Equity
Kotler Creating Brand Equity
 

Similar to SENSOR NETWORKS BASED ON DISTRIBUTED WIRELESS SENSING

Enhanced DV Hop Localization Algorithm for Wireless Sensor Networks
Enhanced DV Hop Localization Algorithm for Wireless Sensor NetworksEnhanced DV Hop Localization Algorithm for Wireless Sensor Networks
Enhanced DV Hop Localization Algorithm for Wireless Sensor Networks
ijtsrd
 
Direct_studies_report13
Direct_studies_report13Direct_studies_report13
Direct_studies_report13
Farhad Gholami
 

Similar to SENSOR NETWORKS BASED ON DISTRIBUTED WIRELESS SENSING (20)

THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORKTHRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
THRESHOLD BASED DATA REDUCTION FOR PROLONGING LIFE OF WIRELESS SENSOR NETWORK
 
Enhanced DV Hop Localization Algorithm for Wireless Sensor Networks
Enhanced DV Hop Localization Algorithm for Wireless Sensor NetworksEnhanced DV Hop Localization Algorithm for Wireless Sensor Networks
Enhanced DV Hop Localization Algorithm for Wireless Sensor Networks
 
Iaetsd a survey on geographic routing relay selection in
Iaetsd a survey on geographic routing relay selection inIaetsd a survey on geographic routing relay selection in
Iaetsd a survey on geographic routing relay selection in
 
C1804011117
C1804011117C1804011117
C1804011117
 
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
 
An algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkAn algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor network
 
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
 
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor NetworksRedundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor Networks
 
CUBOID-BASED WIRELESS SENSOR NETWORK LOCALIZATION ALGORITHM
CUBOID-BASED WIRELESS SENSOR NETWORK LOCALIZATION ALGORITHM CUBOID-BASED WIRELESS SENSOR NETWORK LOCALIZATION ALGORITHM
CUBOID-BASED WIRELESS SENSOR NETWORK LOCALIZATION ALGORITHM
 
Data Analysis In The Cloud
Data Analysis In The CloudData Analysis In The Cloud
Data Analysis In The Cloud
 
Reliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkReliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor Network
 
Direct_studies_report13
Direct_studies_report13Direct_studies_report13
Direct_studies_report13
 
A Novel Routing Algorithm for Wireless Sensor Network Using Particle Swarm O...
A Novel Routing Algorithm for Wireless Sensor Network Using  Particle Swarm O...A Novel Routing Algorithm for Wireless Sensor Network Using  Particle Swarm O...
A Novel Routing Algorithm for Wireless Sensor Network Using Particle Swarm O...
 
Embedding Wireless Intelligent Sensors Based on Compact Measurement for Struc...
Embedding Wireless Intelligent Sensors Based on Compact Measurement for Struc...Embedding Wireless Intelligent Sensors Based on Compact Measurement for Struc...
Embedding Wireless Intelligent Sensors Based on Compact Measurement for Struc...
 
A survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networksA survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networks
 
O4102103111
O4102103111O4102103111
O4102103111
 
K017346572
K017346572K017346572
K017346572
 
A Fast Convergence and Quick Route Updates Based Energy Aware Tree-Based Rout...
A Fast Convergence and Quick Route Updates Based Energy Aware Tree-Based Rout...A Fast Convergence and Quick Route Updates Based Energy Aware Tree-Based Rout...
A Fast Convergence and Quick Route Updates Based Energy Aware Tree-Based Rout...
 
Effective range free localization scheme for wireless sensor network
Effective range  free localization scheme for wireless sensor networkEffective range  free localization scheme for wireless sensor network
Effective range free localization scheme for wireless sensor network
 

Recently uploaded

Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 

Recently uploaded (20)

S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 

SENSOR NETWORKS BASED ON DISTRIBUTED WIRELESS SENSING

  • 1. S.Esakki Rajavel et al., International Journal of Advanced Research in Innovative Discoveries in Engineering and Applications[IJARIDEA] Vol.2, Issue 1,27 February 2017, pg. 11-17 11 © 2017, IJARIDEA All Rights Reserved SENSOR NETWORKS BASED ON DISTRIBUTED WIRELESS SENSING S.Esakki Rajavel1 , Shubha Shree.P2 , Sushma Thavakumari.A3 , G.ThangaKumari4 1 Assistant Professor, Department of ECE, Francis Xavier Engineering College, Tirunelveli, India 2,3,4 UG Scholar, Francis Xavier Engineering College, Tirunelveli, India Abstract— Exponential data transfer capacity scaling has been an essential driver of the development and fame of the Internet. Nonetheless, increments in transmission capacity have been joined by increments in power utilization, and in spite of maintained framework plan endeavors to address control request, noteworthy mechanical difficulties remain that debilitate to moderate future data transfer capacity development. In this paper we depict the power and related warmth administration challenges in today's switches. We advocate a wide way to deal with tending to this issue incorporates making power-mindfulness an essential target in the plan and setup of systems, and in the outline and usage of system conventions. We bolster our contentions by giving a contextual analysis of force requests of two standard switch stages that empowers us to make a non specific model for switch control utilization. We apply this model in an arrangement of target system setups and utilize blended whole number enhancement strategies to explore control utilization, execution and strength in static system outline and in element steering. Our outcomes show the potential for huge power reserve funds in operational systems by including power-mindfulness. Keywords— CR; Dynamic Source Routing Protocol; SENMA. I. INTRODUCTION In prior circumstances, Sensor Networks included sensor hubs and every one of the hubs are associated with a typical Central preparing framework. Be that as it may, these days appropriated remote detecting is utilized. It is favorable in the way, that it detects the nearest hub when the correct area of a specific wonder is obscure .Also, various sensor hubs would defeat the hindrances in the earth, for example, Line of sight requirements, checks et cetera. There is no current foundation for the earth to be checked in the event of either vitality or correspondence. It is vital for sensor hubs that, it ought to transmit the data through remote channels utilizing minimum measure of vitality [1]. For this reason SENMA (Wireless Sensor Networks Mobile Access Point) is utilized. This goes through the system to gather the data from every hub. The benefit of SENMA over different models is that it generally takes after an observable pathway way to any point inside the power scope of the hubs. By this procedure the data can be passed on with no steering. Consequently it is a vitality proficient design for the sensor systems. Sensor arranges additionally requires conveyed handling ability since, correspondence requires more measure of vitality. In the event that the separation of correspondence is long more vitality is expended. So it ought to be prepared locally as the number bits required for transmission will be lessened. Here, the modest accumulation administrations, for example, number and whole are proposed utilizing tree based calculation for registering the totals. Likewise the request measurement registered utilizing this calculation is proposed. The correspondence misfortune issue in this calculation can be tended to with a structure known as summary dispersion utilizing Ring Topology. The term Data Survival is characterized as that how the information
  • 2. S.Esakki Rajavel et al., International Journal of Advanced Research in Innovative Discoveries in Engineering and Applications[IJARIDEA] Vol.2, Issue 1,27 February 2017, pg. 11-17 12 © 2017, IJARIDEA All Rights Reserved is ensured when there is no accessibility of base station. It survives just when the information is transmitted to the base station with no progressions because of any contention. II. SYSTEM MODEL In proposed framework, the objective restriction issue is examined by making utilization of minimal effort and less power expending remote sensors. The sensors sends their approximated estimations over the remote channels and the combination focus ascertains the area of the objective in view of the got information. In any case, there are a few blemishes in the framework. One is, the remote correspondence channels between the sensors and the focuses have some deformity. The other is that, sensors have constraints as far as the extents they sense, vitality and their computational capacity. For that the disseminated Cryptography method is utilized so that, the information transmission is successfully secured [2]. The benefits of the proposed framework is that, it utilizes randomized directing to give obscurity assurance. The info Screen ought to give simple route without abusing the approval of information. Input configuration is characterized as the procedure by which the client information is changed over into PC based arrangement. In the event that the info information is not legitimate there might be some mistake in the information preparing. A. Framework Description The steps followed in System Description are, The inspected information is tried with a created programming If any mistake is distinguished it ought to be expelled. B. Module Description The execution of this system is computed by the beforehand utilized remote correspondence organizing components. It can likewise be assessed utilizing a chart. The chart clarifies about the parcel drop and bundle misfortune investigation. The investigation of information collection is likewise given in detail by the diagram. • Network Designing This module gives the insights about how a system ought to be utilized. That is it gives the areas where the sensor hubs are put in the remote system. It likewise incorporates the sink creation handle. • Collection of Data with MA focuses In this module the information combination in the remote sensor system is thought about utilizing SENMA under the Byzantine assault in both static and element conditions. In this, the vindictive hubs gives a false data .This happens inside a settled or fluctuating likelihood as for time. The SENMA gathers the information outline the sensor hubs. • Detection of Malicious Nodes The malignant hubs can be recognized by a basic and successful approach .It should be possible by contrasting the choices of the sensors and that of the combination focus. Therefore of Observation it is said that, it sets aside longer opportunity to distinguish dynamic assault that the static assaults. It likewise requires complex calculation to be
  • 3. S.Esakki Rajavel et al., International Journal of Advanced Research in Innovative Discoveries in Engineering and Applications[IJARIDEA] Vol.2, Issue 1,27 February 2017, pg. 11-17 13 © 2017, IJARIDEA All Rights Reserved distinguished. The vindictive location system that has been proposed can distinguish the pernicious sensors precisely if there is sufficient time for perception. It is investigated utilizing an entropy based trust show. C. Dynamic Source Routing Protocol DSR is a receptive directing convention which can deal with a MANET without utilizing intermittent table-refresh messages like table-driven steering conventions do. DSR was particularly intended for use in multi-jump remote impromptu systems. Specially appointed convention permits the system to be totally self-sorting out and self-arranging which implies that there is no requirement for a current system foundation or organization. For confining the data transfer capacity, the procedure to discover a way is just executed when a way is required by a hub (On-Demand-Routing). In DSR the sender (source, initiator) decides the entire way from the source to the goal hub (Source-Routing) and stores the locations of the middle hubs of the course in the bundles. Contrasted with other receptive directing conventions like ABR or SSA, DSR is signal less which implies that there are no welcome messages utilized between the hubs to tell their neighbors about her nearness. DSR contains 2 stages • Route Discovery (discover a way) • Route Maintenance (keep up a way) D. Route Discovery Fig.1. Route discovery block diagram On the off chance that hub A has in his Route Cache a course to the goal E, this course is quickly utilized. If not, the Route Discovery convention is begun: 1. Node An (initiator) sends a Route Request parcel by flooding the system 2. If hub B has as of late observed another Route Request from a similar target or if the address of hub B is now recorded in the Route Record Then hub B disposes of the demand! 3. If hub B is the objective of the Route Discovery, it gives back a Route Reply to the initiator. The Route Reply contains a rundown of the "best" way from the initiator to the objective. At the point when the initiator gets this Route Reply, it stores this course in its Route Cache for use in sending consequent bundles to this goal. 4. Otherwise hub B isn't the objective and it advances the Route Request to his neighbors (but to the initiator). Way discovering process: Route Request and Route Reply
  • 4. S.Esakki Rajavel et al., International Journal of Advanced Research in Innovative Discoveries in Engineering and Applications[IJARIDEA] Vol.2, Issue 1,27 February 2017, pg. 11-17 14 © 2017, IJARIDEA All Rights Reserved The figure expresses the procedure of course disclosure through communicating RREQ course ask for message to neighbors for finding most brief way to goal Fig.2. Path Finding Process(route request) Fig.2. states the process of route reply message, the destination node replies a RREP message to the source node indicating the stable path for transmitting data Fig.3. Route Reply E. Route Maintenance In DSR each hub is in charge of affirming that the following bounce in the Source Route gets the parcel. Likewise every bundle is just sent once by a hub (bounce by-jump steering). In the event that a bundle can't be gotten by a hub, it is retransmitted up to some most extreme number of times until an affirmation is gotten from the following jump. Just if retransmission comes about then in a disappointment, a Route Error message is sent to the initiator that can expel that Source Route from its Route Cache. So the initiator can check his Route Cache for another course to the objective. On the off chance that there is no course in the reserve, a Route Request parcel is communicated.
  • 5. S.Esakki Rajavel et al., International Journal of Advanced Research in Innovative Discoveries in Engineering and Applications[IJARIDEA] Vol.2, Issue 1,27 February 2017, pg. 11-17 15 © 2017, IJARIDEA All Rights Reserved 1. If hub C does not get an affirmation from hub D after some number of solicitations, it gives back a Route Error to the initiator A. 2. As soon as hub gets the Route Error message, it erases the broken-interface course from its store. In the event that A has another course to E, it sends the parcel promptly utilizing this new course. 3. Otherwise the initiator An is beginning the Route Discovery handle once more. III. SIMULATION RESULTS We simulate the proposed algorithm via ns-2(version 2.31) simulator with the CR transmission model, which is based on Cognitive Radio Cognitive Network Simulator A. Generation of nodes Fig.4. Generation of nodes Fig.4. shows a node creation. The node can be created with its node type, size and properties. Created node can be located in the network. In this assume 10 nodes B. Location of secondary users Fig.2. shows the location of secondary users . Each SU is equipped with one or more cognitive radios which are capable of identifying available channels (i.e., not occupied by PUs) and hopping between them. In addition, SUs should locate each other via a “rendezvous” process. In process process of rendezvous, SUs meet and establish a link. Fig.2. Location of secondary users
  • 6. S.Esakki Rajavel et al., International Journal of Advanced Research in Innovative Discoveries in Engineering and Applications[IJARIDEA] Vol.2, Issue 1,27 February 2017, pg. 11-17 16 © 2017, IJARIDEA All Rights Reserved C. Analysis of Packet Delivery Fig.3. Analysis of Packet Delivery D. Throughput analysis Fig.4. Throughput analysis of given protocol Fig.4. shows the throughput analysis of the given protocol IV.CONCLUSION Exponential data transfer capacity scaling has been an essential driver of the development and fame of the Internet. Nonetheless, increments in transmission capacity have been joined by increments in power utilization, and in spite of maintained framework plan endeavors to address control request, noteworthy mechanical difficulties remain that debilitate to moderate future data transfer capacity development. In this paper we depict the power and related warmth administration challenges in today's switches. We advocate a wide way to deal with tending to this issue incorporates making power-mindfulness an essential target in the plan and setup of systems, and in the outline and usage of system conventions. We bolster our contentions by giving a contextual analysis of force requests of two standard switch stages
  • 7. S.Esakki Rajavel et al., International Journal of Advanced Research in Innovative Discoveries in Engineering and Applications[IJARIDEA] Vol.2, Issue 1,27 February 2017, pg. 11-17 17 © 2017, IJARIDEA All Rights Reserved that empowers us to make a non specific model for switch control utilization. We apply this model in an arrangement of target system setups and utilize blended whole number enhancement strategies to explore control utilization, execution and strength in static system outline and in element steering. Our outcomes show the potential for huge power reserve funds in operational systems by including power-mindfulness. REFERENCES [1] S.Esakki Rajavel, C.Jenita Blesslin, “Energetic Spectrum Sensing For Cognitive Radio Enabled Remote State Estimation Over Wireless Channels”, International Journal of Advanced Research Trends in Engineering and Technology (IJARTET), Vol. 3, Special Issue 19, April 2016 (12 – 15). [2] S.Esakki Rajavel, Mr.B.Pradheep T Rajan, E.Edinda Christy, “Energy Efficient Collaborative Spectrum Sensing in Cognitive Radio Networks” GRD Journals- Global Research and Development Journal for Engineering, Volume 2 ,Issue 1 ,December 2016. [3] M. Wegmuller, J. P. von der Weid, P. Oberson, and N. Gisin, “High resolution fiber distributed measurements with coherent OFDR,” in Proc. ECOC’00, 2000, paper 11.3.4, p. 109. [4] R. E. Sorace, V. S. Reinhardt, and S. A. Vaughn, “High-speed digital-to-RF converter,” U.S. Patent 5 668 842, Sept. 16, 1997. [5] (2002) The IEEE website. [Online]. Available: http://www.ieee.org/ [6] M. Shell. (2002) IEEEtran homepage on CTAN. [Online]. Available: http://www.ctan.org/tex- archive/macros/latex/contrib/supported/IEEEtran/ [7] FLEXChip Signal Processor (MC68175/D), Motorola, 1996. [8] “PDCA12-70 data sheet,” Opto Speed SA, Mezzovico, Switzerland. [9] A. Karnik, “Performance of TCP congestion control with rate feedback: TCP/ABR and rate adaptive TCP/IP,” M. Eng. thesis, Indian Institute of Science, Bangalore, India, Jan. 1999. [10] J. Padhye, V. Firoiu, and D. Towsley, “A stochastic model of TCP Reno congestion avoidance and control,” Univ. of Massachusetts, Amherst, MA, CMPSCI Tech. Rep. 99-02, 1999. [11] Dr. K. Madhavi, N. Ushasree, "A Fuzzy Based Dynamic Queue Management Approach to Improve QOS in Wireless sensor Networks.", International Journal of Advanced Research in Innovative Discoveries in Engineering and Applications[IJARIDEA], Volume 1,Issue 1,October 2016, pp:16-21.