SlideShare a Scribd company logo
1 of 9
Download to read offline
TELKOMNIKA, Vol.17, No.4, August 2019, pp.1674~1682
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v17i4.8662 ๏ฎ 1674
Received October 10, 2018; Revised January 21, 2019; Accepted March 13, 2019
Address-light and energy aware routing protocol for
wireless sensor network
Hamdollah Ghamgin
Instructor, Department of Engineering, Payame Noor University, PO Box 19395-3697, Tehran, Iran
*Corresponding author, e-mail: hamghamgin@yahoo.com
Abstract
In recent years, sensor networks applications were used in many criteria. Because of its vast
applications, so many researchers studied these networks. Wireless sensor networks contain significant
number of sensor nodes; they are suitable medium for collecting and sending data or informing the sink
about an event. This study presents a new integrated method for routing in sensor networks which is
based on remaining energy of the nodes and existing space between each node and the sink. This method
is more suitable for large and medium volume of data. Lifetime enhancement of the network is the main
purpose of this method which is obtained by fair division of nodes roles in transmission of data to the sink.
In ALERP algorithm (Address Light, Label-Based and Energy-Aware Routing Protocol), in order to reduce
network overload and energy consuming as well as enhancement of network lifetime, we used
predetermined routes as well as routing based on packet labels. Energy consumption in the entire network
is another advantage of this method. The existence of various parameters on this algorithm will lead to
more flexibility of it. Generally, conducted simulations indicate higher uniformity in energy
consumption of nodes.
Keywords: infrastructure routes, labeling, layout, remaining energy, routing, sensor networks
Copyright ยฉ 2019 Universitas Ahmad Dahlan. All rights reserved.
1. Introduction
Sensor networks are generated from a large number of nodes which purposely or
randomly are distributed in the target area to collect data or inform the sink about an event.
Each sensor node is capable of sensing, processing, sending and receiving data. Due to the
lack of IP address in sensor networks, data-centric algorithms are more appropriate. Design
specific routing algorithms which can deal with network limitation such as low energy of nodes
and low processing power is only possible because of characteristics such as not exchanging
the data between the nodes and sending data only to the sink which is the main purpose of
these networks as well. Therefore, the proposed routing algorithms should have minimum
energy consumption in the network. In ALERP, data is transmitted through routes which are
previously created based on spanning tree concept, and routing is based on labeling concept in
each node. Providing a label for each node leads to increasing of routing rate and reducing of
delay time for sending and receiving packages. One of the most important advantages of this
algorithm is its better performance in high traffic. While in most of algorithms increasing of traffic
causes reduction of uniformity, in this algorithm energy consumption of the whole network
becomes more uniform with increasing of traffic for each node and by optimize adjustment of
time intervals between routing packages. In general, this algorithm send data packages from
nodes that are far away from main branches toward energetic nodes of the main branches and
drive it downward until it reach to the main branch ant through this will be sent to the sink.
This paper contains five sections. In section 2 we discuss about Literature review. Section 3
introduces the proposed algorithm and its advantages, in section 4 parameters and simulations
results are provided, and finally in section 5 the obtained results are reviewed and analyzed.
2. Literature Review
Researches about routing in sensor networks depend heavily on the type of traffic
transmitting inside of the network. Traditionally network designing is based on layer design.
This kind of designing is more suitable for wired networks. However, in networks such as sensor
TELKOMNIKA ISSN: 1693-6930 ๏ฎ
Address-light and energy aware routing protocol for wireless... (Hamdollah Ghamgin)
1675
networks with low processing resources and energy, it is not appropriate to divide the tasks
between completely separated and independent layers. Therefore, it is more reasonable to use
routing and MAC integrated layers in the sensor network. For example, using MAC protocol with
unchanged IEEE 802.11 in the sensor network has so many issues which are
discussed in [1-3].
Discussed MAC protocol with changed IEEE 802.11 (S-Mac) which is designed to work
in the sensor network [3]. In this protocol, nodes randomly fall into sleep mode and turn off their
radio part to reduce energy consumption. In order to create simultaneity, available nodes
generate categories around a node which are referred as virtual clusters. In each cluster, turn
off and on schedules are concurrent. These schedules are uncorrelated among other clusters.
The main problems of this protocol and this type of protocols in general which save energy by
turning off the nodes are high complexity and high over-flood, that are imposed to the network in
order to develop simultaneity. Not considering energy parameters is another problem of this
protocol. From another viewpoint, in sensor network we can divide routing algorithm into four
general categories which includes flat routing, hierarchical routing, geographical routing, and
energy aware routing. It is desirable to use space and energy simultaneously as two basic
criteria for routing.
Used clustering in sensor networks and used space and energy as two required
operations for finding shortest path to the destination [4]. For simplifying, it is better to use
identical nodes which have the same tasks in the sensor network. Routing in these kinds of
networks is known as flat routing. The algorithm discussed in [5] is called SPIN algorithm.
The main idea of this algorithm is using data and quasi-data describer for naming data. In SPIN
algorithm the key point is using data advertisement mechanism. In [6] Direct Diffusion algorithm
is studied. Using a specific method for naming is the basic idea of this algorithm. The main
purpose for this naming is to get free of routing in network layer in order to avoid unnecessary
energy consumption. Rumor algorithm [7] is another flat routing which is designed to work in
sensor networks. Rumor algorithm is modified version of Direct Diffusion. Not blindly distributing
the query in entire network and instead distributing part of the network that nodes of that part
observed a particular event is the basic idea of this algorithm. In order to achieve this objective,
Rumor algorithm uses a particular data package called Agent.
An efficient algorithm is presented in [8] which is created based on energy consumption
of nodes. This algorithm is based on using relatively optimal routs in term of energy to enhance
lifetime of the network and was introduced by Shah and Rabaey. These routes are selected
based on probability function with energy element for each rout. In this algorithm, the most basic
criterion is network lifetime. Proposes simultaneous using of location data and energy of nodes
for selecting a route. This protocol is called GEAR and uses geographic information and energy
of neighboring nodes for sending data to the target area [9]. The proposed model of this study
uses multiple mechanisms to select the next node in route formation. These mechanisms
include location data, energetic routes and label switching. These mechanisms are used for
reducing energy consumption, not retransmitting the data, supporting low-energy nodes, and
directing data package toward energetic routes and the sink through the shortest and most
energetic route.
3. The Proposed Algorithm
In sensor network, the main purpose for designing ALERP algorithm is to obtain
uniformity in energy consumption. Due to non-existence of wasteful delivery, energy
consumption become uniform and network flooding decreases. These operations results in
increasing of network lifetime. Lifetime means when the first node loses its energy.
In sensor network, energy consumption of nodes in entire network depends on the
position of each node. For example, nodes located in the areas close to the sink have higher
energy consumption. Since the nodes existing in this critical area has high importance due to
responsibility of sending data to the sink, then applied energy consuming mechanisms should
be accurate. Figure 1 depicts the structure of the network after generation of layers. According
to Figure 1, one of the most important objectives of this phase is to convert sensor network into
concentric layers around the sink. ALERP is a passive algorithm. In a passive algorithm, the
routs for data transmission are previously determined and while data are sent by the nodes, the
data transmit through these routes.
๏ฎ ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 4, August 2019: 1674-1682
1676
Figure 1. An overall view of the network after generation of layers
Since traditional routing requires the existence of a unique identifier for each node and
to save table of neighbors and table of routs in each node, we used label concept for generating
the routs. Generating energetic infrastructure branches, trying to deliver data packages to this
routs, and sending data from these routes to the sink are some characteristics of ALERP
algorithm. As explained above, our algorithm consists of three main phases:
a. Network layout phase: this phase is used only once at the beginning of the process in order
to convert sensor network into concentric layers with the sink. The purpose of this action is
to provide the nodes with limited data location and inform each node about its location
toward the sink.
b. Route generation, label allocation, and infrastructure creation phase: since ALERP is a
passive algorithm, sending routes should be determined before beginning the process of
sending data.
c. Sending data phase: in this phase each node starts sending data with the use of obtained
data from two previous phases.
Each of mentioned above phases are composed of different parts and various decisions that will
be explained in the nest section.
3.1. Layering Phase
According to Figure 1, one of the most important objectives of this phase is to convert
sensor network into concentric layers around the sink. For this reason, the sink start generating
layers by sending TIER messages with appropriate power of ๐›ผ๐‘…; ๐›ผ is a changeable parameter
and should be selected optimizely. The optimal value of ๐›ผ is presented in [10-12]. The first stage
of sending TIER messages is different from other stages. In this stage, the radius of first layer
which is the critical area as well is equals to diffusion radius of each node. Therefore, if R is
diffusion radius of each node, then radius of the first layer is R and the distance of other layers
from each other is ๐›ผ๐‘…. Thus, the nodes which can receive TIER message from the sink should
place the number of their layer equal to one. In the next delivery, the sink increases its delivery
radius to ๐›ผ๐‘…. Hence, nodes that received this message but don't have a layer number, place
number two for their layer. This process will continue until diffusion radius of the sink becomes
the same size as diffusion radius of the nodes. Nodes can start layering the network themselves
instead of waiting for the sink to send a TIER message. In this case, the node that received its
layer number from the sink can generate next layer by increasing TIER-ID and resending it with
radius ๐›ผ๐‘…. A similar case is studied in this paper. After completing this phase which occurs only
once at the beginning of the process, the network enters labeling and rout generation phase.
TELKOMNIKA ISSN: 1693-6930 ๏ฎ
Address-light and energy aware routing protocol for wireless... (Hamdollah Ghamgin)
1677
3.2. Route Generation, Label Allocation, and Infrastructure Creation Phase
This phase is the most important stage of this algorithm, which start after completing the
first phase and process alternatively. Labeling, generating infrastructure routes and their
propagation in different directions are the most advantage of ALERP which make it different
from other similar algorithms. After completion of layering process, the sink which has endless
energy in the network, will ask for remaining energy of critical layer nodes by propagation of
ENERGY-REQ package. In responses to this package, the nodes available in propagation area
will send back their remaining energy to the demanding node by ENERGY-REP. Note that each
node palace a random number in the ENERGY-REP package before sending it in order to
distinguish itself from other nodes.
The receiver node place appropriate label near each sent random number and the
sender node can detect its label by comparing random numbers. This action takes place in the
entire process in order to determine sender information. After receiving remaining energy of
each node and sorting it out, the sink assigns a label to each node. This assignment is in such a
way that, low energy nodes receive larger labels and high energy nodes receive shorter labels
shown in Table 1. Labels are selected in such a way that, by increasing of their amount in the
next layers, numerical overlapping does not occur at all.
Table 1. Labels Assigned to the Nodes Available in the Critical Area
Energy remained (mw) Lable specified for Critical Zone nodes
420 1000
310 2000
267 3000
150 4000
For example, in Table 1 the intervals are in 1000 units. At the next stage, each node
available in the critical area performs like the sink with the difference that the most energetic
node in the next layer receives a label which is the same as labels of critical area nodes.
For example, if the node has the label of 1000 then the most energetic node at the next layer
receive the label of 1000 and other nodes available in propagation area receive the label
of 1001. Nodes that are not around the main branch, for example nodes that are around the
propagation area of a node with the label of 1001 and do not have any label prioritization
receive a label with the number of 1002 on it; this action continue until the end. The main branch
nodes with label of 1000 continue to do their tasks like previous stage. Packages of label
assignment are shown in Figure 2. There are different scenarios at label assignment and
infrastructure creation phase.
Figure 2. data packages exchanged in the entire routing process
a. If the node receive different label from a layer, it will select smallest label, and chose a
target layer, i.e. the layer which received selected label from it.
b. If a node receives identical label from one layer several time, it will select that label and the
labeling layer will be the target layer.
๏ฎ ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 4, August 2019: 1674-1682
1678
c. If a node receives identical label from multiple layers, then the intended label will be
selected as node label and the layer with smallest number will be chosen as the
target layer.
d. If the node receives different labels from different layers of the main branch:
e. If the smallest label is received from lowest layer, both of them will be chosen.
f. If the smallest label is received from larger layer, selecting depends on the size of ๐›ผ.
If 1 โ‰ค ๐›ผ โ‰ค 2, then smallest label and its corresponding layer will be chosen.
g. If the node receives different labels from two different main branches: according to default
terms which are determined previously, only one of them will be chosen and terminates the
labeling process.
If the node receives a label with the number of 1000 from one side and a label with the
number of 2000 from other side, it terminates all the processes of propagating label packages
after selecting its own label. The last scenario terminates label propagation of the border node
which placed between two label areas. Thus, after completing label propagation process and
creating infrastructures, the general outline of the network is achieved, that is shown in Figure 3.
In this picture infrastructure routes are shown separately; nodes that received a new label are
shown the same as before but with lighter color. And like this, label assigning and infrastructure
creation phase will come to the end.
Figure 3. An overall view of the network after label assigning
3.3. Sending Data Phase
After completing label assigning and infrastructure creation phase, each node obtain its
own label and target layer, i.e. a layer which data should be sent to it. In fact, labels that are
assigned to the nodes other than infrastructural nodes are a sign to show each node that they
should receive packages with this label. In sending data phase, whenever a node has a data to
send, create a package for it. This package is shown in Figure 2. In fact the random values
added to each data packages, are values that helps to distinguish each data package from
others. SOURCE-TIER is the name of an item existing in the data package which the number of
layer is placed into it by the package creator. After receiving the package, each node reduces its
label amount by one, and then place the number of target layer which was obtained from
previous phase into TARGET-TIER part. This will continue until package reaches to the
infrastructure. Once the package reached to one of the nodes available in the infrastructure,
then in each delivery the nodes only reduces one number from target layer and package label
remain unchanged. Hence, the package will be sent quickly to the sink through
infrastructural nodes.
TELKOMNIKA ISSN: 1693-6930 ๏ฎ
Address-light and energy aware routing protocol for wireless... (Hamdollah Ghamgin)
1679
3.4. Simulations Results
In this paper all of simulations are done by GlomoSim simulator [13-20]. This simulator
has been implemented at UCLA University, has PARSEC as a compiler, and was programmed
by C++. In this paper we tried to provide a comparison between obtained simulation results and
simulation of GPSR protocol. The simulation is carried out in an area with 50 to 100 nodes.
The nodes are placed randomly and uniformly in the area with 100 ร— 100 ๐‘š2
space. To carry out
the simulation we used MAC MACAW protocol with physical layer of 914 MHz Lucent WaveLAN
DSSS. During simulation, propagation radius of the nodes is about 10 m and remains constant
in the entire process. Primary energy of all the nodes are equal to each other which is assumed
to be 1000 joules and the require energy for sending and receiving data is considered to be
0.281 joules. Our simulation is carried out with 10 CBR flow.
The source of this data flow is selected randomly from available nodes and its
destination is the sink. Each CBR flow can transform four packages per one second; the size of
these packages should be 512 bit at minimum and 10000 bit at maximum. Simulation time is
assumed to be 3600 second. We used the following process for this simulation in order to
measure fair division of the tasks between the nodes, fair division means almost equal
partnership of all nodes in routing and sending data to the sink. In this process, if more sensors
have close energy amount, the fairer our algorithm become. To indicate this process Figure 3
was presented. We saved the remaining energy of the nodes at 360 second intervals to obtain
these data. Diagram 1 shows remaining energy of nodes after 70% of simulation time.
The maximum energy level of the nodes is between 50-80% which are sensors existing in
middle and bottom layers. The nodes with 0-20% energy level are from critical area.
Figure 3. A comparison between the numbers of available nodes in ALERP and GPSR
protocols after 70% of simulation time
All of network traffics must transmit to the sink through the nodes which exist in the
critical area, and due to this most of energy consuming occurs in this layer. In order to indicate
energy uniformity of most of the nodes we used (1) in the simulation. In this equation, ๐‘†๐‘—
indicates the number of nodes with energy level of j (each column in the diagram). As indicated
in this diagram, the more nodes available at the maximum band and its surrounding the more
uniform the remaining energy of the nodes and fairer division of the tasks in the network will be.
๐‘“(๐‘ก) is defined in (1) and is drawn according to percentage of simulation time
in Figure 4. ๐‘“(๐‘ก) is drawn for GPSR protocol as well.
๐‘†๐‘—+1(๐‘ก) = ๐‘€๐ด๐‘‹ ๐‘“(๐‘ก) =
โˆ‘ ๐‘† ๐‘—(๐‘ก)
๐‘—+2
๐‘—
โˆ‘ ๐‘† ๐‘—(๐‘ก)10
๐‘–=1
(1)
๏ฎ ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 4, August 2019: 1674-1682
1680
Figure 4. A comparison to ๐‘“(๐‘ก) fairness between ALERP and GPSR protocols
This definition indicates the percentage of nodes available in maximum band and its
neighbors. Figure 4 shows ๐‘“(๐‘ก) according to time lapse in the network. As you see in this
diagram, with the passage of time ALERP causes uniformity in the network and make ๐‘“(๐‘ก) to
remain nearly constant as well. But, passage of time in networks with GPSR algorithm causes
๐‘“(๐‘ก) to decrease gradually. Some of diagrams are related to lifetime; the intended meaning for
lifetime is the time when the first node turns off. Figure 4 checks the life time of different number
nodes in three different algorithms. As you see in this diagram, ALERP has higher lifetime than
other two algorithms. This is due to fair division of the tasks and sending data through
infrastructures. These infrastructures are generated periodically and based on remaining energy
of the nodes. Figure 5 indicates lifetime of the network at different time intervals to renew
infrastructures and allocate labels.
Figure 5. A comparison between lifetimes of the network in ALERP, GPSR, and
FLOODING algorithms
Figure 6 indicates the existence of an optimal frequent time for regenerating
infrastructure routes. Due to short time intervals, times lesser than the intended time imposes
network to relatively high flooding caused by routing. Conversely, if time intervals for generating
routs are high, the advantage of renewing infrastructure become weaker and reduces lifetime of
the network.
TELKOMNIKA ISSN: 1693-6930 ๏ฎ
Address-light and energy aware routing protocol for wireless... (Hamdollah Ghamgin)
1681
Figure 6. Lifetime of a sensor network after using ALERP algorithm based on different time
intervals in order to generating infrastructure and assigning the labels
4. Conclusion
In this paper, we designed an optimal routing protocol for sensor network applications
based on concepts such as layering of sensor networks to concentric layers, labeling for each
sensor node, and alternatively generating infrastructure and energetic routs. Using these
concepts and working on generating new routs with energy consideration, causes nodes with
more energy participate more in sending and exchanging packages in the networks and as the
result a desirable uniformity is created in the entire network based on remaining energy and
consumed energy of each node. Results obtained from simulations indicates that with passing
of time the percentage of nodes with identical energy that are placed in energy bands close to
each other, are gradually reducing. Therefore, after some times ALERP generates a desirable
uniformity [21-25]. In ALERP, nodes available in critical area are managed with a specific
mechanism to have a particular uniformity for energy consumption. In networks that use
ALERP, if nodes available in critical area tunes off, then we can re-establish the network by
propagating some nodes in the critical area. With the use of ALERP we can increase networks
lifetime significantly which is due to the uniformity of energy consumption in the network. Also,
because ALERP delivers data packages to node available in the infrastructure and then send
them through these nodes to the sink, the delay of sending data from source to destination is
relatively low.
Acknowledgement
The authors would like to express their thanks to Iran Telecommunication Research
Center (ITRC) for supporting this project.
References
[1] Guo C, Zhong LC, Rabaey JM. Low power distributed MAC for ad hoc sensor radio networks.
In: GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No. 01CH37270). IEEE,
2001: 2944-2948.โ€ซโ€โ€ฌ
[2] Gazizov RR, Nagovitsyna TA. Political Manipulation of the Media (On the Example of Mass Media of
the Republic Of Tatarstan). Astra Salvensis. 2017; 10.โ€ซโ€โ€ฌ
[3] Ye W, Heidemann J, Estrin D. An energy-efficient MAC protocol for wireless sensor networks. In:
Proceedings. Twenty-First Annual Joint Conference of the IEEE Computer and Communications
Societies. IEEE, 2002: 1567-1576.โ€ซโ€โ€ฌ
[4] Youssef MA, Younis MF, Arisha KA. A constrained shortest-path energy-aware routing algorithm for
wireless sensor networks. In: 2002 IEEE Wireless Communications and Networking Conference
Record. WCNC 2002 (Cat. No. 02TH8609). IEEE. 2002: 794-799.โ€ซโ€โ€ฌ
๏ฎ ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 4, August 2019: 1674-1682
1682
[5] Husnutdinov DH, Aydarova SH, Sagdieva RK, Mirzagitov RH, Tsaran A, Plotnikova H, Velikanova S.
Information and communication tools for Tatar language teaching. Modern Journal of Language
Teaching Methods. 2017; 7(12): 124-132.โ€ซโ€โ€ฌ
[6] Intanagonwiwat C, Govindan R, Estrin D. Directed diffusion: A scalable and robust communication
paradigm for sensor networks. In: Proceedings of the 6th annual international conference on Mobile
computing and networking. ACM, 2000: 56-67.โ€ซโ€โ€ฌ
[7] Inamdar JJ, Annapoorani, KI Iyswarya. A Review of Methods Employed to Identify Flicker Producing
Sources. TELKOMNIKA Telecommunication Computing Electronics and Control. 2018;
16(2): 465-480.โ€ซโ€โ€ฌ
[8] Shah RC, Rabaey JM. Energy aware routing for low energy ad hoc sensor networks. In: 2002 IEEE
Wireless Communications and Networking Conference Record. WCNC 2002 (Cat. No. 02TH8609).
IEEE, 2002: 350-355.โ€ซโ€โ€ฌ
[9] Nordin AN, Ibrahim I, Mansor AFM, Hashim YZHY, Voiculescu I. Content Cytotoxicity Studies of
Colorectal Carcinoma Cells Using Printed Impedance Sensors. Bulletin of Electrical Engineering and
Informatics. 2017; 6(4): 317-326.โ€ซโ€โ€ฌ
[10] Kulkarni S, Iyer A, Rosenberg C. An address-light, integrated MAC and routing protocol for wireless
sensor networks. IEEE/ACM Transactions on Networking (TON). 2006; 14(4): 793-806.โ€ซโ€โ€ฌ
[11] Min R, Chandrakasan A. Energy-efficient communication for ad-hoc wireless sensor networks. In:
Conference Record of Thirty-Fifth Asilomar Conference on Signals, Systems and Computers
(Cat. No. 01CH37256). IEEE, 2001: 139-143.โ€ซโ€โ€ฌ
[12] Zeng X, Bagrodia R, Gerla M. GloMoSim: a library for parallel simulation of large-scale wireless
networks. In: Proceedings. Twelfth Workshop on Parallel and Distributed Simulation PADS'98
(Cat. No. 98TB100233). IEEE, 1998: 154-161.โ€ซโ€โ€ฌ
[13] Uzmรกn SA, Fรณster PF, Ramรญrez-Correa P, Grandรณn EE, Alfaro-Perez J. Information Systems and
their Effect on Organizational Performance: An Inquiry into Job Satisfaction and Commitment in
Higher Education Institutions. Journal of Information Systems Engineering & Management.
2018; 3(4): 26.
[14] Ngirwa CC, Ally M. An ICT Based Solution for Pesticides Authenticity Verification: A Case of
Tanzania. Journal of Information Systems Engineering & Management. 2018; 3(4): 27.
[15] Dhanotiya, Abhijeet; Sharma, Vishal. Power reduction in digital VLSI circuits. International Journal of
Research in IT, Management and Engineering. 2014; 4(6): 13-23.โ€ซโ€โ€ฌ
[16] Arabmarkadeh, Arash, Jalili, Fahime, Chegini, Parvane. Use of Loofa-Immobilized RhizopusOryzae
as a whole-cell biocatalyst in a batch and packed-bed bioreactor.
Nationalpark-Forschung in der Schweiz (Switzerland Research Park Journal). 2014; 103(1).โ€ซโ€โ€ฌ
[17] Nehzat Ebrahimi, Jalil Rashidinia. Spline Collocation for Volterra-Fredholm Integro-Differential
Equations. UCT Journal of Research in Science, Engineering and Technology. 2014; 2(1): 01-03.
[18] Montazeri-Gh, Morteza, and Mehdi Mahmoodi-k. Development a new power management strategy
for power split hybrid electric vehicles. Transportation Research Part D: Transport and Environment.
2015; 37: 79-96.
[19] Mashadi B, Y Amiri-rad, A Afkar, M. Mahmoodi-kaleybar. Simulation of automobile fuel consumption
and emissions for various driver's manual shifting habits. Journal of Central South University.
2014; 3: 31.
[20] Davoodabadi Farahani, Hamideh Shahsavari. GIS Modeling of Earthquake Damage Zones Using
ETM Data and Remote Sensing-Bojnoord, Khorasan Province. UCT Journal of Research in Science,
Engineering and Technology. 2013; 1(1): 07-11.
[21] Mahdi Nasiri, Behrouz Minaei, Mansour Rezghi. Fuzzy dynamic tensor decomposition algorithm for
recommender system. UCT Journal of Research in Science, Engineering and Technology.
2014; 2: 52-55.
[22] Mendes LD, Rodrigues JJ. A survey on cross-layer solutions for wireless sensor networks. Journal of
Network and Computer Applications. 2011; 34(2): 523-34.
[23] Pan MS, Tsai CH, Tseng YC. The orphan problem in ZigBee wireless networks. IEEE Transactions
on Mobile Computing. 2009; 8(11): 1573-84.
[24] Sahoo A, Chilukuri S. DGRAM: a delay guaranteed routing and MAC protocol for wireless sensor
networks. IEEE Transactions on Mobile Computing. 2010; 9(10): 1407-23.
[25] Montazeri-Gh M, Mahmoodi-k M. Development a new power management strategy for power split
hybrid electric vehicles. Transportation Research Part D. 2015; 37: 79-96.

More Related Content

What's hot

Energy balanced improved leach routing protocol for wireless sensor networks
Energy balanced improved leach routing protocol for wireless sensor networksEnergy balanced improved leach routing protocol for wireless sensor networks
Energy balanced improved leach routing protocol for wireless sensor networkscsandit
ย 
Qo s parameters for obs network
Qo s parameters for obs networkQo s parameters for obs network
Qo s parameters for obs networkeSAT Journals
ย 
Improved Power Aware Location Based Routing
Improved Power Aware Location Based RoutingImproved Power Aware Location Based Routing
Improved Power Aware Location Based RoutingIOSR Journals
ย 
M.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication ProjectsM.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication ProjectsVijay Karan
ย 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
ย 
MPR selection to the OLSR quality of service in MANET using minmax algorithm
MPR selection to the OLSR quality of service in MANET using minmax algorithmMPR selection to the OLSR quality of service in MANET using minmax algorithm
MPR selection to the OLSR quality of service in MANET using minmax algorithmIJECEIAES
ย 
Performance analysis of resource
Performance analysis of resourcePerformance analysis of resource
Performance analysis of resourcecsandit
ย 
Handover Algorithm based VLP using Mobility Prediction Database for Vehicular...
Handover Algorithm based VLP using Mobility Prediction Database for Vehicular...Handover Algorithm based VLP using Mobility Prediction Database for Vehicular...
Handover Algorithm based VLP using Mobility Prediction Database for Vehicular...IJECEIAES
ย 
Comparison of energy efficient data transmission approaches for flat wireless...
Comparison of energy efficient data transmission approaches for flat wireless...Comparison of energy efficient data transmission approaches for flat wireless...
Comparison of energy efficient data transmission approaches for flat wireless...ijassn
ย 
Oq3425482554
Oq3425482554Oq3425482554
Oq3425482554IJERA Editor
ย 
System Performance Analysis of Half-Duplex Relay Network over Rician Fading C...
System Performance Analysis of Half-Duplex Relay Network over Rician Fading C...System Performance Analysis of Half-Duplex Relay Network over Rician Fading C...
System Performance Analysis of Half-Duplex Relay Network over Rician Fading C...TELKOMNIKA JOURNAL
ย 
M.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication ProjectsM.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication ProjectsVijay Karan
ย 
Design A Congestion Aware Routing Algorithm for Synchronous Cam Design
Design A Congestion Aware Routing Algorithm for Synchronous Cam DesignDesign A Congestion Aware Routing Algorithm for Synchronous Cam Design
Design A Congestion Aware Routing Algorithm for Synchronous Cam Designijtsrd
ย 
IRJET-Spectrum Allocation Policies for Flex Grid Network with Data Rate Limit...
IRJET-Spectrum Allocation Policies for Flex Grid Network with Data Rate Limit...IRJET-Spectrum Allocation Policies for Flex Grid Network with Data Rate Limit...
IRJET-Spectrum Allocation Policies for Flex Grid Network with Data Rate Limit...IRJET Journal
ย 
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkIJCI JOURNAL
ย 
Path loss exponent estimation
Path loss exponent estimationPath loss exponent estimation
Path loss exponent estimationNguyen Minh Thu
ย 
energy efficiency routing protocol for ws ns
energy efficiency routing protocol for ws nsenergy efficiency routing protocol for ws ns
energy efficiency routing protocol for ws nsINFOGAIN PUBLICATION
ย 

What's hot (18)

paper3
paper3paper3
paper3
ย 
Energy balanced improved leach routing protocol for wireless sensor networks
Energy balanced improved leach routing protocol for wireless sensor networksEnergy balanced improved leach routing protocol for wireless sensor networks
Energy balanced improved leach routing protocol for wireless sensor networks
ย 
Qo s parameters for obs network
Qo s parameters for obs networkQo s parameters for obs network
Qo s parameters for obs network
ย 
Improved Power Aware Location Based Routing
Improved Power Aware Location Based RoutingImproved Power Aware Location Based Routing
Improved Power Aware Location Based Routing
ย 
M.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication ProjectsM.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication Projects
ย 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
ย 
MPR selection to the OLSR quality of service in MANET using minmax algorithm
MPR selection to the OLSR quality of service in MANET using minmax algorithmMPR selection to the OLSR quality of service in MANET using minmax algorithm
MPR selection to the OLSR quality of service in MANET using minmax algorithm
ย 
Performance analysis of resource
Performance analysis of resourcePerformance analysis of resource
Performance analysis of resource
ย 
Handover Algorithm based VLP using Mobility Prediction Database for Vehicular...
Handover Algorithm based VLP using Mobility Prediction Database for Vehicular...Handover Algorithm based VLP using Mobility Prediction Database for Vehicular...
Handover Algorithm based VLP using Mobility Prediction Database for Vehicular...
ย 
Comparison of energy efficient data transmission approaches for flat wireless...
Comparison of energy efficient data transmission approaches for flat wireless...Comparison of energy efficient data transmission approaches for flat wireless...
Comparison of energy efficient data transmission approaches for flat wireless...
ย 
Oq3425482554
Oq3425482554Oq3425482554
Oq3425482554
ย 
System Performance Analysis of Half-Duplex Relay Network over Rician Fading C...
System Performance Analysis of Half-Duplex Relay Network over Rician Fading C...System Performance Analysis of Half-Duplex Relay Network over Rician Fading C...
System Performance Analysis of Half-Duplex Relay Network over Rician Fading C...
ย 
M.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication ProjectsM.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication Projects
ย 
Design A Congestion Aware Routing Algorithm for Synchronous Cam Design
Design A Congestion Aware Routing Algorithm for Synchronous Cam DesignDesign A Congestion Aware Routing Algorithm for Synchronous Cam Design
Design A Congestion Aware Routing Algorithm for Synchronous Cam Design
ย 
IRJET-Spectrum Allocation Policies for Flex Grid Network with Data Rate Limit...
IRJET-Spectrum Allocation Policies for Flex Grid Network with Data Rate Limit...IRJET-Spectrum Allocation Policies for Flex Grid Network with Data Rate Limit...
IRJET-Spectrum Allocation Policies for Flex Grid Network with Data Rate Limit...
ย 
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkQuadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless Network
ย 
Path loss exponent estimation
Path loss exponent estimationPath loss exponent estimation
Path loss exponent estimation
ย 
energy efficiency routing protocol for ws ns
energy efficiency routing protocol for ws nsenergy efficiency routing protocol for ws ns
energy efficiency routing protocol for ws ns
ย 

Similar to Address-Light Energy-Aware Routing Protocol for Wireless Sensor Networks

A Novel Cluster-Based Energy Efficient Routing With Hybrid Protocol in Wirele...
A Novel Cluster-Based Energy Efficient Routing With Hybrid Protocol in Wirele...A Novel Cluster-Based Energy Efficient Routing With Hybrid Protocol in Wirele...
A Novel Cluster-Based Energy Efficient Routing With Hybrid Protocol in Wirele...IJERA Editor
ย 
Energy Efficient Multipath Routing For Mobile Ad Hoc Networks
Energy Efficient Multipath Routing For Mobile Ad Hoc NetworksEnergy Efficient Multipath Routing For Mobile Ad Hoc Networks
Energy Efficient Multipath Routing For Mobile Ad Hoc NetworksZac Darcy
ย 
A Comparison Of Smart Routings In Mobile Ad Hoc Networks(MANETs)
A Comparison Of Smart Routings In Mobile Ad Hoc  Networks(MANETs) A Comparison Of Smart Routings In Mobile Ad Hoc  Networks(MANETs)
A Comparison Of Smart Routings In Mobile Ad Hoc Networks(MANETs) IJMER
ย 
COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...
COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...
COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...ijassn
ย 
Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...
Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...
Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...CSCJournals
ย 
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETProviding A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETEditor IJCATR
ย 
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSNโ€™S
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSNโ€™SAN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSNโ€™S
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSNโ€™SIJCNCJournal
ย 
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...IOSR Journals
ย 
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...IRJET Journal
ย 
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor NetworkCBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor NetworkCSEIJJournal
ย 
F04623943
F04623943F04623943
F04623943IOSR-JEN
ย 
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...Editor IJCATR
ย 
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...CSCJournals
ย 
IMPROVE ENERGY EFFICIENCY ROUTING IN WSN BY USING AUTOMATA
IMPROVE ENERGY EFFICIENCY ROUTING IN WSN BY USING AUTOMATAIMPROVE ENERGY EFFICIENCY ROUTING IN WSN BY USING AUTOMATA
IMPROVE ENERGY EFFICIENCY ROUTING IN WSN BY USING AUTOMATAijasuc
ย 
IMPROVE ENERGY EFFICIENCY ROUTING IN WSN BY USING AUTOMATA
IMPROVE ENERGY EFFICIENCY ROUTING IN WSN BY USING AUTOMATAIMPROVE ENERGY EFFICIENCY ROUTING IN WSN BY USING AUTOMATA
IMPROVE ENERGY EFFICIENCY ROUTING IN WSN BY USING AUTOMATAijasuc
ย 
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHMPERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHMijcsit
ย 
Performance Evaluation of LTE Network using Maximum Flow Algorithm
Performance Evaluation of LTE Network using Maximum Flow AlgorithmPerformance Evaluation of LTE Network using Maximum Flow Algorithm
Performance Evaluation of LTE Network using Maximum Flow AlgorithmAIRCC Publishing Corporation
ย 
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs cscpconf
ย 
Maintain load balancing in wireless sensor networks using virtual grid based ...
Maintain load balancing in wireless sensor networks using virtual grid based ...Maintain load balancing in wireless sensor networks using virtual grid based ...
Maintain load balancing in wireless sensor networks using virtual grid based ...zaidinvisible
ย 
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...ijcncs
ย 

Similar to Address-Light Energy-Aware Routing Protocol for Wireless Sensor Networks (20)

A Novel Cluster-Based Energy Efficient Routing With Hybrid Protocol in Wirele...
A Novel Cluster-Based Energy Efficient Routing With Hybrid Protocol in Wirele...A Novel Cluster-Based Energy Efficient Routing With Hybrid Protocol in Wirele...
A Novel Cluster-Based Energy Efficient Routing With Hybrid Protocol in Wirele...
ย 
Energy Efficient Multipath Routing For Mobile Ad Hoc Networks
Energy Efficient Multipath Routing For Mobile Ad Hoc NetworksEnergy Efficient Multipath Routing For Mobile Ad Hoc Networks
Energy Efficient Multipath Routing For Mobile Ad Hoc Networks
ย 
A Comparison Of Smart Routings In Mobile Ad Hoc Networks(MANETs)
A Comparison Of Smart Routings In Mobile Ad Hoc  Networks(MANETs) A Comparison Of Smart Routings In Mobile Ad Hoc  Networks(MANETs)
A Comparison Of Smart Routings In Mobile Ad Hoc Networks(MANETs)
ย 
COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...
COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...
COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...
ย 
Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...
Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...
Energy Consumption in Ad Hoc Network With Agents Minimizing the Number of Hop...
ย 
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETProviding A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
ย 
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSNโ€™S
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSNโ€™SAN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSNโ€™S
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSNโ€™S
ย 
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
ย 
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
ย 
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor NetworkCBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network
ย 
F04623943
F04623943F04623943
F04623943
ย 
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...
ย 
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
ย 
IMPROVE ENERGY EFFICIENCY ROUTING IN WSN BY USING AUTOMATA
IMPROVE ENERGY EFFICIENCY ROUTING IN WSN BY USING AUTOMATAIMPROVE ENERGY EFFICIENCY ROUTING IN WSN BY USING AUTOMATA
IMPROVE ENERGY EFFICIENCY ROUTING IN WSN BY USING AUTOMATA
ย 
IMPROVE ENERGY EFFICIENCY ROUTING IN WSN BY USING AUTOMATA
IMPROVE ENERGY EFFICIENCY ROUTING IN WSN BY USING AUTOMATAIMPROVE ENERGY EFFICIENCY ROUTING IN WSN BY USING AUTOMATA
IMPROVE ENERGY EFFICIENCY ROUTING IN WSN BY USING AUTOMATA
ย 
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHMPERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
PERFORMANCE EVALUATION OF LTE NETWORK USING MAXIMUM FLOW ALGORITHM
ย 
Performance Evaluation of LTE Network using Maximum Flow Algorithm
Performance Evaluation of LTE Network using Maximum Flow AlgorithmPerformance Evaluation of LTE Network using Maximum Flow Algorithm
Performance Evaluation of LTE Network using Maximum Flow Algorithm
ย 
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs
A RELIABLE AND ENERGY EFFICIENCT ROUTING PROTOCOL FOR MANETs
ย 
Maintain load balancing in wireless sensor networks using virtual grid based ...
Maintain load balancing in wireless sensor networks using virtual grid based ...Maintain load balancing in wireless sensor networks using virtual grid based ...
Maintain load balancing in wireless sensor networks using virtual grid based ...
ย 
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
ย 

More from TELKOMNIKA JOURNAL

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
ย 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
ย 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
ย 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
ย 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
ย 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
ย 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
ย 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
ย 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
ย 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
ย 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesTELKOMNIKA JOURNAL
ย 
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...TELKOMNIKA JOURNAL
ย 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
ย 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
ย 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
ย 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
ย 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
ย 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
ย 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
ย 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
ย 

More from TELKOMNIKA JOURNAL (20)

Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...Amazon products reviews classification based on machine learning, deep learni...
Amazon products reviews classification based on machine learning, deep learni...
ย 
Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...Design, simulation, and analysis of microstrip patch antenna for wireless app...
Design, simulation, and analysis of microstrip patch antenna for wireless app...
ย 
Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...Design and simulation an optimal enhanced PI controller for congestion avoida...
Design and simulation an optimal enhanced PI controller for congestion avoida...
ย 
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...
ย 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
ย 
Efficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antennaEfficient combined fuzzy logic and LMS algorithm for smart antenna
Efficient combined fuzzy logic and LMS algorithm for smart antenna
ย 
Design and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fireDesign and implementation of a LoRa-based system for warning of forest fire
Design and implementation of a LoRa-based system for warning of forest fire
ย 
Wavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio networkWavelet-based sensing technique in cognitive radio network
Wavelet-based sensing technique in cognitive radio network
ย 
A novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bandsA novel compact dual-band bandstop filter with enhanced rejection bands
A novel compact dual-band bandstop filter with enhanced rejection bands
ย 
Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...Deep learning approach to DDoS attack with imbalanced data at the application...
Deep learning approach to DDoS attack with imbalanced data at the application...
ย 
Brief note on match and miss-match uncertainties
Brief note on match and miss-match uncertaintiesBrief note on match and miss-match uncertainties
Brief note on match and miss-match uncertainties
ย 
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...
Implementation of FinFET technology based low power 4ร—4 Wallace tree multipli...
ย 
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemEvaluation of the weighted-overlap add model with massive MIMO in a 5G system
Evaluation of the weighted-overlap add model with massive MIMO in a 5G system
ย 
Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...Reflector antenna design in different frequencies using frequency selective s...
Reflector antenna design in different frequencies using frequency selective s...
ย 
Reagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensorReagentless iron detection in water based on unclad fiber optical sensor
Reagentless iron detection in water based on unclad fiber optical sensor
ย 
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...Impact of CuS counter electrode calcination temperature on quantum dot sensit...
Impact of CuS counter electrode calcination temperature on quantum dot sensit...
ย 
A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...A progressive learning for structural tolerance online sequential extreme lea...
A progressive learning for structural tolerance online sequential extreme lea...
ย 
Electroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networksElectroencephalography-based brain-computer interface using neural networks
Electroencephalography-based brain-computer interface using neural networks
ย 
Adaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imagingAdaptive segmentation algorithm based on level set model in medical imaging
Adaptive segmentation algorithm based on level set model in medical imaging
ย 
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...
ย 

Recently uploaded

HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
ย 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
ย 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
ย 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examplesDr. Gudipudi Nageswara Rao
ย 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
ย 
๐Ÿ”9953056974๐Ÿ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
๐Ÿ”9953056974๐Ÿ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...๐Ÿ”9953056974๐Ÿ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
๐Ÿ”9953056974๐Ÿ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
ย 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
ย 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
ย 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
ย 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
ย 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
ย 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
ย 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
ย 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
ย 

Recently uploaded (20)

young call girls in Green Park๐Ÿ” 9953056974 ๐Ÿ” escort Service
young call girls in Green Park๐Ÿ” 9953056974 ๐Ÿ” escort Serviceyoung call girls in Green Park๐Ÿ” 9953056974 ๐Ÿ” escort Service
young call girls in Green Park๐Ÿ” 9953056974 ๐Ÿ” escort Service
ย 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
ย 
โ˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
โ˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCRโ˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
โ˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
ย 
young call girls in Rajiv Chowk๐Ÿ” 9953056974 ๐Ÿ” Delhi escort Service
young call girls in Rajiv Chowk๐Ÿ” 9953056974 ๐Ÿ” Delhi escort Serviceyoung call girls in Rajiv Chowk๐Ÿ” 9953056974 ๐Ÿ” Delhi escort Service
young call girls in Rajiv Chowk๐Ÿ” 9953056974 ๐Ÿ” Delhi escort Service
ย 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
ย 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
ย 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
ย 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ย 
๐Ÿ”9953056974๐Ÿ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
๐Ÿ”9953056974๐Ÿ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...๐Ÿ”9953056974๐Ÿ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
๐Ÿ”9953056974๐Ÿ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
ย 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
ย 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
ย 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
ย 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
ย 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
ย 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
ย 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
ย 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
ย 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
ย 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
ย 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
ย 

Address-Light Energy-Aware Routing Protocol for Wireless Sensor Networks

  • 1. TELKOMNIKA, Vol.17, No.4, August 2019, pp.1674~1682 ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018 DOI: 10.12928/TELKOMNIKA.v17i4.8662 ๏ฎ 1674 Received October 10, 2018; Revised January 21, 2019; Accepted March 13, 2019 Address-light and energy aware routing protocol for wireless sensor network Hamdollah Ghamgin Instructor, Department of Engineering, Payame Noor University, PO Box 19395-3697, Tehran, Iran *Corresponding author, e-mail: hamghamgin@yahoo.com Abstract In recent years, sensor networks applications were used in many criteria. Because of its vast applications, so many researchers studied these networks. Wireless sensor networks contain significant number of sensor nodes; they are suitable medium for collecting and sending data or informing the sink about an event. This study presents a new integrated method for routing in sensor networks which is based on remaining energy of the nodes and existing space between each node and the sink. This method is more suitable for large and medium volume of data. Lifetime enhancement of the network is the main purpose of this method which is obtained by fair division of nodes roles in transmission of data to the sink. In ALERP algorithm (Address Light, Label-Based and Energy-Aware Routing Protocol), in order to reduce network overload and energy consuming as well as enhancement of network lifetime, we used predetermined routes as well as routing based on packet labels. Energy consumption in the entire network is another advantage of this method. The existence of various parameters on this algorithm will lead to more flexibility of it. Generally, conducted simulations indicate higher uniformity in energy consumption of nodes. Keywords: infrastructure routes, labeling, layout, remaining energy, routing, sensor networks Copyright ยฉ 2019 Universitas Ahmad Dahlan. All rights reserved. 1. Introduction Sensor networks are generated from a large number of nodes which purposely or randomly are distributed in the target area to collect data or inform the sink about an event. Each sensor node is capable of sensing, processing, sending and receiving data. Due to the lack of IP address in sensor networks, data-centric algorithms are more appropriate. Design specific routing algorithms which can deal with network limitation such as low energy of nodes and low processing power is only possible because of characteristics such as not exchanging the data between the nodes and sending data only to the sink which is the main purpose of these networks as well. Therefore, the proposed routing algorithms should have minimum energy consumption in the network. In ALERP, data is transmitted through routes which are previously created based on spanning tree concept, and routing is based on labeling concept in each node. Providing a label for each node leads to increasing of routing rate and reducing of delay time for sending and receiving packages. One of the most important advantages of this algorithm is its better performance in high traffic. While in most of algorithms increasing of traffic causes reduction of uniformity, in this algorithm energy consumption of the whole network becomes more uniform with increasing of traffic for each node and by optimize adjustment of time intervals between routing packages. In general, this algorithm send data packages from nodes that are far away from main branches toward energetic nodes of the main branches and drive it downward until it reach to the main branch ant through this will be sent to the sink. This paper contains five sections. In section 2 we discuss about Literature review. Section 3 introduces the proposed algorithm and its advantages, in section 4 parameters and simulations results are provided, and finally in section 5 the obtained results are reviewed and analyzed. 2. Literature Review Researches about routing in sensor networks depend heavily on the type of traffic transmitting inside of the network. Traditionally network designing is based on layer design. This kind of designing is more suitable for wired networks. However, in networks such as sensor
  • 2. TELKOMNIKA ISSN: 1693-6930 ๏ฎ Address-light and energy aware routing protocol for wireless... (Hamdollah Ghamgin) 1675 networks with low processing resources and energy, it is not appropriate to divide the tasks between completely separated and independent layers. Therefore, it is more reasonable to use routing and MAC integrated layers in the sensor network. For example, using MAC protocol with unchanged IEEE 802.11 in the sensor network has so many issues which are discussed in [1-3]. Discussed MAC protocol with changed IEEE 802.11 (S-Mac) which is designed to work in the sensor network [3]. In this protocol, nodes randomly fall into sleep mode and turn off their radio part to reduce energy consumption. In order to create simultaneity, available nodes generate categories around a node which are referred as virtual clusters. In each cluster, turn off and on schedules are concurrent. These schedules are uncorrelated among other clusters. The main problems of this protocol and this type of protocols in general which save energy by turning off the nodes are high complexity and high over-flood, that are imposed to the network in order to develop simultaneity. Not considering energy parameters is another problem of this protocol. From another viewpoint, in sensor network we can divide routing algorithm into four general categories which includes flat routing, hierarchical routing, geographical routing, and energy aware routing. It is desirable to use space and energy simultaneously as two basic criteria for routing. Used clustering in sensor networks and used space and energy as two required operations for finding shortest path to the destination [4]. For simplifying, it is better to use identical nodes which have the same tasks in the sensor network. Routing in these kinds of networks is known as flat routing. The algorithm discussed in [5] is called SPIN algorithm. The main idea of this algorithm is using data and quasi-data describer for naming data. In SPIN algorithm the key point is using data advertisement mechanism. In [6] Direct Diffusion algorithm is studied. Using a specific method for naming is the basic idea of this algorithm. The main purpose for this naming is to get free of routing in network layer in order to avoid unnecessary energy consumption. Rumor algorithm [7] is another flat routing which is designed to work in sensor networks. Rumor algorithm is modified version of Direct Diffusion. Not blindly distributing the query in entire network and instead distributing part of the network that nodes of that part observed a particular event is the basic idea of this algorithm. In order to achieve this objective, Rumor algorithm uses a particular data package called Agent. An efficient algorithm is presented in [8] which is created based on energy consumption of nodes. This algorithm is based on using relatively optimal routs in term of energy to enhance lifetime of the network and was introduced by Shah and Rabaey. These routes are selected based on probability function with energy element for each rout. In this algorithm, the most basic criterion is network lifetime. Proposes simultaneous using of location data and energy of nodes for selecting a route. This protocol is called GEAR and uses geographic information and energy of neighboring nodes for sending data to the target area [9]. The proposed model of this study uses multiple mechanisms to select the next node in route formation. These mechanisms include location data, energetic routes and label switching. These mechanisms are used for reducing energy consumption, not retransmitting the data, supporting low-energy nodes, and directing data package toward energetic routes and the sink through the shortest and most energetic route. 3. The Proposed Algorithm In sensor network, the main purpose for designing ALERP algorithm is to obtain uniformity in energy consumption. Due to non-existence of wasteful delivery, energy consumption become uniform and network flooding decreases. These operations results in increasing of network lifetime. Lifetime means when the first node loses its energy. In sensor network, energy consumption of nodes in entire network depends on the position of each node. For example, nodes located in the areas close to the sink have higher energy consumption. Since the nodes existing in this critical area has high importance due to responsibility of sending data to the sink, then applied energy consuming mechanisms should be accurate. Figure 1 depicts the structure of the network after generation of layers. According to Figure 1, one of the most important objectives of this phase is to convert sensor network into concentric layers around the sink. ALERP is a passive algorithm. In a passive algorithm, the routs for data transmission are previously determined and while data are sent by the nodes, the data transmit through these routes.
  • 3. ๏ฎ ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 4, August 2019: 1674-1682 1676 Figure 1. An overall view of the network after generation of layers Since traditional routing requires the existence of a unique identifier for each node and to save table of neighbors and table of routs in each node, we used label concept for generating the routs. Generating energetic infrastructure branches, trying to deliver data packages to this routs, and sending data from these routes to the sink are some characteristics of ALERP algorithm. As explained above, our algorithm consists of three main phases: a. Network layout phase: this phase is used only once at the beginning of the process in order to convert sensor network into concentric layers with the sink. The purpose of this action is to provide the nodes with limited data location and inform each node about its location toward the sink. b. Route generation, label allocation, and infrastructure creation phase: since ALERP is a passive algorithm, sending routes should be determined before beginning the process of sending data. c. Sending data phase: in this phase each node starts sending data with the use of obtained data from two previous phases. Each of mentioned above phases are composed of different parts and various decisions that will be explained in the nest section. 3.1. Layering Phase According to Figure 1, one of the most important objectives of this phase is to convert sensor network into concentric layers around the sink. For this reason, the sink start generating layers by sending TIER messages with appropriate power of ๐›ผ๐‘…; ๐›ผ is a changeable parameter and should be selected optimizely. The optimal value of ๐›ผ is presented in [10-12]. The first stage of sending TIER messages is different from other stages. In this stage, the radius of first layer which is the critical area as well is equals to diffusion radius of each node. Therefore, if R is diffusion radius of each node, then radius of the first layer is R and the distance of other layers from each other is ๐›ผ๐‘…. Thus, the nodes which can receive TIER message from the sink should place the number of their layer equal to one. In the next delivery, the sink increases its delivery radius to ๐›ผ๐‘…. Hence, nodes that received this message but don't have a layer number, place number two for their layer. This process will continue until diffusion radius of the sink becomes the same size as diffusion radius of the nodes. Nodes can start layering the network themselves instead of waiting for the sink to send a TIER message. In this case, the node that received its layer number from the sink can generate next layer by increasing TIER-ID and resending it with radius ๐›ผ๐‘…. A similar case is studied in this paper. After completing this phase which occurs only once at the beginning of the process, the network enters labeling and rout generation phase.
  • 4. TELKOMNIKA ISSN: 1693-6930 ๏ฎ Address-light and energy aware routing protocol for wireless... (Hamdollah Ghamgin) 1677 3.2. Route Generation, Label Allocation, and Infrastructure Creation Phase This phase is the most important stage of this algorithm, which start after completing the first phase and process alternatively. Labeling, generating infrastructure routes and their propagation in different directions are the most advantage of ALERP which make it different from other similar algorithms. After completion of layering process, the sink which has endless energy in the network, will ask for remaining energy of critical layer nodes by propagation of ENERGY-REQ package. In responses to this package, the nodes available in propagation area will send back their remaining energy to the demanding node by ENERGY-REP. Note that each node palace a random number in the ENERGY-REP package before sending it in order to distinguish itself from other nodes. The receiver node place appropriate label near each sent random number and the sender node can detect its label by comparing random numbers. This action takes place in the entire process in order to determine sender information. After receiving remaining energy of each node and sorting it out, the sink assigns a label to each node. This assignment is in such a way that, low energy nodes receive larger labels and high energy nodes receive shorter labels shown in Table 1. Labels are selected in such a way that, by increasing of their amount in the next layers, numerical overlapping does not occur at all. Table 1. Labels Assigned to the Nodes Available in the Critical Area Energy remained (mw) Lable specified for Critical Zone nodes 420 1000 310 2000 267 3000 150 4000 For example, in Table 1 the intervals are in 1000 units. At the next stage, each node available in the critical area performs like the sink with the difference that the most energetic node in the next layer receives a label which is the same as labels of critical area nodes. For example, if the node has the label of 1000 then the most energetic node at the next layer receive the label of 1000 and other nodes available in propagation area receive the label of 1001. Nodes that are not around the main branch, for example nodes that are around the propagation area of a node with the label of 1001 and do not have any label prioritization receive a label with the number of 1002 on it; this action continue until the end. The main branch nodes with label of 1000 continue to do their tasks like previous stage. Packages of label assignment are shown in Figure 2. There are different scenarios at label assignment and infrastructure creation phase. Figure 2. data packages exchanged in the entire routing process a. If the node receive different label from a layer, it will select smallest label, and chose a target layer, i.e. the layer which received selected label from it. b. If a node receives identical label from one layer several time, it will select that label and the labeling layer will be the target layer.
  • 5. ๏ฎ ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 4, August 2019: 1674-1682 1678 c. If a node receives identical label from multiple layers, then the intended label will be selected as node label and the layer with smallest number will be chosen as the target layer. d. If the node receives different labels from different layers of the main branch: e. If the smallest label is received from lowest layer, both of them will be chosen. f. If the smallest label is received from larger layer, selecting depends on the size of ๐›ผ. If 1 โ‰ค ๐›ผ โ‰ค 2, then smallest label and its corresponding layer will be chosen. g. If the node receives different labels from two different main branches: according to default terms which are determined previously, only one of them will be chosen and terminates the labeling process. If the node receives a label with the number of 1000 from one side and a label with the number of 2000 from other side, it terminates all the processes of propagating label packages after selecting its own label. The last scenario terminates label propagation of the border node which placed between two label areas. Thus, after completing label propagation process and creating infrastructures, the general outline of the network is achieved, that is shown in Figure 3. In this picture infrastructure routes are shown separately; nodes that received a new label are shown the same as before but with lighter color. And like this, label assigning and infrastructure creation phase will come to the end. Figure 3. An overall view of the network after label assigning 3.3. Sending Data Phase After completing label assigning and infrastructure creation phase, each node obtain its own label and target layer, i.e. a layer which data should be sent to it. In fact, labels that are assigned to the nodes other than infrastructural nodes are a sign to show each node that they should receive packages with this label. In sending data phase, whenever a node has a data to send, create a package for it. This package is shown in Figure 2. In fact the random values added to each data packages, are values that helps to distinguish each data package from others. SOURCE-TIER is the name of an item existing in the data package which the number of layer is placed into it by the package creator. After receiving the package, each node reduces its label amount by one, and then place the number of target layer which was obtained from previous phase into TARGET-TIER part. This will continue until package reaches to the infrastructure. Once the package reached to one of the nodes available in the infrastructure, then in each delivery the nodes only reduces one number from target layer and package label remain unchanged. Hence, the package will be sent quickly to the sink through infrastructural nodes.
  • 6. TELKOMNIKA ISSN: 1693-6930 ๏ฎ Address-light and energy aware routing protocol for wireless... (Hamdollah Ghamgin) 1679 3.4. Simulations Results In this paper all of simulations are done by GlomoSim simulator [13-20]. This simulator has been implemented at UCLA University, has PARSEC as a compiler, and was programmed by C++. In this paper we tried to provide a comparison between obtained simulation results and simulation of GPSR protocol. The simulation is carried out in an area with 50 to 100 nodes. The nodes are placed randomly and uniformly in the area with 100 ร— 100 ๐‘š2 space. To carry out the simulation we used MAC MACAW protocol with physical layer of 914 MHz Lucent WaveLAN DSSS. During simulation, propagation radius of the nodes is about 10 m and remains constant in the entire process. Primary energy of all the nodes are equal to each other which is assumed to be 1000 joules and the require energy for sending and receiving data is considered to be 0.281 joules. Our simulation is carried out with 10 CBR flow. The source of this data flow is selected randomly from available nodes and its destination is the sink. Each CBR flow can transform four packages per one second; the size of these packages should be 512 bit at minimum and 10000 bit at maximum. Simulation time is assumed to be 3600 second. We used the following process for this simulation in order to measure fair division of the tasks between the nodes, fair division means almost equal partnership of all nodes in routing and sending data to the sink. In this process, if more sensors have close energy amount, the fairer our algorithm become. To indicate this process Figure 3 was presented. We saved the remaining energy of the nodes at 360 second intervals to obtain these data. Diagram 1 shows remaining energy of nodes after 70% of simulation time. The maximum energy level of the nodes is between 50-80% which are sensors existing in middle and bottom layers. The nodes with 0-20% energy level are from critical area. Figure 3. A comparison between the numbers of available nodes in ALERP and GPSR protocols after 70% of simulation time All of network traffics must transmit to the sink through the nodes which exist in the critical area, and due to this most of energy consuming occurs in this layer. In order to indicate energy uniformity of most of the nodes we used (1) in the simulation. In this equation, ๐‘†๐‘— indicates the number of nodes with energy level of j (each column in the diagram). As indicated in this diagram, the more nodes available at the maximum band and its surrounding the more uniform the remaining energy of the nodes and fairer division of the tasks in the network will be. ๐‘“(๐‘ก) is defined in (1) and is drawn according to percentage of simulation time in Figure 4. ๐‘“(๐‘ก) is drawn for GPSR protocol as well. ๐‘†๐‘—+1(๐‘ก) = ๐‘€๐ด๐‘‹ ๐‘“(๐‘ก) = โˆ‘ ๐‘† ๐‘—(๐‘ก) ๐‘—+2 ๐‘— โˆ‘ ๐‘† ๐‘—(๐‘ก)10 ๐‘–=1 (1)
  • 7. ๏ฎ ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 4, August 2019: 1674-1682 1680 Figure 4. A comparison to ๐‘“(๐‘ก) fairness between ALERP and GPSR protocols This definition indicates the percentage of nodes available in maximum band and its neighbors. Figure 4 shows ๐‘“(๐‘ก) according to time lapse in the network. As you see in this diagram, with the passage of time ALERP causes uniformity in the network and make ๐‘“(๐‘ก) to remain nearly constant as well. But, passage of time in networks with GPSR algorithm causes ๐‘“(๐‘ก) to decrease gradually. Some of diagrams are related to lifetime; the intended meaning for lifetime is the time when the first node turns off. Figure 4 checks the life time of different number nodes in three different algorithms. As you see in this diagram, ALERP has higher lifetime than other two algorithms. This is due to fair division of the tasks and sending data through infrastructures. These infrastructures are generated periodically and based on remaining energy of the nodes. Figure 5 indicates lifetime of the network at different time intervals to renew infrastructures and allocate labels. Figure 5. A comparison between lifetimes of the network in ALERP, GPSR, and FLOODING algorithms Figure 6 indicates the existence of an optimal frequent time for regenerating infrastructure routes. Due to short time intervals, times lesser than the intended time imposes network to relatively high flooding caused by routing. Conversely, if time intervals for generating routs are high, the advantage of renewing infrastructure become weaker and reduces lifetime of the network.
  • 8. TELKOMNIKA ISSN: 1693-6930 ๏ฎ Address-light and energy aware routing protocol for wireless... (Hamdollah Ghamgin) 1681 Figure 6. Lifetime of a sensor network after using ALERP algorithm based on different time intervals in order to generating infrastructure and assigning the labels 4. Conclusion In this paper, we designed an optimal routing protocol for sensor network applications based on concepts such as layering of sensor networks to concentric layers, labeling for each sensor node, and alternatively generating infrastructure and energetic routs. Using these concepts and working on generating new routs with energy consideration, causes nodes with more energy participate more in sending and exchanging packages in the networks and as the result a desirable uniformity is created in the entire network based on remaining energy and consumed energy of each node. Results obtained from simulations indicates that with passing of time the percentage of nodes with identical energy that are placed in energy bands close to each other, are gradually reducing. Therefore, after some times ALERP generates a desirable uniformity [21-25]. In ALERP, nodes available in critical area are managed with a specific mechanism to have a particular uniformity for energy consumption. In networks that use ALERP, if nodes available in critical area tunes off, then we can re-establish the network by propagating some nodes in the critical area. With the use of ALERP we can increase networks lifetime significantly which is due to the uniformity of energy consumption in the network. Also, because ALERP delivers data packages to node available in the infrastructure and then send them through these nodes to the sink, the delay of sending data from source to destination is relatively low. Acknowledgement The authors would like to express their thanks to Iran Telecommunication Research Center (ITRC) for supporting this project. References [1] Guo C, Zhong LC, Rabaey JM. Low power distributed MAC for ad hoc sensor radio networks. In: GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No. 01CH37270). IEEE, 2001: 2944-2948.โ€ซโ€โ€ฌ [2] Gazizov RR, Nagovitsyna TA. Political Manipulation of the Media (On the Example of Mass Media of the Republic Of Tatarstan). Astra Salvensis. 2017; 10.โ€ซโ€โ€ฌ [3] Ye W, Heidemann J, Estrin D. An energy-efficient MAC protocol for wireless sensor networks. In: Proceedings. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE, 2002: 1567-1576.โ€ซโ€โ€ฌ [4] Youssef MA, Younis MF, Arisha KA. A constrained shortest-path energy-aware routing algorithm for wireless sensor networks. In: 2002 IEEE Wireless Communications and Networking Conference Record. WCNC 2002 (Cat. No. 02TH8609). IEEE. 2002: 794-799.โ€ซโ€โ€ฌ
  • 9. ๏ฎ ISSN: 1693-6930 TELKOMNIKA Vol. 17, No. 4, August 2019: 1674-1682 1682 [5] Husnutdinov DH, Aydarova SH, Sagdieva RK, Mirzagitov RH, Tsaran A, Plotnikova H, Velikanova S. Information and communication tools for Tatar language teaching. Modern Journal of Language Teaching Methods. 2017; 7(12): 124-132.โ€ซโ€โ€ฌ [6] Intanagonwiwat C, Govindan R, Estrin D. Directed diffusion: A scalable and robust communication paradigm for sensor networks. In: Proceedings of the 6th annual international conference on Mobile computing and networking. ACM, 2000: 56-67.โ€ซโ€โ€ฌ [7] Inamdar JJ, Annapoorani, KI Iyswarya. A Review of Methods Employed to Identify Flicker Producing Sources. TELKOMNIKA Telecommunication Computing Electronics and Control. 2018; 16(2): 465-480.โ€ซโ€โ€ฌ [8] Shah RC, Rabaey JM. Energy aware routing for low energy ad hoc sensor networks. In: 2002 IEEE Wireless Communications and Networking Conference Record. WCNC 2002 (Cat. No. 02TH8609). IEEE, 2002: 350-355.โ€ซโ€โ€ฌ [9] Nordin AN, Ibrahim I, Mansor AFM, Hashim YZHY, Voiculescu I. Content Cytotoxicity Studies of Colorectal Carcinoma Cells Using Printed Impedance Sensors. Bulletin of Electrical Engineering and Informatics. 2017; 6(4): 317-326.โ€ซโ€โ€ฌ [10] Kulkarni S, Iyer A, Rosenberg C. An address-light, integrated MAC and routing protocol for wireless sensor networks. IEEE/ACM Transactions on Networking (TON). 2006; 14(4): 793-806.โ€ซโ€โ€ฌ [11] Min R, Chandrakasan A. Energy-efficient communication for ad-hoc wireless sensor networks. In: Conference Record of Thirty-Fifth Asilomar Conference on Signals, Systems and Computers (Cat. No. 01CH37256). IEEE, 2001: 139-143.โ€ซโ€โ€ฌ [12] Zeng X, Bagrodia R, Gerla M. GloMoSim: a library for parallel simulation of large-scale wireless networks. In: Proceedings. Twelfth Workshop on Parallel and Distributed Simulation PADS'98 (Cat. No. 98TB100233). IEEE, 1998: 154-161.โ€ซโ€โ€ฌ [13] Uzmรกn SA, Fรณster PF, Ramรญrez-Correa P, Grandรณn EE, Alfaro-Perez J. Information Systems and their Effect on Organizational Performance: An Inquiry into Job Satisfaction and Commitment in Higher Education Institutions. Journal of Information Systems Engineering & Management. 2018; 3(4): 26. [14] Ngirwa CC, Ally M. An ICT Based Solution for Pesticides Authenticity Verification: A Case of Tanzania. Journal of Information Systems Engineering & Management. 2018; 3(4): 27. [15] Dhanotiya, Abhijeet; Sharma, Vishal. Power reduction in digital VLSI circuits. International Journal of Research in IT, Management and Engineering. 2014; 4(6): 13-23.โ€ซโ€โ€ฌ [16] Arabmarkadeh, Arash, Jalili, Fahime, Chegini, Parvane. Use of Loofa-Immobilized RhizopusOryzae as a whole-cell biocatalyst in a batch and packed-bed bioreactor. Nationalpark-Forschung in der Schweiz (Switzerland Research Park Journal). 2014; 103(1).โ€ซโ€โ€ฌ [17] Nehzat Ebrahimi, Jalil Rashidinia. Spline Collocation for Volterra-Fredholm Integro-Differential Equations. UCT Journal of Research in Science, Engineering and Technology. 2014; 2(1): 01-03. [18] Montazeri-Gh, Morteza, and Mehdi Mahmoodi-k. Development a new power management strategy for power split hybrid electric vehicles. Transportation Research Part D: Transport and Environment. 2015; 37: 79-96. [19] Mashadi B, Y Amiri-rad, A Afkar, M. Mahmoodi-kaleybar. Simulation of automobile fuel consumption and emissions for various driver's manual shifting habits. Journal of Central South University. 2014; 3: 31. [20] Davoodabadi Farahani, Hamideh Shahsavari. GIS Modeling of Earthquake Damage Zones Using ETM Data and Remote Sensing-Bojnoord, Khorasan Province. UCT Journal of Research in Science, Engineering and Technology. 2013; 1(1): 07-11. [21] Mahdi Nasiri, Behrouz Minaei, Mansour Rezghi. Fuzzy dynamic tensor decomposition algorithm for recommender system. UCT Journal of Research in Science, Engineering and Technology. 2014; 2: 52-55. [22] Mendes LD, Rodrigues JJ. A survey on cross-layer solutions for wireless sensor networks. Journal of Network and Computer Applications. 2011; 34(2): 523-34. [23] Pan MS, Tsai CH, Tseng YC. The orphan problem in ZigBee wireless networks. IEEE Transactions on Mobile Computing. 2009; 8(11): 1573-84. [24] Sahoo A, Chilukuri S. DGRAM: a delay guaranteed routing and MAC protocol for wireless sensor networks. IEEE Transactions on Mobile Computing. 2010; 9(10): 1407-23. [25] Montazeri-Gh M, Mahmoodi-k M. Development a new power management strategy for power split hybrid electric vehicles. Transportation Research Part D. 2015; 37: 79-96.