SlideShare a Scribd company logo
1 of 5
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. I (Jan – Feb. 2015), PP 43-47
www.iosrjournals.org
DOI: 10.9790/0661-17114347 www.iosrjournals.org 43 | Page
A Data Transmission Technique Based On RSSI in an Ad-Hoc
Network
1
Aninditanath, 2
Suchismitamitra, 3
Puspendu Roy, 4
Abhirupbhawal,
5
Pradip Kumar Das
Abstract: In this paper we are proposing an intelligent routing protocol that routes the data from a given
source node and a destination node in an in the floor ad-hoc network. We have used Bluetooth as the medium of
transmission. Our system works in two different ways depending on the size of the packet. There are some pre-
defined paths for a set of source and destination nodes. If the packet size is smaller than our threshold value, the
system follows the static and pre-defined paths. On the other hand, if the packet size exceeds the threshold
value, then the system dynamically determines the path in runtime. It calculates the distance of the nearby nodes
based on the Received Signal Strength Indicator (RSSI). After that, according to the distance calculated, it
transmits the packet to reach its destination.
Keywords: Gossip Routing Protocol, Ad-Hoc Network, Received Signal Strength Indicator, Epidemic Data
Collection Protocol, Bluetooth
I. Introduction
The technologies we have used in our system are Gossip Routing Protocol and Bluetooth as the
medium of transmission of data.
Gossip Routing Protocol
Gossip Routing Protocol is a communication protocol among computer systems mimicking the form of
gossip seen in social networks. The protocol serves an easy way of communication among large networks, large
scale distributed systems and is one of the most efficient ones in simplicity, scalability, and high reliability even
in constantly changing environment. Moreover, in this approach each node forwards a message with some
probability to reduce the overhead of the routing protocols.
Bluetooth
Bluetooth is a wireless technology standard for exchanging data over short distances and operates in
the 2.4 GHz frequency band without a license for wireless communication. This communication protocol has
primarily been designed for low-power consumption and low cost. This technology can be used for real-time
data transfer usually between 10-100 meters which is reasonable within a small building. Moreover, the data-
transfer rate of the Bluetooth Technology is quite acceptable i.e. 3-4 Mbps.
Ad-hoc network
The wireless ad-hoc network is used in our project. It’s basically a decentralized, infrastructure-less
network because it doesn’t rely on a pre-existing infrastructure like the routers or access points. The nodes in
this kind of network is completely dynamic. In this system, each node that participates in data transmission,
dynamically determines the node to whom the data needs to be forwarded.
II. Motivation
In traditional Ad-Hoc networks, all the nodes are not always static. The existing routing protocols are
based on the consideration that the nodes in the network are static and fixed. In the primitive stage we thought of
a routing protocol which will consider that the nodes in the network are not static. The preliminary issue of the
static routing protocol is in some cases the data may not be transferred because, one or multiple node in the
static path are down. In that case the path will be broken. We took that in consideration and thought of designing
a system that will dynamically determine the path in runtime. Moreover, to reduce the complicacy of the system,
we introduced the gossip routing protocol in an intelligent way instead of maintaining a bulky routing table.
III. Methodology
Our system can be divided mainly in three sections. Firstly, we are routing the data in the network
according to the previously mapped fixed distance between the nodes, without considering the fact that the
nodes can be mobile and the actual distance may vary in runtime. Secondly to solve this problem we are
A data transmission technique based on RSSI in an ad-hoc network
DOI: 10.9790/0661-17114347 www.iosrjournals.org 44 | Page
determining the nearest nodes from a particular node according to the Received Signal Strength Indicator. To
determine the RSSI we have transmitted a fixed size packet to all nearby nodes with a request for responding
back. According to the response time of each node, we are determining the RSSI. Thirdly, we are routing the
data using that dynamically determined protocol to increase reliability. The elaborate and detailed description of
those sections are followed.
a. Determining the path statically when the packet size is smaller than 1024 bytes:
Having the nodes fixed within a floor area, we have fixed co-ordinates of those nodes. We have built a
map of the nodes. Using the pre-built map, we determined the paths manually and saved in the data structures
we have used in our system. Now, once a packet is generated and it is to be sent to a destination node, we are
searching for the pair of that particular source node and the destination node. A pre-defined will be fetched from
the data structure that we have saved earlier. Now, according to that path, the packet is sent from source to
destination node.
Step Algorithm:
The algorithm that is being followed for routing the packets in static path is described below.
Step 1 – The packet is generated at the source node.
Step 2 – The size of the packet is determined and checked with the threshold of 1024 bytes.
Step 3 – If the size of the packet is less than the threshold value, the system will determine the path statically
and route the packet.
Step 4 –At each node a map of devices is maintained for static routing. In that map a fixed path is defined for a
given destination node from that source node.
Step 5 – That path is fetched from the defined map and the transmission is initiated according to the path.
Step 6 – The packet reaches the destination node in the end according to that path.
Flow Diagram:
The following figure i.e. Fig. 1 represents the flow diagram of the process that is being followed to
determine the path statically.
Fig. 1 – Flow diagram for determining the path statically from a pre-defined set of
Paths given a source node and destination node
b. Determining the RSSI from time taken for transmitting a fixed size packet in different distances:
As we have proposed earlier that for the packets with a packet size of more than 1024 bytes, we will
route the packet determining the path dynamically in the run-time, we need to find out the distance of the nearby
nodes from the current node. We have designed an algorithm for calculating the distance. We have taken two
things under consideration. Firstly, how the time taken for transmission varies with the increase of packet size.
Secondly, how the time factor depends on the distance between nodes. Signal strength is directly proportional
with the time taken for transmission. Now, according to the variation of the time taken by the nodes, we can
determine the received signal strength. The following figure is showing our approach for determining the
received signal strength indicator measuring the time taken by the nodes for transmitting a single packet.
Step Algorithm:
Step 1 – After the packet is generated at the source node, the size of the packet is determined.
Step 2 – If the packet size is more than 1024 bytes, the path will be routed using dynamic path determined in
runtime according to the distance of the nearby nodes from that node.
A data transmission technique based on RSSI in an ad-hoc network
DOI: 10.9790/0661-17114347 www.iosrjournals.org 45 | Page
Step 3 – To determine the distance received signal strength is calculated.
Step 4 – A request for response is sent to all the nearby nodes.
Step 5 – After receiving all the requests from all the nodes, the time is calculated individually for each node.
Step 6 – Then the distance is calculated according to the time taken and temporarily stored.
Step 7 – Sorting the distances we are selecting the node with minimum distance, i.e. the nearest node.
Step 8 – The packet is sent to the selected node.
Flow Diagram:
Fig. 2 depicts the flow diagram that is being followed for determining the received signal
Strength indicator using the time taken for response.
Fig. 2 – Flow diagram for determining the signal strength
c. Determining the path dynamically when the packet size is more than 1024 bytes:
As discussed earlier, our system is routing the packets having packet size of more than 1024 bytes
using a dynamic path determined in the runtime. Now, when a packet is ready for transmission at the source
node, it first sends a dummy packet with a request to response to the nearby nodes. Then it waits for the
response to receive. After that, it calculates the time of response for each node and determines the signal
strength in the method as described earlier. According the RSSI calculated, it determines the nearest node from
itself and it sends the packet to the nearest node. The packet contains a flag showing whether it should be routed
using a static path or a dynamic path. If it is dynamic, the next node follows the same process except the node
from which it has received the packet. In this way, finally using the dynamic path, the packet reaches the
destination node. Following flow diagram shows how the path is being determined in the run time.
Step Algorithm:
Step 1 –The packet is generated in the source node.
Step 2 – The size of the packet is determined and checked with the threshold value.
Step 3 – If the size of the packet is more than the threshold value, the packet is routed using the path that is
being determined dynamically.
Step 4 – Now, distances are calculated from using the method described above.
Step 5 –According to the distances calculated, the node having minimum distance is determined, i.e. the
nearest node.
Step 6 – The routing is initiated in dynamical method.
Step 7 – Following the steps the packet reaches the destination node.
Flow Diagram:
The following figure, i.e. Fig. 3 is showing the flow diagram that is being used for routing the packets
with packet size more than 1024 bytes. The path for routing that packet is determined dynamically in run time.
A data transmission technique based on RSSI in an ad-hoc network
DOI: 10.9790/0661-17114347 www.iosrjournals.org 46 | Page
Fig. 3 – Flow diagram of the dynamic path determination
d. Data Structures
In our system we have used data structure stored in binary files to store the important information like
the location of each node, or the static paths to be followed to reach any node. We have avoided the use of
database to make our system lighter and more efficient. The following snapshot is showing one of those data
structures.
Fig. 4 – Data Structure we are using to store data
IV. Results And Discussion
The following figure i.e. Fig. 5 depicts the path that has been determined using static routing by our
system, when the source node is mac2 and the destination node is mac40 and the packet size is 512 bytes.
Fig. 5 – Shows the routing of data in static method when source node is mac2 and destination
node is mac40 and the packet size being 512 bytes.
In Fig. 6 we are showing the path when the source and destination node are same as the previous one,
i.e. mac2and mac40 respectively, but the packet size has been changed to 2048 bytes. Now, as the packet size
exceeds our threshold, our system is routing the packet using dynamic routing. Thus, the path between two same
nodes are different.
Fig. 6 – Shows the routing of data in dynamic method, when source node is mac2 and destination
A data transmission technique based on RSSI in an ad-hoc network
DOI: 10.9790/0661-17114347 www.iosrjournals.org 47 | Page
Node is mac40 and the packet size being 2048 bytes.
Now as the above two pictures suggests, depending on the packet size, the method for routing the
packets varies and so as the path. The static routing protocol has some disadvantages. As the paths are
predefined, we cannot determine whether all the nodes are active or not. Now during transmission, if a node is
down or inactive, then the path will be broken and the packet will not reach the destination. In the contrary,
during dynamic routing we are checking the distances of the nearby active nodes. Thus, if a particular node is
down, our system will be able to transmit the data successfully using dynamic routing protocol.
V. Conclusion And Future Work
Our system is working as per our expectation. The algorithms that was initially sketched upon papers
with pencils using the mathematical formulas and concepts are working in a real life system. Moreover, we are
still working in the system to make it further better. In future we will try to integrate this system with body area
network and wearable system so that it can be used to ease our daily life burdens and tasks that we perform
every day.
Acknowledgement
We sincerely thank Mr. AvranilTah, Founder of ESL and Mr. Arnab Pal, Techno-Marketing Consultant
of ESL for guiding us during the project. Their help in this project really made our task easy. We faced many
difficulties in that period of time, regarding the transmission of Bluetooth which we ultimately managed to solve
by their intense guidance. Moreover, we want to thank our colleagues and friends for drawing our attention to
the most important and vital overlooked points.

More Related Content

What's hot

MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
IOSR Journals
 
Wireless sensor networks routing protocols
Wireless sensor networks routing protocolsWireless sensor networks routing protocols
Wireless sensor networks routing protocols
sourabhshivtiwari
 
Reference broadcast synchronization and time division multiple access impleme...
Reference broadcast synchronization and time division multiple access impleme...Reference broadcast synchronization and time division multiple access impleme...
Reference broadcast synchronization and time division multiple access impleme...
TELKOMNIKA JOURNAL
 
Energy efficient routing_in_wireless_sensor_networks
Energy efficient routing_in_wireless_sensor_networksEnergy efficient routing_in_wireless_sensor_networks
Energy efficient routing_in_wireless_sensor_networks
Gr Patel
 

What's hot (17)

Aa35152156
Aa35152156Aa35152156
Aa35152156
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
 
TRUST ASSESSMENT THROUGH FTA APPROACH IN AD-HOC NETWORK
TRUST ASSESSMENT THROUGH FTA APPROACH IN AD-HOC NETWORKTRUST ASSESSMENT THROUGH FTA APPROACH IN AD-HOC NETWORK
TRUST ASSESSMENT THROUGH FTA APPROACH IN AD-HOC NETWORK
 
Protocols and standards
Protocols and standardsProtocols and standards
Protocols and standards
 
Lab Seminar 2009 12 01 Message Drop Reduction And Movement
Lab Seminar 2009 12 01  Message Drop Reduction And MovementLab Seminar 2009 12 01  Message Drop Reduction And Movement
Lab Seminar 2009 12 01 Message Drop Reduction And Movement
 
B010340611
B010340611B010340611
B010340611
 
JPJ1410 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
JPJ1410  PACK: Prediction-Based Cloud Bandwidth and Cost Reduction SystemJPJ1410  PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
JPJ1410 PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
 
8 Packet Switching
8 Packet Switching8 Packet Switching
8 Packet Switching
 
Advanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load BalancingAdvanced delay reduction algorithm based on GPS with Load Balancing
Advanced delay reduction algorithm based on GPS with Load Balancing
 
Wireless sensor networks routing protocols
Wireless sensor networks routing protocolsWireless sensor networks routing protocols
Wireless sensor networks routing protocols
 
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKIMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
 
Reference broadcast synchronization and time division multiple access impleme...
Reference broadcast synchronization and time division multiple access impleme...Reference broadcast synchronization and time division multiple access impleme...
Reference broadcast synchronization and time division multiple access impleme...
 
Ieeepro techno solutions 2014 ieee java project - cloud bandwidth and cost ...
Ieeepro techno solutions   2014 ieee java project - cloud bandwidth and cost ...Ieeepro techno solutions   2014 ieee java project - cloud bandwidth and cost ...
Ieeepro techno solutions 2014 ieee java project - cloud bandwidth and cost ...
 
Energy efficient routing_in_wireless_sensor_networks
Energy efficient routing_in_wireless_sensor_networksEnergy efficient routing_in_wireless_sensor_networks
Energy efficient routing_in_wireless_sensor_networks
 
A2546035115
A2546035115A2546035115
A2546035115
 
Fa25939942
Fa25939942Fa25939942
Fa25939942
 

Viewers also liked

Evaluations of the Effect of Workshop/Laboratory Accidents and Precautionary ...
Evaluations of the Effect of Workshop/Laboratory Accidents and Precautionary ...Evaluations of the Effect of Workshop/Laboratory Accidents and Precautionary ...
Evaluations of the Effect of Workshop/Laboratory Accidents and Precautionary ...
IOSR Journals
 

Viewers also liked (20)

D017412935
D017412935D017412935
D017412935
 
G1303074851
G1303074851G1303074851
G1303074851
 
F1803042939
F1803042939F1803042939
F1803042939
 
H012445056
H012445056H012445056
H012445056
 
F1803042939
F1803042939F1803042939
F1803042939
 
D010612126
D010612126D010612126
D010612126
 
O01061103111
O01061103111O01061103111
O01061103111
 
Bandwidth enhancement of rectangular microstrip patch antenna using slots
Bandwidth enhancement of rectangular microstrip patch antenna using slotsBandwidth enhancement of rectangular microstrip patch antenna using slots
Bandwidth enhancement of rectangular microstrip patch antenna using slots
 
O0123190100
O0123190100O0123190100
O0123190100
 
D010212533
D010212533D010212533
D010212533
 
E017131924
E017131924E017131924
E017131924
 
K1102026568
K1102026568K1102026568
K1102026568
 
B1103031217
B1103031217B1103031217
B1103031217
 
B018211016
B018211016B018211016
B018211016
 
C017351116
C017351116C017351116
C017351116
 
A017120105
A017120105A017120105
A017120105
 
Evaluations of the Effect of Workshop/Laboratory Accidents and Precautionary ...
Evaluations of the Effect of Workshop/Laboratory Accidents and Precautionary ...Evaluations of the Effect of Workshop/Laboratory Accidents and Precautionary ...
Evaluations of the Effect of Workshop/Laboratory Accidents and Precautionary ...
 
B017531518
B017531518B017531518
B017531518
 
A010330106
A010330106A010330106
A010330106
 
I011138286
I011138286I011138286
I011138286
 

Similar to I017114347

Similar to I017114347 (20)

Paper id 42201621
Paper id 42201621Paper id 42201621
Paper id 42201621
 
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETProviding A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
 
Network layer (Unit 3) part1.pdf
Network  layer (Unit 3) part1.pdfNetwork  layer (Unit 3) part1.pdf
Network layer (Unit 3) part1.pdf
 
IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...
IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...
IEEE 2014 JAVA NETWORKING PROJECTS Optimal multicast capacity and delay trade...
 
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
 
Optimal multicast capacity and delay tradeoffs in mane ts
Optimal multicast capacity and delay tradeoffs in mane tsOptimal multicast capacity and delay tradeoffs in mane ts
Optimal multicast capacity and delay tradeoffs in mane ts
 
Optimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANETOptimized Fuzzy Routing for MANET
Optimized Fuzzy Routing for MANET
 
D017252327
D017252327D017252327
D017252327
 
Float-based Pipeline Monitoring Network
Float-based Pipeline Monitoring NetworkFloat-based Pipeline Monitoring Network
Float-based Pipeline Monitoring Network
 
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRMMDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
 
JPD1428 Multicast Capacity in MANET with Infrastructure Support
JPD1428  Multicast Capacity in MANET with Infrastructure SupportJPD1428  Multicast Capacity in MANET with Infrastructure Support
JPD1428 Multicast Capacity in MANET with Infrastructure Support
 
Improvising Network life time of Wireless sensor networks using mobile data a...
Improvising Network life time of Wireless sensor networks using mobile data a...Improvising Network life time of Wireless sensor networks using mobile data a...
Improvising Network life time of Wireless sensor networks using mobile data a...
 
Adaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networksAdaptive opportunistic routing for wireless ad hoc networks
Adaptive opportunistic routing for wireless ad hoc networks
 
QOD routing protocols : phase 1 ppt
QOD routing  protocols : phase 1 pptQOD routing  protocols : phase 1 ppt
QOD routing protocols : phase 1 ppt
 
Hop by-hoproutinginwirelessmeshnetworkswithbandwidthguarantees-140918031049-p...
Hop by-hoproutinginwirelessmeshnetworkswithbandwidthguarantees-140918031049-p...Hop by-hoproutinginwirelessmeshnetworkswithbandwidthguarantees-140918031049-p...
Hop by-hoproutinginwirelessmeshnetworkswithbandwidthguarantees-140918031049-p...
 
“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...
 
G1063841
G1063841G1063841
G1063841
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
A Fast Convergence and Quick Route Updates Based Energy Aware Tree-Based Rout...
A Fast Convergence and Quick Route Updates Based Energy Aware Tree-Based Rout...A Fast Convergence and Quick Route Updates Based Energy Aware Tree-Based Rout...
A Fast Convergence and Quick Route Updates Based Energy Aware Tree-Based Rout...
 
K017346572
K017346572K017346572
K017346572
 

More from IOSR Journals

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 

I017114347

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. I (Jan – Feb. 2015), PP 43-47 www.iosrjournals.org DOI: 10.9790/0661-17114347 www.iosrjournals.org 43 | Page A Data Transmission Technique Based On RSSI in an Ad-Hoc Network 1 Aninditanath, 2 Suchismitamitra, 3 Puspendu Roy, 4 Abhirupbhawal, 5 Pradip Kumar Das Abstract: In this paper we are proposing an intelligent routing protocol that routes the data from a given source node and a destination node in an in the floor ad-hoc network. We have used Bluetooth as the medium of transmission. Our system works in two different ways depending on the size of the packet. There are some pre- defined paths for a set of source and destination nodes. If the packet size is smaller than our threshold value, the system follows the static and pre-defined paths. On the other hand, if the packet size exceeds the threshold value, then the system dynamically determines the path in runtime. It calculates the distance of the nearby nodes based on the Received Signal Strength Indicator (RSSI). After that, according to the distance calculated, it transmits the packet to reach its destination. Keywords: Gossip Routing Protocol, Ad-Hoc Network, Received Signal Strength Indicator, Epidemic Data Collection Protocol, Bluetooth I. Introduction The technologies we have used in our system are Gossip Routing Protocol and Bluetooth as the medium of transmission of data. Gossip Routing Protocol Gossip Routing Protocol is a communication protocol among computer systems mimicking the form of gossip seen in social networks. The protocol serves an easy way of communication among large networks, large scale distributed systems and is one of the most efficient ones in simplicity, scalability, and high reliability even in constantly changing environment. Moreover, in this approach each node forwards a message with some probability to reduce the overhead of the routing protocols. Bluetooth Bluetooth is a wireless technology standard for exchanging data over short distances and operates in the 2.4 GHz frequency band without a license for wireless communication. This communication protocol has primarily been designed for low-power consumption and low cost. This technology can be used for real-time data transfer usually between 10-100 meters which is reasonable within a small building. Moreover, the data- transfer rate of the Bluetooth Technology is quite acceptable i.e. 3-4 Mbps. Ad-hoc network The wireless ad-hoc network is used in our project. It’s basically a decentralized, infrastructure-less network because it doesn’t rely on a pre-existing infrastructure like the routers or access points. The nodes in this kind of network is completely dynamic. In this system, each node that participates in data transmission, dynamically determines the node to whom the data needs to be forwarded. II. Motivation In traditional Ad-Hoc networks, all the nodes are not always static. The existing routing protocols are based on the consideration that the nodes in the network are static and fixed. In the primitive stage we thought of a routing protocol which will consider that the nodes in the network are not static. The preliminary issue of the static routing protocol is in some cases the data may not be transferred because, one or multiple node in the static path are down. In that case the path will be broken. We took that in consideration and thought of designing a system that will dynamically determine the path in runtime. Moreover, to reduce the complicacy of the system, we introduced the gossip routing protocol in an intelligent way instead of maintaining a bulky routing table. III. Methodology Our system can be divided mainly in three sections. Firstly, we are routing the data in the network according to the previously mapped fixed distance between the nodes, without considering the fact that the nodes can be mobile and the actual distance may vary in runtime. Secondly to solve this problem we are
  • 2. A data transmission technique based on RSSI in an ad-hoc network DOI: 10.9790/0661-17114347 www.iosrjournals.org 44 | Page determining the nearest nodes from a particular node according to the Received Signal Strength Indicator. To determine the RSSI we have transmitted a fixed size packet to all nearby nodes with a request for responding back. According to the response time of each node, we are determining the RSSI. Thirdly, we are routing the data using that dynamically determined protocol to increase reliability. The elaborate and detailed description of those sections are followed. a. Determining the path statically when the packet size is smaller than 1024 bytes: Having the nodes fixed within a floor area, we have fixed co-ordinates of those nodes. We have built a map of the nodes. Using the pre-built map, we determined the paths manually and saved in the data structures we have used in our system. Now, once a packet is generated and it is to be sent to a destination node, we are searching for the pair of that particular source node and the destination node. A pre-defined will be fetched from the data structure that we have saved earlier. Now, according to that path, the packet is sent from source to destination node. Step Algorithm: The algorithm that is being followed for routing the packets in static path is described below. Step 1 – The packet is generated at the source node. Step 2 – The size of the packet is determined and checked with the threshold of 1024 bytes. Step 3 – If the size of the packet is less than the threshold value, the system will determine the path statically and route the packet. Step 4 –At each node a map of devices is maintained for static routing. In that map a fixed path is defined for a given destination node from that source node. Step 5 – That path is fetched from the defined map and the transmission is initiated according to the path. Step 6 – The packet reaches the destination node in the end according to that path. Flow Diagram: The following figure i.e. Fig. 1 represents the flow diagram of the process that is being followed to determine the path statically. Fig. 1 – Flow diagram for determining the path statically from a pre-defined set of Paths given a source node and destination node b. Determining the RSSI from time taken for transmitting a fixed size packet in different distances: As we have proposed earlier that for the packets with a packet size of more than 1024 bytes, we will route the packet determining the path dynamically in the run-time, we need to find out the distance of the nearby nodes from the current node. We have designed an algorithm for calculating the distance. We have taken two things under consideration. Firstly, how the time taken for transmission varies with the increase of packet size. Secondly, how the time factor depends on the distance between nodes. Signal strength is directly proportional with the time taken for transmission. Now, according to the variation of the time taken by the nodes, we can determine the received signal strength. The following figure is showing our approach for determining the received signal strength indicator measuring the time taken by the nodes for transmitting a single packet. Step Algorithm: Step 1 – After the packet is generated at the source node, the size of the packet is determined. Step 2 – If the packet size is more than 1024 bytes, the path will be routed using dynamic path determined in runtime according to the distance of the nearby nodes from that node.
  • 3. A data transmission technique based on RSSI in an ad-hoc network DOI: 10.9790/0661-17114347 www.iosrjournals.org 45 | Page Step 3 – To determine the distance received signal strength is calculated. Step 4 – A request for response is sent to all the nearby nodes. Step 5 – After receiving all the requests from all the nodes, the time is calculated individually for each node. Step 6 – Then the distance is calculated according to the time taken and temporarily stored. Step 7 – Sorting the distances we are selecting the node with minimum distance, i.e. the nearest node. Step 8 – The packet is sent to the selected node. Flow Diagram: Fig. 2 depicts the flow diagram that is being followed for determining the received signal Strength indicator using the time taken for response. Fig. 2 – Flow diagram for determining the signal strength c. Determining the path dynamically when the packet size is more than 1024 bytes: As discussed earlier, our system is routing the packets having packet size of more than 1024 bytes using a dynamic path determined in the runtime. Now, when a packet is ready for transmission at the source node, it first sends a dummy packet with a request to response to the nearby nodes. Then it waits for the response to receive. After that, it calculates the time of response for each node and determines the signal strength in the method as described earlier. According the RSSI calculated, it determines the nearest node from itself and it sends the packet to the nearest node. The packet contains a flag showing whether it should be routed using a static path or a dynamic path. If it is dynamic, the next node follows the same process except the node from which it has received the packet. In this way, finally using the dynamic path, the packet reaches the destination node. Following flow diagram shows how the path is being determined in the run time. Step Algorithm: Step 1 –The packet is generated in the source node. Step 2 – The size of the packet is determined and checked with the threshold value. Step 3 – If the size of the packet is more than the threshold value, the packet is routed using the path that is being determined dynamically. Step 4 – Now, distances are calculated from using the method described above. Step 5 –According to the distances calculated, the node having minimum distance is determined, i.e. the nearest node. Step 6 – The routing is initiated in dynamical method. Step 7 – Following the steps the packet reaches the destination node. Flow Diagram: The following figure, i.e. Fig. 3 is showing the flow diagram that is being used for routing the packets with packet size more than 1024 bytes. The path for routing that packet is determined dynamically in run time.
  • 4. A data transmission technique based on RSSI in an ad-hoc network DOI: 10.9790/0661-17114347 www.iosrjournals.org 46 | Page Fig. 3 – Flow diagram of the dynamic path determination d. Data Structures In our system we have used data structure stored in binary files to store the important information like the location of each node, or the static paths to be followed to reach any node. We have avoided the use of database to make our system lighter and more efficient. The following snapshot is showing one of those data structures. Fig. 4 – Data Structure we are using to store data IV. Results And Discussion The following figure i.e. Fig. 5 depicts the path that has been determined using static routing by our system, when the source node is mac2 and the destination node is mac40 and the packet size is 512 bytes. Fig. 5 – Shows the routing of data in static method when source node is mac2 and destination node is mac40 and the packet size being 512 bytes. In Fig. 6 we are showing the path when the source and destination node are same as the previous one, i.e. mac2and mac40 respectively, but the packet size has been changed to 2048 bytes. Now, as the packet size exceeds our threshold, our system is routing the packet using dynamic routing. Thus, the path between two same nodes are different. Fig. 6 – Shows the routing of data in dynamic method, when source node is mac2 and destination
  • 5. A data transmission technique based on RSSI in an ad-hoc network DOI: 10.9790/0661-17114347 www.iosrjournals.org 47 | Page Node is mac40 and the packet size being 2048 bytes. Now as the above two pictures suggests, depending on the packet size, the method for routing the packets varies and so as the path. The static routing protocol has some disadvantages. As the paths are predefined, we cannot determine whether all the nodes are active or not. Now during transmission, if a node is down or inactive, then the path will be broken and the packet will not reach the destination. In the contrary, during dynamic routing we are checking the distances of the nearby active nodes. Thus, if a particular node is down, our system will be able to transmit the data successfully using dynamic routing protocol. V. Conclusion And Future Work Our system is working as per our expectation. The algorithms that was initially sketched upon papers with pencils using the mathematical formulas and concepts are working in a real life system. Moreover, we are still working in the system to make it further better. In future we will try to integrate this system with body area network and wearable system so that it can be used to ease our daily life burdens and tasks that we perform every day. Acknowledgement We sincerely thank Mr. AvranilTah, Founder of ESL and Mr. Arnab Pal, Techno-Marketing Consultant of ESL for guiding us during the project. Their help in this project really made our task easy. We faced many difficulties in that period of time, regarding the transmission of Bluetooth which we ultimately managed to solve by their intense guidance. Moreover, we want to thank our colleagues and friends for drawing our attention to the most important and vital overlooked points.