SlideShare a Scribd company logo
1 of 7
Download to read offline
http://www.iaeme.com/IJARET/index.asp 238 editor@iaeme.com
International Journal of Advanced Research in Engineering and Technology (IJARET)
Volume 10, Issue 2, March-April 2019, pp. 238-244. Article ID: IJARET_10_02_023
Available online at http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=10&IType=02
ISSN Print: 0976-6480 and ISSN Online: 0976-6499
© IAEME Publication
A RELATIVE STUDY ON CELLULAR, WSN AND
MANETS
Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr. Syed Abdul Sattar, Syed Mohd
Ali
Associate Prof, Shadaan College of Engineering, Prof., DCET, Hyderabad, Principal
NSAKCET, Research Scholar, JNTUH, India
ABTRACT
A cellular network is an asymmetric radio network which is made up of fixed
transceivers or nodes, maintain the signal while the mobile transceiver which is using
the network is in the vicinity of the node. An ad-hoc network is a local area network
(LAN) that is built spontaneously as devices connect.
Instead of relying on a base station to coordinate the flow of messages to each node
in the network, the individual network nodes forward packets to and from each other.
This paper focuses on various issues, architecture and routing protocols in cellular,
adhoc and sensor networks. As issues proves helpful for forthcoming research, this
paper work as a backbone to elaborate the various research areas.
Keywords: Sensor Netwok , Cellular Network, Adhoc Network, Issues , Requirements,
architecture, routing protocols.
Cite this Article: Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr. Syed Abdul
Sattar and Syed Mohd Ali, A Relative Study on Cellular, WSN and Manets,
International Journal of Advanced Research in Engineering and Technology, 10(2),
2019, pp. 238-244.
http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=10&IType=2
1. INTRODUCTION
A WSN is a collection of sensors that can communicate through wired or wireless medium. The
sensors are allowed to communicate within its communication range. A Cellular network is one
of the radio network distributed over land areas called cells, each served by at least one
fixedlocation transceiver known as a cell site or base station. When these cells joined together
provide radio coverage over a wide geographic area. A wireless adhoc network is a
decentralized type of wireless network. The network is adhoc because it does not depend on a
preexisting infrastructure, such as routers in wired networks or access points in managed,
infrastructure wireless networks.
A Relative Study on Cellular, WSN and Manets
http://www.iaeme.com/IJARET/index.asp 239 editor@iaeme.com
2. WIRELESS SENSOR NETWORK
A WSN is a collection of sensors that can communicate through wired or wireless medium. The
sensors are allowed to communicate within its communication range. It has received a greater
interest in various applications such as disaster management, border protection, combat field
reconnaissance, in military for security surveillance, structural health monitoring, industrial
automation, civil structure monitoring, and monitoring the biologically hazardous places and
in variety of applications.
A sensor network must be able to operate under changing environment. Specifically, our
protocols must be able to enable network operation during start-up, steady state, and failure.The
necessity of operation under these conditions is required because in most cases, the sensor
network must operate unattended. Once the nodes have booted up and a network is formed,
most of the nodes will be able to sustain a steady state of operation, i.e. their energy reservoirs
are nearly full and they can support all the sensing, signal processing and communications tasks
as required. In this mode, the group of the nodes will be formed into a multi-hop wireless
network. The node begin to establish and maintain paths by which information is passed to one
or more sink nodes.
A Sink node is act as a clusterhead which gather, control and forward data collected by
other sensor nodes. A sink node is having the large transmission range as compare to other
nodes. The sink may also be a mobile node or active node acting as information sink, or any
other entity that is extracting the information from the sensor network. Although the multi-hop
network can operate in both the sensor-to-sink or sink-to-sensor
Sensor nodes are expected to operate and adjust in changing environments and should be
applicable in large areas. Failures are susceptible in wireless sensor networks due to
inhospitable, unstable environment and unattended deployment. The data communication from
transmitter to receiver and vice versa may cause energy depletion in sensor nodes and therefore,
it is common for sensor nodes to exhaust its energy completely and stop operating and thus,
need to switch between wakeup and sleep modes. This may cause connectivity and data loss
during communication. Therefore, it is necessary that network failures are detected in advance
and appropriate measures should be taken to avoid network failures. Figure 1 gives a description
of the simple node architecture[2].
To design a system, the mobile assumes full responsibility of making and breaking
connections.
Figure 1 Node Architecture
If the invitation message, which is inherently part of the stationary MAC algorithm, is
included as a shared message. Figure 2 shows general mobile scenario[2].
Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr. Syed Abdul Sattar, Syed Mohd Ali
http://www.iaeme.com/IJARET/index.asp 240 editor@iaeme.com
Figure 2 General Mobile Scenario
Figure 3 Architecture of sensor node
Routing protocols in WSNs are as follows:
• Flat Routing: each node performs the same role and sensor nodes work together to
perform the sensing task.
• Hierarchical (Cluster-based) Routing: higher-energy nodes are used to process and send
the
• scalability, lifetime of the network, and energy efficiency. Hierarchical routing is an
efficient way information, while low-energy nodes are used to perform the sensing in
the proximity of the target. The creation of clusters and assigning special tasks to cluster
heads leads to overall system to lower energy consumption within a cluster, performing
data aggregation and fusion in order to decrease the number of transmitted messages to
the sink node
• Location-based: sensor nodes are addressed by means of their locations. The distance
between neighboring nodes can be estimated on the basis of incoming signal strengths.
To save energy, some location-based schemes demand that nodes should go to sleep if
there is no activity. Depending on the protocol operation we can divide routing protocols
in:
• Query-based: the destination nodes propagate a query for data from a node through the
network, a node with this data sends the data that matches the query back to the node
that initiated it.
• Negotiation-based: use negotiation in order to eliminate redundant data transmissions.
Data transmission and reception decisions are also made based on the available
resources.
A Relative Study on Cellular, WSN and Manets
http://www.iaeme.com/IJARET/index.asp 241 editor@iaeme.com
• QoS-based: when delivering data, the network balances between energy consumption
and data quality through certain QoS metrics as delay, energy or bandwidth.
• Coherent-based: the entity of local data processing on the nodes distinguish between
coherent (minimum processing) and non-coherent (full processing) routing protocols.
2.1. Issues in WSN Security
Energy efficiency: The requirement for energy efficiency suggests that in most cases
computation is favoured over communication, as communication is three orders of magnitude
more expensive than computation
Figure 1 A Wireless Sensor Network
• Cryptography: No public key cryptography is provided in wireless sensor network.
Public-key algorithms is expensive on sensor nodes as in case of storage and energy.
• Multilayers for security: Security becomes an important factor because attacks can
occur on different layers of a networking stack as defined in the OSI model.
2.2. Security Requirements in WSN
• Data Confidentiality: Data confidentiality is one of the important issue in network
security. The security can be maintained and provided by applying strong cryptographic
algorithms. Confidentiality means that unauthorized third parties cannot read
information between two communicating parties while transmitting data from one end
to another.
• Data Integrity and authenticity: Data confidentiality only ensures that data can not be
read by the third party, but it does not guarantee that data is unaltered or unchanged in
the middle of transmission. Integrity means that the receiver should get the original data.
3. CELLULAR NETWORK
A Cellular network is one of the radio network distributed over land areas called cells, each
served by at least one fixed-location transceiver known as a cell site or base station .When these
cells joined together provide radio coverage over a wide geographic areas. Cellular networks
provides the advantages such as increased capacity, reduced power use, large coverage area,
reduced interference from other signals. Figure 4. shows the cellular network.
Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr. Syed Abdul Sattar, Syed Mohd Ali
http://www.iaeme.com/IJARET/index.asp 242 editor@iaeme.com
Figure 4 A Cellular Network
Multihop Cellular Networks (MCN) are more demanding on MAC protocols than SCNs. In
SCNs, the BS is involved in every transmission of a frame, either as the transmitter or as the
receiver. This considerably simplifies the channel assignment, and MAC protocols as simple as
slotted ALOHA (used by GSM for access requests) prove to be adequate. The spatial fairness
that the MAC protocol provides is to be looked into too. Although it is possible to provide
connectionoriented services in MCNs by partitioning the available bandwidth into channels as
in SCNs, in this paper, we use one single channel, mpacket switched, contention based MAC
protocols. The scalability requirements for MCNs are to be met. Figure 5. Shows the
architecture of Wireless Sensor Network.
Figure 5 Architecture of Wireless Sensor Network
3.1. Security Issues in Cellular Network
• Authentication: Cellular networks have a large number of subscribers, and each has to
be authenticated to guarantee the right people are using the network.
• Integrity: With services such as Short Messaging Service, online/offline chat and file
transfer it is important that the data arrives without any modifications.
• Access Control: The Cellular device may have files that need to have restricted access
to them from users or any kind of unauthorized users.
A Relative Study on Cellular, WSN and Manets
http://www.iaeme.com/IJARET/index.asp 243 editor@iaeme.com
• Web Services: A Web Service is an element that provides functionality accessible
through the web using the standard HTTP Protocol. This opens the device to variety of
security issues such as viruses, buffer overflows, denial of service attacks etc.
• Downloaded Contents: Online downloads invites the spywares causing security issues.
Another problem is that of digital rights management. User might download
unauthorized copies which leads to securities deformity.
4. MOBILE ADHOC NETWORK
A wireless adhoc network is a decentralized type of wireless network. The network is adhoc
because it does not depend on a preexisting infrastructure, such as routers in wired networks or
access points in managed, infrastructure wireless networks. Instead, each node participates in
routing by forwarding data for other nodes, and so the determination of which nodes forward
data is made dynamically based on the network connectivity. A Mobile Adhoc Network
(MANET) is an autonomous collection of mobile routers and associated hosts connected by
bandwidthconstrained wireless links.
Figure 6 A Mobile Adhoc Network (MANET)
The network’s wireless topology may change rapidly and unpredictably. Such a network
may operate in a standalone fashion or may be connected to the larger Internet. Figure 3. Shows
the mobile adhoc network. Three categories that existing ad-hoc network routing protocols are
as follows:
1. Table Driven Protocols
2. On Demand Protocols
3. Hybrid Protocols
Figure 7 Adhoc routing protocols
Table Driven Routing Protocols, also known as Proactive Protocols, they are independent
of traffic demands.This type of protocol is slow to come together. Table Driven Protocols will
use limited resources such as power, bandwidth.
On Demand Routing Protocols, also known as Reactive Protocols, they establish routes
between nodes only when they are required to route data packets. On Demand protocols are
efficient when the route discovery is frequent than the data transfer. On Demand Protocols more
useful in large networks with light traffic and with low mobility.
Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr. Syed Abdul Sattar, Syed Mohd Ali
http://www.iaeme.com/IJARET/index.asp 244 editor@iaeme.com
Hybrid Routing Protocols combine the features of Table Based Routing Protocols and On
Demand Routing Protocols.
4.1. Security Problems in Adhoc Network
• Susceptible to Channels: messages can be eavesdropped and bogus messages can be
injected into the network without the difficulty of having physical access to network
components which violent the security issue.
• Lack of Infrastructure: Ad hoc networks are considered to operate independently of any
fixed infrastructure.
4.2. Security Requirements for Adhoc Network
• Confidentiality: Ensures certain information is never disclosed to unauthorized users.
• Integrity: Message received at the receiver side must be original.
• Authentication: Only the authorized user can access the data.
• Non-impersonation: Noone can act to be another authorized member to learn any useful
information.
• Attacks using fabrication: Attackers created the false route to access the information.
This type of attacks is hard to identify.
5. CONCLUSIONS
This paper proposed the comparison between sensor network, cellular network and adhoc
network . Also this paper includes various security issues requirements of the above networks.
Also it includes the architecture and various routing protocols of these main wireless networks.
REFERENCES
[1] Zoran S. Bojkovic, Bojan M. Bakmaz, and Miodrag R. Bakmaz (2008), “Security Issues in
WSN,”International Journal Of Communications, Issue 1, Volume 2.
[2] Katayoun Sohrabi, Jay Gao, ishal Ailawadhi and Gregory J Pottie, “Protocols for Self-
Organization in Wireless Sensor Network”, IEEE Journal on Personal Communication,
2000.
[3] http://ntrg.cs.tcd.ie/undergrad/4ba2.05/group11/index.html
[4] Karan Singh, R. S. Yadav, Ranvijay (2007), “Review Paper On Ad Hoc Network Security”,
International Journal of Computer Science and Security”, Issue 1, Volume 1.
[5] Kalpana Sharma, M.K. Ghose, Deepak Kumar, Raja Peeyush Kumar Singh, Vikas Kumar
Pande (2010), “A Comparative Study of Various Security Approaches Used in Wireless
Sensor Networks”,International Journal of Advanced Science and Technology, Vol. 17.
[6] H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang (2004), “Security in mobile adhoc networks:
challenges and solutions," IEEE Wireless Communications, vol. 11, no. 1, pp. 38-47.
[7] Roberto Di Pietro, Pietro Michiardi, Refik Molva (2007), “Confidentiality and Integrity for
Data Aggregation in WSN using Peer Monitoring”.
[8] Nandini. S. Patil, Prof. P. R. Patil (2010), “Data Aggregation in Wireless Sensor
Network,”IEEE International Conference on Computational Intelligence and Computing
Research, 2010.
[9] Li, Raghu Kisore Neelisetti, Cong Liu, and Alvin Lim (2010), “Efficient Multipath Protocol
for WSN”, International Journal of Mobile and Wireless, Vol 2, No.1.
[10] Simarpreet Kaur, and Leena Mahajan (2011),“Power Saving MAC Protocols for WSNs and
Optimization of S-MAC Protocol”, International Journal of Radio Frequency Identification
and Wireless Sensor Networks.

More Related Content

What's hot

IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET Journal
 
An active technique for power saving in WSN under additive white gaussian noi...
An active technique for power saving in WSN under additive white gaussian noi...An active technique for power saving in WSN under additive white gaussian noi...
An active technique for power saving in WSN under additive white gaussian noi...IJECEIAES
 
Power Management in Wireless Sensor Network
Power Management in Wireless Sensor NetworkPower Management in Wireless Sensor Network
Power Management in Wireless Sensor NetworkBhavik Panchal
 
Analysis and Performance evaluation of Traditional and Hierarchal Sensor Network
Analysis and Performance evaluation of Traditional and Hierarchal Sensor NetworkAnalysis and Performance evaluation of Traditional and Hierarchal Sensor Network
Analysis and Performance evaluation of Traditional and Hierarchal Sensor NetworkIJMER
 
Comprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolComprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolIJRES Journal
 
A Survey- Energy Efficient Techniques in WBAN
A Survey- Energy Efficient Techniques in WBANA Survey- Energy Efficient Techniques in WBAN
A Survey- Energy Efficient Techniques in WBANIRJET Journal
 
Introduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkIntroduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkSanjeev Kumar Jaiswal
 
207088 633815660985047486
207088 633815660985047486207088 633815660985047486
207088 633815660985047486Sathish Pilla
 
A Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkA Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkIJMER
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET Journal
 

What's hot (19)

IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
 
0512ijdps26
0512ijdps260512ijdps26
0512ijdps26
 
I018135565
I018135565I018135565
I018135565
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 
An active technique for power saving in WSN under additive white gaussian noi...
An active technique for power saving in WSN under additive white gaussian noi...An active technique for power saving in WSN under additive white gaussian noi...
An active technique for power saving in WSN under additive white gaussian noi...
 
Power Management in Wireless Sensor Network
Power Management in Wireless Sensor NetworkPower Management in Wireless Sensor Network
Power Management in Wireless Sensor Network
 
Analysis and Performance evaluation of Traditional and Hierarchal Sensor Network
Analysis and Performance evaluation of Traditional and Hierarchal Sensor NetworkAnalysis and Performance evaluation of Traditional and Hierarchal Sensor Network
Analysis and Performance evaluation of Traditional and Hierarchal Sensor Network
 
Comprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolComprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing Protocol
 
40120140503011
4012014050301140120140503011
40120140503011
 
file4.pdf
file4.pdffile4.pdf
file4.pdf
 
9345.pdf
9345.pdf9345.pdf
9345.pdf
 
A Survey- Energy Efficient Techniques in WBAN
A Survey- Energy Efficient Techniques in WBANA Survey- Energy Efficient Techniques in WBAN
A Survey- Energy Efficient Techniques in WBAN
 
Introduction to Mobile adhoc-network
Introduction to Mobile adhoc-networkIntroduction to Mobile adhoc-network
Introduction to Mobile adhoc-network
 
R33092099
R33092099R33092099
R33092099
 
207088 633815660985047486
207088 633815660985047486207088 633815660985047486
207088 633815660985047486
 
A Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkA Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor Network
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
 
Lh3420492054
Lh3420492054Lh3420492054
Lh3420492054
 

Similar to A RELATIVE STUDY ON CELLULAR, WSN AND MANETS

A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc NetworksA Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networkscscpconf
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networkspijans
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in ManetProf Ansari
 
A Review Paper on Energy Capable Routing in Wireless Sensor Network
A Review Paper on Energy Capable Routing in Wireless Sensor NetworkA Review Paper on Energy Capable Routing in Wireless Sensor Network
A Review Paper on Energy Capable Routing in Wireless Sensor Networkijtsrd
 
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksSpread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksIDES Editor
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...IJEEE
 
Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Vivek Maurya
 
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSijassn
 
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...ijwmn
 
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOSENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOSIAEME Publication
 
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOSENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOSIAEME Publication
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Editor IJARCET
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...journalBEEI
 

Similar to A RELATIVE STUDY ON CELLULAR, WSN AND MANETS (20)

A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc NetworksA Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in Manet
 
A Review Paper on Energy Capable Routing in Wireless Sensor Network
A Review Paper on Energy Capable Routing in Wireless Sensor NetworkA Review Paper on Energy Capable Routing in Wireless Sensor Network
A Review Paper on Energy Capable Routing in Wireless Sensor Network
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksSpread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
 
Abstract
AbstractAbstract
Abstract
 
S04404116120
S04404116120S04404116120
S04404116120
 
Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)
 
Oj3425062509
Oj3425062509Oj3425062509
Oj3425062509
 
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
 
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...
 
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOSENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
 
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOSENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
ENERGY EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS BASED ON QOS
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 

Recently uploaded (20)

Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 

A RELATIVE STUDY ON CELLULAR, WSN AND MANETS

  • 1. http://www.iaeme.com/IJARET/index.asp 238 editor@iaeme.com International Journal of Advanced Research in Engineering and Technology (IJARET) Volume 10, Issue 2, March-April 2019, pp. 238-244. Article ID: IJARET_10_02_023 Available online at http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=10&IType=02 ISSN Print: 0976-6480 and ISSN Online: 0976-6499 © IAEME Publication A RELATIVE STUDY ON CELLULAR, WSN AND MANETS Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr. Syed Abdul Sattar, Syed Mohd Ali Associate Prof, Shadaan College of Engineering, Prof., DCET, Hyderabad, Principal NSAKCET, Research Scholar, JNTUH, India ABTRACT A cellular network is an asymmetric radio network which is made up of fixed transceivers or nodes, maintain the signal while the mobile transceiver which is using the network is in the vicinity of the node. An ad-hoc network is a local area network (LAN) that is built spontaneously as devices connect. Instead of relying on a base station to coordinate the flow of messages to each node in the network, the individual network nodes forward packets to and from each other. This paper focuses on various issues, architecture and routing protocols in cellular, adhoc and sensor networks. As issues proves helpful for forthcoming research, this paper work as a backbone to elaborate the various research areas. Keywords: Sensor Netwok , Cellular Network, Adhoc Network, Issues , Requirements, architecture, routing protocols. Cite this Article: Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr. Syed Abdul Sattar and Syed Mohd Ali, A Relative Study on Cellular, WSN and Manets, International Journal of Advanced Research in Engineering and Technology, 10(2), 2019, pp. 238-244. http://www.iaeme.com/IJARET/issues.asp?JType=IJARET&VType=10&IType=2 1. INTRODUCTION A WSN is a collection of sensors that can communicate through wired or wireless medium. The sensors are allowed to communicate within its communication range. A Cellular network is one of the radio network distributed over land areas called cells, each served by at least one fixedlocation transceiver known as a cell site or base station. When these cells joined together provide radio coverage over a wide geographic area. A wireless adhoc network is a decentralized type of wireless network. The network is adhoc because it does not depend on a preexisting infrastructure, such as routers in wired networks or access points in managed, infrastructure wireless networks.
  • 2. A Relative Study on Cellular, WSN and Manets http://www.iaeme.com/IJARET/index.asp 239 editor@iaeme.com 2. WIRELESS SENSOR NETWORK A WSN is a collection of sensors that can communicate through wired or wireless medium. The sensors are allowed to communicate within its communication range. It has received a greater interest in various applications such as disaster management, border protection, combat field reconnaissance, in military for security surveillance, structural health monitoring, industrial automation, civil structure monitoring, and monitoring the biologically hazardous places and in variety of applications. A sensor network must be able to operate under changing environment. Specifically, our protocols must be able to enable network operation during start-up, steady state, and failure.The necessity of operation under these conditions is required because in most cases, the sensor network must operate unattended. Once the nodes have booted up and a network is formed, most of the nodes will be able to sustain a steady state of operation, i.e. their energy reservoirs are nearly full and they can support all the sensing, signal processing and communications tasks as required. In this mode, the group of the nodes will be formed into a multi-hop wireless network. The node begin to establish and maintain paths by which information is passed to one or more sink nodes. A Sink node is act as a clusterhead which gather, control and forward data collected by other sensor nodes. A sink node is having the large transmission range as compare to other nodes. The sink may also be a mobile node or active node acting as information sink, or any other entity that is extracting the information from the sensor network. Although the multi-hop network can operate in both the sensor-to-sink or sink-to-sensor Sensor nodes are expected to operate and adjust in changing environments and should be applicable in large areas. Failures are susceptible in wireless sensor networks due to inhospitable, unstable environment and unattended deployment. The data communication from transmitter to receiver and vice versa may cause energy depletion in sensor nodes and therefore, it is common for sensor nodes to exhaust its energy completely and stop operating and thus, need to switch between wakeup and sleep modes. This may cause connectivity and data loss during communication. Therefore, it is necessary that network failures are detected in advance and appropriate measures should be taken to avoid network failures. Figure 1 gives a description of the simple node architecture[2]. To design a system, the mobile assumes full responsibility of making and breaking connections. Figure 1 Node Architecture If the invitation message, which is inherently part of the stationary MAC algorithm, is included as a shared message. Figure 2 shows general mobile scenario[2].
  • 3. Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr. Syed Abdul Sattar, Syed Mohd Ali http://www.iaeme.com/IJARET/index.asp 240 editor@iaeme.com Figure 2 General Mobile Scenario Figure 3 Architecture of sensor node Routing protocols in WSNs are as follows: • Flat Routing: each node performs the same role and sensor nodes work together to perform the sensing task. • Hierarchical (Cluster-based) Routing: higher-energy nodes are used to process and send the • scalability, lifetime of the network, and energy efficiency. Hierarchical routing is an efficient way information, while low-energy nodes are used to perform the sensing in the proximity of the target. The creation of clusters and assigning special tasks to cluster heads leads to overall system to lower energy consumption within a cluster, performing data aggregation and fusion in order to decrease the number of transmitted messages to the sink node • Location-based: sensor nodes are addressed by means of their locations. The distance between neighboring nodes can be estimated on the basis of incoming signal strengths. To save energy, some location-based schemes demand that nodes should go to sleep if there is no activity. Depending on the protocol operation we can divide routing protocols in: • Query-based: the destination nodes propagate a query for data from a node through the network, a node with this data sends the data that matches the query back to the node that initiated it. • Negotiation-based: use negotiation in order to eliminate redundant data transmissions. Data transmission and reception decisions are also made based on the available resources.
  • 4. A Relative Study on Cellular, WSN and Manets http://www.iaeme.com/IJARET/index.asp 241 editor@iaeme.com • QoS-based: when delivering data, the network balances between energy consumption and data quality through certain QoS metrics as delay, energy or bandwidth. • Coherent-based: the entity of local data processing on the nodes distinguish between coherent (minimum processing) and non-coherent (full processing) routing protocols. 2.1. Issues in WSN Security Energy efficiency: The requirement for energy efficiency suggests that in most cases computation is favoured over communication, as communication is three orders of magnitude more expensive than computation Figure 1 A Wireless Sensor Network • Cryptography: No public key cryptography is provided in wireless sensor network. Public-key algorithms is expensive on sensor nodes as in case of storage and energy. • Multilayers for security: Security becomes an important factor because attacks can occur on different layers of a networking stack as defined in the OSI model. 2.2. Security Requirements in WSN • Data Confidentiality: Data confidentiality is one of the important issue in network security. The security can be maintained and provided by applying strong cryptographic algorithms. Confidentiality means that unauthorized third parties cannot read information between two communicating parties while transmitting data from one end to another. • Data Integrity and authenticity: Data confidentiality only ensures that data can not be read by the third party, but it does not guarantee that data is unaltered or unchanged in the middle of transmission. Integrity means that the receiver should get the original data. 3. CELLULAR NETWORK A Cellular network is one of the radio network distributed over land areas called cells, each served by at least one fixed-location transceiver known as a cell site or base station .When these cells joined together provide radio coverage over a wide geographic areas. Cellular networks provides the advantages such as increased capacity, reduced power use, large coverage area, reduced interference from other signals. Figure 4. shows the cellular network.
  • 5. Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr. Syed Abdul Sattar, Syed Mohd Ali http://www.iaeme.com/IJARET/index.asp 242 editor@iaeme.com Figure 4 A Cellular Network Multihop Cellular Networks (MCN) are more demanding on MAC protocols than SCNs. In SCNs, the BS is involved in every transmission of a frame, either as the transmitter or as the receiver. This considerably simplifies the channel assignment, and MAC protocols as simple as slotted ALOHA (used by GSM for access requests) prove to be adequate. The spatial fairness that the MAC protocol provides is to be looked into too. Although it is possible to provide connectionoriented services in MCNs by partitioning the available bandwidth into channels as in SCNs, in this paper, we use one single channel, mpacket switched, contention based MAC protocols. The scalability requirements for MCNs are to be met. Figure 5. Shows the architecture of Wireless Sensor Network. Figure 5 Architecture of Wireless Sensor Network 3.1. Security Issues in Cellular Network • Authentication: Cellular networks have a large number of subscribers, and each has to be authenticated to guarantee the right people are using the network. • Integrity: With services such as Short Messaging Service, online/offline chat and file transfer it is important that the data arrives without any modifications. • Access Control: The Cellular device may have files that need to have restricted access to them from users or any kind of unauthorized users.
  • 6. A Relative Study on Cellular, WSN and Manets http://www.iaeme.com/IJARET/index.asp 243 editor@iaeme.com • Web Services: A Web Service is an element that provides functionality accessible through the web using the standard HTTP Protocol. This opens the device to variety of security issues such as viruses, buffer overflows, denial of service attacks etc. • Downloaded Contents: Online downloads invites the spywares causing security issues. Another problem is that of digital rights management. User might download unauthorized copies which leads to securities deformity. 4. MOBILE ADHOC NETWORK A wireless adhoc network is a decentralized type of wireless network. The network is adhoc because it does not depend on a preexisting infrastructure, such as routers in wired networks or access points in managed, infrastructure wireless networks. Instead, each node participates in routing by forwarding data for other nodes, and so the determination of which nodes forward data is made dynamically based on the network connectivity. A Mobile Adhoc Network (MANET) is an autonomous collection of mobile routers and associated hosts connected by bandwidthconstrained wireless links. Figure 6 A Mobile Adhoc Network (MANET) The network’s wireless topology may change rapidly and unpredictably. Such a network may operate in a standalone fashion or may be connected to the larger Internet. Figure 3. Shows the mobile adhoc network. Three categories that existing ad-hoc network routing protocols are as follows: 1. Table Driven Protocols 2. On Demand Protocols 3. Hybrid Protocols Figure 7 Adhoc routing protocols Table Driven Routing Protocols, also known as Proactive Protocols, they are independent of traffic demands.This type of protocol is slow to come together. Table Driven Protocols will use limited resources such as power, bandwidth. On Demand Routing Protocols, also known as Reactive Protocols, they establish routes between nodes only when they are required to route data packets. On Demand protocols are efficient when the route discovery is frequent than the data transfer. On Demand Protocols more useful in large networks with light traffic and with low mobility.
  • 7. Syeda Kausar Fatima, Dr. Syeda Gauhar Fatima, Dr. Syed Abdul Sattar, Syed Mohd Ali http://www.iaeme.com/IJARET/index.asp 244 editor@iaeme.com Hybrid Routing Protocols combine the features of Table Based Routing Protocols and On Demand Routing Protocols. 4.1. Security Problems in Adhoc Network • Susceptible to Channels: messages can be eavesdropped and bogus messages can be injected into the network without the difficulty of having physical access to network components which violent the security issue. • Lack of Infrastructure: Ad hoc networks are considered to operate independently of any fixed infrastructure. 4.2. Security Requirements for Adhoc Network • Confidentiality: Ensures certain information is never disclosed to unauthorized users. • Integrity: Message received at the receiver side must be original. • Authentication: Only the authorized user can access the data. • Non-impersonation: Noone can act to be another authorized member to learn any useful information. • Attacks using fabrication: Attackers created the false route to access the information. This type of attacks is hard to identify. 5. CONCLUSIONS This paper proposed the comparison between sensor network, cellular network and adhoc network . Also this paper includes various security issues requirements of the above networks. Also it includes the architecture and various routing protocols of these main wireless networks. REFERENCES [1] Zoran S. Bojkovic, Bojan M. Bakmaz, and Miodrag R. Bakmaz (2008), “Security Issues in WSN,”International Journal Of Communications, Issue 1, Volume 2. [2] Katayoun Sohrabi, Jay Gao, ishal Ailawadhi and Gregory J Pottie, “Protocols for Self- Organization in Wireless Sensor Network”, IEEE Journal on Personal Communication, 2000. [3] http://ntrg.cs.tcd.ie/undergrad/4ba2.05/group11/index.html [4] Karan Singh, R. S. Yadav, Ranvijay (2007), “Review Paper On Ad Hoc Network Security”, International Journal of Computer Science and Security”, Issue 1, Volume 1. [5] Kalpana Sharma, M.K. Ghose, Deepak Kumar, Raja Peeyush Kumar Singh, Vikas Kumar Pande (2010), “A Comparative Study of Various Security Approaches Used in Wireless Sensor Networks”,International Journal of Advanced Science and Technology, Vol. 17. [6] H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang (2004), “Security in mobile adhoc networks: challenges and solutions," IEEE Wireless Communications, vol. 11, no. 1, pp. 38-47. [7] Roberto Di Pietro, Pietro Michiardi, Refik Molva (2007), “Confidentiality and Integrity for Data Aggregation in WSN using Peer Monitoring”. [8] Nandini. S. Patil, Prof. P. R. Patil (2010), “Data Aggregation in Wireless Sensor Network,”IEEE International Conference on Computational Intelligence and Computing Research, 2010. [9] Li, Raghu Kisore Neelisetti, Cong Liu, and Alvin Lim (2010), “Efficient Multipath Protocol for WSN”, International Journal of Mobile and Wireless, Vol 2, No.1. [10] Simarpreet Kaur, and Leena Mahajan (2011),“Power Saving MAC Protocols for WSNs and Optimization of S-MAC Protocol”, International Journal of Radio Frequency Identification and Wireless Sensor Networks.