SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
116
AUTOMATIC CLUSTER FORMATION AND ASSIGNING ADDRESS FOR
WIRELESS SENSOR NETWORK
Mr.Yogesh V Patil, Mr. Pratik Gite, Mr.Sanjay Thakur
LKCT Indore
ABSTRACT
Although wireless sensor networks (WSNs) have been extensively researched, their
deployment is still a main concern. In this paper, we show that the address assignment scheme
defined by ZigBee will perform poorly in terms of address utilization. This paper makes
contribution is that we show that the Automatic Address Assignment. We thus propose Simple,
Efficient. systematically formation of path connected cluster and Automatic Address Assignment for
Wireless Sensor Network
Index Terms: Automatic Address assignment, Wireless Sensor Network, ZigBee.
1. INTRODUCTION
To form a WSN, the most important issues is addressing. Strict per-node addressing is
expensive in a dense network, because not only the address space would be large, but also these
addresses would need to be allocated and managed according to the topology change. Allocation of
addresses in a dense network is a problem which is often underestimated [11]. On the other hand,
routing is to discover paths from source nodes to destination nodes based on their network addresses.
Path discovery in a dense network could incur high communication overhands. Therefore, designing
a light-weight addressing or Automatic Address Assignment for WSNs is very important.
Recently, ZigBee [12] has been proposed for addressing and routing on WSNs. It supports
three kinds of network topologies, namely star, tree, and mesh networks. A ZigBee coordinator is
responsible for initializing, maintaining, and controlling the network. Star networks can only cover
small areas. For tree and mesh networks, communications can be conducted in a multi-hop fashion.
The backbone of a tree/mesh network is formed by one ZigBee coordinator and multiple ZigBee
routers. An end device must associate with the coordinator or a router. In a tree network, routing can
be done in a stateless manner; a node can simply route packets based on nodes’ 16-bit short
addresses, which are assigned based on the tree structure. In fact, a mesh network also has a tree
inside to serve as its backbone; routing can go directly along the tree without route discovery or go
along better paths if a node is willing to conduct route discovery first.
In this work, we propose Automatic Address assignment for ZigBee-based WSN.
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 4, Issue 4, July-August (2013), pp. 116-121
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2013): 6.1302 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
117
II. PRELIMINARIES AND PROBLEM DEFINITION
ZigBee Address Assignment
In ZigBee, network addresses are assigned to devices by a distributed address assignment
scheme. Before forming a network, the coordinator determines the maximum number of children of a
router (Cm), the maximum number of child routers of a router (Rm), and the depth of the network
(Lm). Note that a child of a router can be a router or an end device, so Cm ≥ Rm. The coordinator and
routers can each have at most Rm child routers and at least Cm − Rm child end devices. Devices’
addresses are assigned in a top-down manner. For the coordinator, the whole address space is
logically partitioned into Rm + 1 blocks. The first Rm blocks are to be assigned to the coordinator’s
child routers and the last block is reserved for the coordinator’s own child end devices. From Cm,
Rm, and Lm, each router computes a parameter called Cskip to derive the starting addresses of its
children’s address pools. The Cskip for the coordinator or a router in depth d is defined as:
The coordinator is said to be at depth d = 0, and d is increased by one after each level.
Address assignment begins from the ZigBee coordinator by assigning address 0 to itself. If a parent
node at depth d has an address Aparent, the n-th child router is assigned to address Aparent + (n − 1)
× Cskip(d) + 1 and n-th child end device is assigned to address Aparent + Rm×Cskip(d)+n. An
example of the address assignment is shown in Fig. 1. The Cskip of the coordinator is obtained from
Eq. (1) by setting d = 0, Cm = 5, Rm = 4, and Lm = 2.
Then the child routers of the coordinator will be assigned to addresses 0 + (1 − 1) × 6 + 1 =
1, 0 + (2 − 1) × 6 + 1 = 7, 0 + (3 − 1) × 6 + 1 = 13, and etc. The address of the only child end device
of the coordinator is 0 + 4 × 6 + 1 = 25.
Note that the length of a network address is 16 bits; thus, the maximum address capacity is
216 = 65536. Obviously, the above assignment is much suitable for regular networks, but not for LT
WSNs. For example, when setting Cm = Rm = 2, the depth of the network can only be 15. Also,
when there is a LT backbone, the address space is not well utilized.
Figure A ZigBee address assignment example
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
118
In a ZigBee network, the coordinator and routers can directly transmit packets along the tree
without using any route discovery. When a device receives a packet, it first checks if it is the
destination or one of its child end devices is the destination. If so, this device will accept the packet
or forward this packet to the designated child. Otherwise, it forwards the packet to its parent. Assume
that the depth of this device is d and its address is A. This packet is for one of its descendants if the
destination address Adest satisfies A < Adest < A+ Cskip(d − 1), and this packet will be relayed to
the child router with address
If the destination is not a descendant of this device, this packet will be forwarded to its
parent. In the ZigBee tree routing, each node can only choose its parent or child as the next node.
This strategy may cause long delay in WSN networks.
III. AUTOMATIC ADDRESS ASSIGNMENT
We propose a low-cost, fully automated scheme to initialize it, assign addresses to nodes, and
conduct ZigBee-like tree routing. First, a distributed network formation procedure will be launched
by the coordinator t to divided nodes into two sets C and P. Then, a two-level address assignment
scheme is conducted to assign a level-1 and a level-2 addresses to each node. A level-1 address is to
uniquely identify a path or a cluster. A level-2 address is similar to ZigBee addressing but is confined
within one cluster/path. For simplicity, we assume that all nodes are router-capable devices. Finally,
we show how to conduct routing based on our two level addressing. Also, we address how our
protocol can adapt to changeable topologies.
We propose a two-level addressing. It has two purposes:
(i) to reduce address space and
(ii) to support ZigBeelike stateless routing.
In level-1 addressing, we regard each cluster/path as a supernode and use ZigBee-like addressing to
assign an m-bit address to each supernode. In level-2 addressing, we again apply the ZigBee-like
addressing on each individual cluster/path to assign an n-bit address to each node. The concatenation
of the level-1 and the level-2 addresses forms a node v’s network address, denoted by (L1(v), L2(v)).
During this process, we will also construct a Descendant Table (DT), which allows an entry node to
reach the entry nodes of its child supernodes.
Figure Logical Network
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
119
Before executing our two-level addressing, we need to determine m and n first. It relies on
forming a logical tree from all supernodes and forming a BFS tree from all nodes of each supernode.
We summarize the steps as follows.
Step 1:) For each node v entering the TERM state and serving as an entry node, it reports the pair
(PAR(v), GID(v)) to t. From these information, t constructs a logical tree TL of supernodes. (For
example, Fig. 5 is the logical network of Fig. 3.) With TL , t determines its tree parameters as Cm(1)
= Rm(1) = (max child degree of TL) and Lm(1) =
(height of TL ). This would require m = log2 M bits for addressing, where M =
Cm(1)Lm(1)+1−1 Cm(1)−1 is the maximal number of nodes in TL. (In the example of Fig. 5, Cm(1)
= Rm(1) = 3 and Lm(1) = 4.)
Step 2:) For each node v entering the TERM state and serving as an entry node, it forms a BFS tree T
among its members. With T , v determines its tree parameters as Cm(2)(v) = Rm(2)(v) = (max child
degree of T) and Lm(2)(v) = (height of T ). This would require n(v) = log2 N bits for addressing,
where N = Cm(2)(v)Lm(2)(v)+1−1 Cm(2)(v)−1 is the maximal number of nodes in T . Each entry
node v reports its n(v) to t. Then t chooses the maximum one from all n(v)s as the value of n. The
above process has determined m, n, and the tree formation parameters for level-1 and level-2
addressing. Next, t can start our two-level address assignment. It sets L1(t) = L2(t) = 0 and
periodically broadcasts beacons containing m, n, L1(t), L2(t), the global level-1 parameters (Cm(1),
Rm(1), Lm(1)), and its level-2 parameters (Cm(2)(t), Rm(2)(t), Lm(2)(t)). Our address assignment
follows the ZigBee style recursively, but in a two-level manner. When a node u without a network
address receives a beacon, it will send an Association_Request to the beacon sender. If it receives
multiple beacons, the node with the strongest signal strength will be selected. When the beacon
sender, say v, receives the association request, there are two cases:
Case 1: u and v belonging to different supernodes. If u is an entry node, v will process the request. v
first unicasts the request packet to its entry node, say e, to retrieve a level-1 mbit address for u.If this
is the i -th request received by e, it will respond the following level-1 address to v.
L1(u) = L1(v) + (i − 1) × Cskip(1)(d) + 1, (2)
where Cskip(1)(d) = 1−Cm(1)Lm(1)−d
1−Cm(1) . Then v replay an Association_ Response with an address (L1(u), 0) to u. Note that for
making our routing simple and efficient, the entry node e will also memorize this information (L1(u),
L2(v)) into its DT. The detailed functionality of the DT table will be addressed in Section III-C. On
receipt of v’s response, u will start sending beacons containing m, n, L1(u), L2(u), the global level-1
parameters, and its own level-2 parameters (Cm(2)(u), Rm(2)(u), Lm(2)(u)).
Case 2: u and v belonging to the same supernode. If this is the j -th request received by v, it will
respond the following level-2 address to u.
L2(u) = L2(v) + ( j − 1) × Cskip(2)(d) + 1, (3)
where Cskip(2)(d) = 1−Cm(2)(e) Lm(2)(e)−d 1−Cm(2)(e)
. On receipt of v’s response, u will update its L2(u) and set L1(u) = L1(v).
Then u will start sending beacons similar to case 1.
In Fig. 6, we have shown a concrete subgraph of Fig. 3 with some assignment results, where each
address is expressed in Hex and the first two symbols represent the m-bit address and the last two
represent the n-bit address. Through Fig. 5, Cm(1) = Rm(1) and Lm(1) can be determined as 3 and 4,
respectively. Hence, m = 7 bits and the L1(x2) = 0 + 1−34 1−3 × 1 + 1 = 41, where x2 is the second
child of t. Also, n is determined according to n(x10), whose Cm(2) = Rm(2) = 5 and Lm(2) = 3,
which is conducting the largest level-2 address space. Therefore, n = 8 bits and the level-2 address of
the second child of x10 is 0 + 1−53 1−5 × 1 + 1 = 32. Other more addressing results will be given in
Fig. 6. Note that our two level addressing has better address space utilization than the pure ZigBee
address assignment because each cluster/path can have its own network parameters.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
120
CONCLUSION
In this paper, we contribute in formally defining the Automatic Address Assignment Scheme.
The Automatic address assignment scheme assigns each node both level-1 and level-2 addresses as
its network address. We also show how to allow nodes to utilize shortcuts. With our design, not only
network addresses can be efficiently utilized and the spaces required for the network addresses can
be significantly reduced, but also the network scale can be enlarged to cover wider areas without
suffering from address shortage. In the future, it deserves to consider applying this work to real cases
such as environmental monitoring, military, ecology, agriculture, inventory control, robotics and
health care.
REFERENCES
[1] F. Salvadori, M. de Campos, P. S. Sausen, R. F. de Camargo, C. Gehrke,C. Rech, M. A.
Spohn, and A. C. Oliveira, “Monitoring in industrial systems using wireless sensor network
with dynamic power management,”IEEE Trans. Instrum. Meas., vol. 58, no. 9, pp. 3104–
3111, Sep. 2009.
[2] C.-T. Cheng, C. K. Tse, and F. C. M. Lau, “A clustering algorithm for wireless sensor
networks based on social insect colonies,” IEEE Sensors J., vol. 11, no. 3, pp. 711–721, Mar.
2011.
[4] C.-T. Cheng, C. K. Tse, and F. C. M. Lau, “A delay-aware data collection network structure
for wireless sensor networks,” IEEE Sensors J., vol. 11, no. 3, pp. 699–710, Mar. 2011.
[5] A. Chen, T. H. Lai, and D. Xuan, “Measuring and guaranteeing quality of barrier-coverage in
wireless sensor networks,” in Proc. ACM Int. Symp. Mobile Ad Hoc Netw. Comput., 2008,
pp. 421–430.
[6] H.-S. Ahn and K. H. Ko, “Simple pedestrian localization algorithms based on distributed
wireless sensor networks,” IEEE Trans. Ind. Electron., vol. 56, no. 10, pp. 4296–4302, Oct.
2009.
[7] A. Mainwaring, J. Polastre, R. Szewczyk, D. Culler, and J. Anderson,“Wireless sensor
networks for habitat monitoring,” in Proc. ACM Int. Workshop Wireless Sensor Netw. Appl.,
2002, pp. 88–97.
[8] Design and Construction of a Wildfire Instrumentation System Using Networked Sensors
[Online]. Available: http://firebug.sourceforge.net/
[9] R. Casas, A. Marco, I. Plaza, Y. Garrido, and J. Falco, “ZigBee-based alarm system for
pervasive healthcare in rural areas,” IET Commun., vol. 2, no. 2, pp. 208–214, Feb. 2008.
[10] Z. Sun, P. Wang, M. C. Vuran, M. A. Al-Rodhaan, A. M. Al-Dhelaan, and I. F. Akyildiz,
“MISE-PIPE: Magnetic induction-based wireless sensor networks for underground pipeline
monitoring,” Ad Hoc Netw., vol. 9, no. 3, pp. 218–227, 2011.
[11] S. Yoon, W. Ye, J. Heidemann, B. Littlefield, and C. Shahabi, “SWATS: Wireless sensor
networks for steamflood and waterflood pipeline monitoring,”IEEE Netw., vol. 25, no. 1, pp.
50–56, Jan.–Feb. 2011.
[12] C. Jing, D. Shu, and D. Gu, “Design of streetlight monitoring and control system based on
wireless sensor networks,” in Proc. IEEE Conf. Ind. Electron. Appl., May 2007, pp. 57–62.
[13] H.-C. Lee, C.-J. Liu, J. Yang, J.-T. Huang, Y.-M. Fang, B.-J. Lee, and C.-T. King, “Using
mobile wireless sensors for in-situ tracking of debris flows,” in Proc. ACM Int. Conf.
Embedded Netw. Sensor Syst., 2008, p. 1.
[14] A. Chen, S. Kumar, and T. H. Lai, “Designing localized algorithms for barrier coverage,” in
Proc. ACM Int. Conf. Mobile Comput. Netw., 2007, pp. 1–12.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-
6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME
121
[15] J. Kim, J. S. Lim, J. Friedman, U. Lee, L. Vieira, D. Rosso, M. Gerla, and M. B. Srivastava,
“SewerSnort: A drifting sensor for in-situ sewer gas monitoring,” in Proc. IEEE Sensor Ad
Hoc Commun. Netw. Conf., Jun. 2009, pp. 1–9.
[16] M. Ali and Z. A. Uzmi, “An energy-efficient node address naming scheme for wireless
sensor networks,” in Proc. IEEE Int. Netw. Commun. Conf., Jun. 2004, pp. 25–30.
[17] E. Ould-Ahmed-Vall, D. M. Blough, B. S. Heck, and G. F. Riley,“Distributed unique global
ID assignment for sensor networks,” in Proc. IEEE Int. Conf. Mobile Adhoc Sensor Syst.,
Nov. 2005, pp. 580–587.
[18] C. Schurgers, G. Kulkarni, and M. B. Srivastava, “Distributed ondemand address assignment
in wireless sensor networks,” IEEE Trans. Parallel Distrib. Syst., vol. 13, no. 10, pp. 1056–
1065, Oct. 2002.
[19] H. Zhou, M. W. Mutka, and L. M. Ni, “Reactive ID assignment for sensor networks,” in
Proc. IEEE Int. Conf. Mobile Adhoc Sensor Syst., Nov. 2005, pp. 572–577.
[20] Y.-C. Tseng and C.-C. Tan, “Termination detection protocols for mobile distributed
systems,” IEEE Trans. Parallel Distrib. Syst., vol. 12, no. 6, pp. 558–566, Jun. 2001.
[21] S. B. Patil, S. M. Deshmukh, Dr. Preeti Patil and Nitin Chavan, “Intrusion Detection
Probability Identification in Homogeneous System of Wireless Sensor Network”
International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 2,
2012, pp. 12 - 18, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
[22] S.R.Shankar and Dr.G.Kalivarathan, “Feasibility Studies of Wireless Sensor Network and its
Implications”, International Journal of Electrical Engineering & Technology (IJEET),
Volume 4, Issue 2, 2013, pp. 105 - 111, ISSN Print : 0976-6545, ISSN Online: 0976-6553.
[23] Revathi Venkataraman, K.Sornalakshmi, M.Pushpalatha and T.Rama Rao, “Implementation
of Authentication and Confidentiality in Wireless Sensor Network”, International Journal of
Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 553 - 560,
ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.

More Related Content

What's hot

Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...
Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...
Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...TELKOMNIKA JOURNAL
 
Performance evaluation of family of prime sequence codes in an ocdma system
Performance evaluation of family of prime sequence codes in an ocdma systemPerformance evaluation of family of prime sequence codes in an ocdma system
Performance evaluation of family of prime sequence codes in an ocdma systemIAEME Publication
 
AGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETsAGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETsIDES Editor
 
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding AlgorithmFixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding AlgorithmCSCJournals
 
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...ijwmn
 
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTION
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTIONMODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTION
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTIONijwmn
 
BANDWIDTH UTILIZATION
BANDWIDTH UTILIZATIONBANDWIDTH UTILIZATION
BANDWIDTH UTILIZATIONAvijeet Negel
 
06 Bandwidth Utilization_Multiplexing_and_Spreading
06 Bandwidth Utilization_Multiplexing_and_Spreading06 Bandwidth Utilization_Multiplexing_and_Spreading
06 Bandwidth Utilization_Multiplexing_and_SpreadingAhmar Hashmi
 
Analysis of Error Correcting Code Algorithms used in WiMax Communications
Analysis of Error Correcting Code Algorithms used in WiMax CommunicationsAnalysis of Error Correcting Code Algorithms used in WiMax Communications
Analysis of Error Correcting Code Algorithms used in WiMax CommunicationsWilliam Chipman
 
Multiplexing
MultiplexingMultiplexing
Multiplexingnimay1
 
Parallel computing chapter 2
Parallel computing chapter 2Parallel computing chapter 2
Parallel computing chapter 2Md. Mahedi Mahfuj
 
Performance Analysis of DV-Hop Localization Using Voronoi Approach
Performance Analysis of DV-Hop Localization Using Voronoi ApproachPerformance Analysis of DV-Hop Localization Using Voronoi Approach
Performance Analysis of DV-Hop Localization Using Voronoi ApproachIJMER
 
DIGITAL TRANSMISSION
DIGITAL TRANSMISSIONDIGITAL TRANSMISSION
DIGITAL TRANSMISSIONAvijeet Negel
 
Multiplexing : Wave Division Multiplexing
Multiplexing : Wave Division MultiplexingMultiplexing : Wave Division Multiplexing
Multiplexing : Wave Division MultiplexingDr Rajiv Srivastava
 
Question bank cn2
Question bank cn2Question bank cn2
Question bank cn2sangusajjan
 
Iaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation inIaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation inIaetsd Iaetsd
 

What's hot (20)

159 163
159 163159 163
159 163
 
Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...
Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...
Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...
 
Performance evaluation of family of prime sequence codes in an ocdma system
Performance evaluation of family of prime sequence codes in an ocdma systemPerformance evaluation of family of prime sequence codes in an ocdma system
Performance evaluation of family of prime sequence codes in an ocdma system
 
AGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETsAGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETs
 
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding AlgorithmFixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
 
Chapter 8: Switching
Chapter 8: SwitchingChapter 8: Switching
Chapter 8: Switching
 
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...
 
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTION
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTIONMODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTION
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTION
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
 
BANDWIDTH UTILIZATION
BANDWIDTH UTILIZATIONBANDWIDTH UTILIZATION
BANDWIDTH UTILIZATION
 
06 Bandwidth Utilization_Multiplexing_and_Spreading
06 Bandwidth Utilization_Multiplexing_and_Spreading06 Bandwidth Utilization_Multiplexing_and_Spreading
06 Bandwidth Utilization_Multiplexing_and_Spreading
 
Analysis of Error Correcting Code Algorithms used in WiMax Communications
Analysis of Error Correcting Code Algorithms used in WiMax CommunicationsAnalysis of Error Correcting Code Algorithms used in WiMax Communications
Analysis of Error Correcting Code Algorithms used in WiMax Communications
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
Parallel computing chapter 2
Parallel computing chapter 2Parallel computing chapter 2
Parallel computing chapter 2
 
Performance Analysis of DV-Hop Localization Using Voronoi Approach
Performance Analysis of DV-Hop Localization Using Voronoi ApproachPerformance Analysis of DV-Hop Localization Using Voronoi Approach
Performance Analysis of DV-Hop Localization Using Voronoi Approach
 
os
osos
os
 
DIGITAL TRANSMISSION
DIGITAL TRANSMISSIONDIGITAL TRANSMISSION
DIGITAL TRANSMISSION
 
Multiplexing : Wave Division Multiplexing
Multiplexing : Wave Division MultiplexingMultiplexing : Wave Division Multiplexing
Multiplexing : Wave Division Multiplexing
 
Question bank cn2
Question bank cn2Question bank cn2
Question bank cn2
 
Iaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation inIaetsd game theory and auctions for cooperation in
Iaetsd game theory and auctions for cooperation in
 

Viewers also liked

Incremental clustering based object tracking in wireless sensor networks
Incremental clustering based object tracking in wireless sensor networksIncremental clustering based object tracking in wireless sensor networks
Incremental clustering based object tracking in wireless sensor networksSachin MS
 
Cluster based wireless sensor network routings ieee
Cluster based wireless sensor network routings ieeeCluster based wireless sensor network routings ieee
Cluster based wireless sensor network routings ieeeTAIWAN
 
Multi-resolution Data Communication in Wireless Sensor Networks
 Multi-resolution Data Communication in Wireless Sensor Networks Multi-resolution Data Communication in Wireless Sensor Networks
Multi-resolution Data Communication in Wireless Sensor NetworksCityPulse Project
 
Toward a Natural Genetic / Evolutionary Algorithm for Multiobjective Optimiza...
Toward a Natural Genetic / Evolutionary Algorithm for Multiobjective Optimiza...Toward a Natural Genetic / Evolutionary Algorithm for Multiobjective Optimiza...
Toward a Natural Genetic / Evolutionary Algorithm for Multiobjective Optimiza...Startup
 
Secure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wirelessSecure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wirelessSai Sirisha
 
Evolutionary Algorithms In Ruby
Evolutionary Algorithms In RubyEvolutionary Algorithms In Ruby
Evolutionary Algorithms In RubyAvarteq
 
RITISH AGGARWAL
RITISH AGGARWALRITISH AGGARWAL
RITISH AGGARWAL9914814928
 
Energy efficient communication techniques for wireless micro sensor networks
Energy efficient communication techniques for wireless micro sensor networksEnergy efficient communication techniques for wireless micro sensor networks
Energy efficient communication techniques for wireless micro sensor networksPushpita Biswas
 
Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptsofiakhatoon
 
Swarm intelligence pso and aco
Swarm intelligence pso and acoSwarm intelligence pso and aco
Swarm intelligence pso and acosatish561
 
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...divya_prabha
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 

Viewers also liked (16)

Incremental clustering based object tracking in wireless sensor networks
Incremental clustering based object tracking in wireless sensor networksIncremental clustering based object tracking in wireless sensor networks
Incremental clustering based object tracking in wireless sensor networks
 
Cluster based wireless sensor network routings ieee
Cluster based wireless sensor network routings ieeeCluster based wireless sensor network routings ieee
Cluster based wireless sensor network routings ieee
 
Multi-resolution Data Communication in Wireless Sensor Networks
 Multi-resolution Data Communication in Wireless Sensor Networks Multi-resolution Data Communication in Wireless Sensor Networks
Multi-resolution Data Communication in Wireless Sensor Networks
 
Toward a Natural Genetic / Evolutionary Algorithm for Multiobjective Optimiza...
Toward a Natural Genetic / Evolutionary Algorithm for Multiobjective Optimiza...Toward a Natural Genetic / Evolutionary Algorithm for Multiobjective Optimiza...
Toward a Natural Genetic / Evolutionary Algorithm for Multiobjective Optimiza...
 
Secure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wirelessSecure and efficient data transmission for cluster based wireless
Secure and efficient data transmission for cluster based wireless
 
Kianoosh&amp;sajjad
Kianoosh&amp;sajjadKianoosh&amp;sajjad
Kianoosh&amp;sajjad
 
Evolutionary Algorithms In Ruby
Evolutionary Algorithms In RubyEvolutionary Algorithms In Ruby
Evolutionary Algorithms In Ruby
 
RITISH AGGARWAL
RITISH AGGARWALRITISH AGGARWAL
RITISH AGGARWAL
 
Energy efficient communication techniques for wireless micro sensor networks
Energy efficient communication techniques for wireless micro sensor networksEnergy efficient communication techniques for wireless micro sensor networks
Energy efficient communication techniques for wireless micro sensor networks
 
Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol ppt
 
Swarm intelligence pso and aco
Swarm intelligence pso and acoSwarm intelligence pso and aco
Swarm intelligence pso and aco
 
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
 
Wsn ppt original
Wsn ppt originalWsn ppt original
Wsn ppt original
 
Soft computing
Soft computingSoft computing
Soft computing
 
Leach
Leach Leach
Leach
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 

Similar to Automatic cluster formation and assigning address for wireless sensor net

Shortest Tree Routing With Security In Wireless Sensor Networks
Shortest Tree Routing With Security In Wireless Sensor NetworksShortest Tree Routing With Security In Wireless Sensor Networks
Shortest Tree Routing With Security In Wireless Sensor NetworksIJERA Editor
 
Detection of Duplicate Address in Mobile Adhoc Networks for On Demand Routing...
Detection of Duplicate Address in Mobile Adhoc Networks for On Demand Routing...Detection of Duplicate Address in Mobile Adhoc Networks for On Demand Routing...
Detection of Duplicate Address in Mobile Adhoc Networks for On Demand Routing...IJMER
 
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANETSIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANETijfcstjournal
 
Lab Seminar 2009 12 01 Message Drop Reduction And Movement
Lab Seminar 2009 12 01  Message Drop Reduction And MovementLab Seminar 2009 12 01  Message Drop Reduction And Movement
Lab Seminar 2009 12 01 Message Drop Reduction And Movementtharindanv
 
Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing ProtocolsKABILESH RAMAR
 
Efectos de nodos ieee 802.15.4 zig bee
Efectos de nodos ieee 802.15.4 zig beeEfectos de nodos ieee 802.15.4 zig bee
Efectos de nodos ieee 802.15.4 zig beeGregorio Toro Rivera
 
Distributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV AlgorithmDistributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV AlgorithmIOSR Journals
 
Shortcut Path Tress for Zigbee based Wireless Network
Shortcut Path Tress for Zigbee based Wireless NetworkShortcut Path Tress for Zigbee based Wireless Network
Shortcut Path Tress for Zigbee based Wireless NetworkIJERA Editor
 
Computer Communication Networks-Routing protocols 1
Computer Communication Networks-Routing protocols 1Computer Communication Networks-Routing protocols 1
Computer Communication Networks-Routing protocols 1Krishna Nanda
 
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...cscpconf
 
A comparative study on multicast routing using dijkstra’s
A comparative study on multicast routing using dijkstra’sA comparative study on multicast routing using dijkstra’s
A comparative study on multicast routing using dijkstra’siaemedu
 
A comparative study on multicast routing using dijkstra’s, prims and ant colo...
A comparative study on multicast routing using dijkstra’s, prims and ant colo...A comparative study on multicast routing using dijkstra’s, prims and ant colo...
A comparative study on multicast routing using dijkstra’s, prims and ant colo...IAEME Publication
 
AUTOCONFIGURATION ALGORITHM FOR A MULTIPLE INTERFACES ADHOC NETWORK RUNNING...
AUTOCONFIGURATION ALGORITHM FOR A  MULTIPLE INTERFACES ADHOC NETWORK  RUNNING...AUTOCONFIGURATION ALGORITHM FOR A  MULTIPLE INTERFACES ADHOC NETWORK  RUNNING...
AUTOCONFIGURATION ALGORITHM FOR A MULTIPLE INTERFACES ADHOC NETWORK RUNNING...IJCNC
 
Comparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State ProtocolsComparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State ProtocolsEast West University
 

Similar to Automatic cluster formation and assigning address for wireless sensor net (20)

G0544650
G0544650G0544650
G0544650
 
Shortest Tree Routing With Security In Wireless Sensor Networks
Shortest Tree Routing With Security In Wireless Sensor NetworksShortest Tree Routing With Security In Wireless Sensor Networks
Shortest Tree Routing With Security In Wireless Sensor Networks
 
Detection of Duplicate Address in Mobile Adhoc Networks for On Demand Routing...
Detection of Duplicate Address in Mobile Adhoc Networks for On Demand Routing...Detection of Duplicate Address in Mobile Adhoc Networks for On Demand Routing...
Detection of Duplicate Address in Mobile Adhoc Networks for On Demand Routing...
 
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANETSIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
SIMULATION AND ANALYSIS OF AODV, DSDV, ZRP IN VANET
 
Lab Seminar 2009 12 01 Message Drop Reduction And Movement
Lab Seminar 2009 12 01  Message Drop Reduction And MovementLab Seminar 2009 12 01  Message Drop Reduction And Movement
Lab Seminar 2009 12 01 Message Drop Reduction And Movement
 
Distance Vector Routing Protocols
Distance Vector Routing ProtocolsDistance Vector Routing Protocols
Distance Vector Routing Protocols
 
Ijebea14 272
Ijebea14 272Ijebea14 272
Ijebea14 272
 
Week13 lec2
Week13 lec2Week13 lec2
Week13 lec2
 
Lecture set 5
Lecture set 5Lecture set 5
Lecture set 5
 
Cisco Activity
Cisco ActivityCisco Activity
Cisco Activity
 
Efectos de nodos ieee 802.15.4 zig bee
Efectos de nodos ieee 802.15.4 zig beeEfectos de nodos ieee 802.15.4 zig bee
Efectos de nodos ieee 802.15.4 zig bee
 
Distributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV AlgorithmDistributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV Algorithm
 
C0431320
C0431320C0431320
C0431320
 
Shortcut Path Tress for Zigbee based Wireless Network
Shortcut Path Tress for Zigbee based Wireless NetworkShortcut Path Tress for Zigbee based Wireless Network
Shortcut Path Tress for Zigbee based Wireless Network
 
Computer Communication Networks-Routing protocols 1
Computer Communication Networks-Routing protocols 1Computer Communication Networks-Routing protocols 1
Computer Communication Networks-Routing protocols 1
 
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
 
A comparative study on multicast routing using dijkstra’s
A comparative study on multicast routing using dijkstra’sA comparative study on multicast routing using dijkstra’s
A comparative study on multicast routing using dijkstra’s
 
A comparative study on multicast routing using dijkstra’s, prims and ant colo...
A comparative study on multicast routing using dijkstra’s, prims and ant colo...A comparative study on multicast routing using dijkstra’s, prims and ant colo...
A comparative study on multicast routing using dijkstra’s, prims and ant colo...
 
AUTOCONFIGURATION ALGORITHM FOR A MULTIPLE INTERFACES ADHOC NETWORK RUNNING...
AUTOCONFIGURATION ALGORITHM FOR A  MULTIPLE INTERFACES ADHOC NETWORK  RUNNING...AUTOCONFIGURATION ALGORITHM FOR A  MULTIPLE INTERFACES ADHOC NETWORK  RUNNING...
AUTOCONFIGURATION ALGORITHM FOR A MULTIPLE INTERFACES ADHOC NETWORK RUNNING...
 
Comparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State ProtocolsComparative Analysis of Distance Vector Routing & Link State Protocols
Comparative Analysis of Distance Vector Routing & Link State Protocols
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Automatic cluster formation and assigning address for wireless sensor net

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 116 AUTOMATIC CLUSTER FORMATION AND ASSIGNING ADDRESS FOR WIRELESS SENSOR NETWORK Mr.Yogesh V Patil, Mr. Pratik Gite, Mr.Sanjay Thakur LKCT Indore ABSTRACT Although wireless sensor networks (WSNs) have been extensively researched, their deployment is still a main concern. In this paper, we show that the address assignment scheme defined by ZigBee will perform poorly in terms of address utilization. This paper makes contribution is that we show that the Automatic Address Assignment. We thus propose Simple, Efficient. systematically formation of path connected cluster and Automatic Address Assignment for Wireless Sensor Network Index Terms: Automatic Address assignment, Wireless Sensor Network, ZigBee. 1. INTRODUCTION To form a WSN, the most important issues is addressing. Strict per-node addressing is expensive in a dense network, because not only the address space would be large, but also these addresses would need to be allocated and managed according to the topology change. Allocation of addresses in a dense network is a problem which is often underestimated [11]. On the other hand, routing is to discover paths from source nodes to destination nodes based on their network addresses. Path discovery in a dense network could incur high communication overhands. Therefore, designing a light-weight addressing or Automatic Address Assignment for WSNs is very important. Recently, ZigBee [12] has been proposed for addressing and routing on WSNs. It supports three kinds of network topologies, namely star, tree, and mesh networks. A ZigBee coordinator is responsible for initializing, maintaining, and controlling the network. Star networks can only cover small areas. For tree and mesh networks, communications can be conducted in a multi-hop fashion. The backbone of a tree/mesh network is formed by one ZigBee coordinator and multiple ZigBee routers. An end device must associate with the coordinator or a router. In a tree network, routing can be done in a stateless manner; a node can simply route packets based on nodes’ 16-bit short addresses, which are assigned based on the tree structure. In fact, a mesh network also has a tree inside to serve as its backbone; routing can go directly along the tree without route discovery or go along better paths if a node is willing to conduct route discovery first. In this work, we propose Automatic Address assignment for ZigBee-based WSN. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), pp. 116-121 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2013): 6.1302 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 117 II. PRELIMINARIES AND PROBLEM DEFINITION ZigBee Address Assignment In ZigBee, network addresses are assigned to devices by a distributed address assignment scheme. Before forming a network, the coordinator determines the maximum number of children of a router (Cm), the maximum number of child routers of a router (Rm), and the depth of the network (Lm). Note that a child of a router can be a router or an end device, so Cm ≥ Rm. The coordinator and routers can each have at most Rm child routers and at least Cm − Rm child end devices. Devices’ addresses are assigned in a top-down manner. For the coordinator, the whole address space is logically partitioned into Rm + 1 blocks. The first Rm blocks are to be assigned to the coordinator’s child routers and the last block is reserved for the coordinator’s own child end devices. From Cm, Rm, and Lm, each router computes a parameter called Cskip to derive the starting addresses of its children’s address pools. The Cskip for the coordinator or a router in depth d is defined as: The coordinator is said to be at depth d = 0, and d is increased by one after each level. Address assignment begins from the ZigBee coordinator by assigning address 0 to itself. If a parent node at depth d has an address Aparent, the n-th child router is assigned to address Aparent + (n − 1) × Cskip(d) + 1 and n-th child end device is assigned to address Aparent + Rm×Cskip(d)+n. An example of the address assignment is shown in Fig. 1. The Cskip of the coordinator is obtained from Eq. (1) by setting d = 0, Cm = 5, Rm = 4, and Lm = 2. Then the child routers of the coordinator will be assigned to addresses 0 + (1 − 1) × 6 + 1 = 1, 0 + (2 − 1) × 6 + 1 = 7, 0 + (3 − 1) × 6 + 1 = 13, and etc. The address of the only child end device of the coordinator is 0 + 4 × 6 + 1 = 25. Note that the length of a network address is 16 bits; thus, the maximum address capacity is 216 = 65536. Obviously, the above assignment is much suitable for regular networks, but not for LT WSNs. For example, when setting Cm = Rm = 2, the depth of the network can only be 15. Also, when there is a LT backbone, the address space is not well utilized. Figure A ZigBee address assignment example
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 118 In a ZigBee network, the coordinator and routers can directly transmit packets along the tree without using any route discovery. When a device receives a packet, it first checks if it is the destination or one of its child end devices is the destination. If so, this device will accept the packet or forward this packet to the designated child. Otherwise, it forwards the packet to its parent. Assume that the depth of this device is d and its address is A. This packet is for one of its descendants if the destination address Adest satisfies A < Adest < A+ Cskip(d − 1), and this packet will be relayed to the child router with address If the destination is not a descendant of this device, this packet will be forwarded to its parent. In the ZigBee tree routing, each node can only choose its parent or child as the next node. This strategy may cause long delay in WSN networks. III. AUTOMATIC ADDRESS ASSIGNMENT We propose a low-cost, fully automated scheme to initialize it, assign addresses to nodes, and conduct ZigBee-like tree routing. First, a distributed network formation procedure will be launched by the coordinator t to divided nodes into two sets C and P. Then, a two-level address assignment scheme is conducted to assign a level-1 and a level-2 addresses to each node. A level-1 address is to uniquely identify a path or a cluster. A level-2 address is similar to ZigBee addressing but is confined within one cluster/path. For simplicity, we assume that all nodes are router-capable devices. Finally, we show how to conduct routing based on our two level addressing. Also, we address how our protocol can adapt to changeable topologies. We propose a two-level addressing. It has two purposes: (i) to reduce address space and (ii) to support ZigBeelike stateless routing. In level-1 addressing, we regard each cluster/path as a supernode and use ZigBee-like addressing to assign an m-bit address to each supernode. In level-2 addressing, we again apply the ZigBee-like addressing on each individual cluster/path to assign an n-bit address to each node. The concatenation of the level-1 and the level-2 addresses forms a node v’s network address, denoted by (L1(v), L2(v)). During this process, we will also construct a Descendant Table (DT), which allows an entry node to reach the entry nodes of its child supernodes. Figure Logical Network
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 119 Before executing our two-level addressing, we need to determine m and n first. It relies on forming a logical tree from all supernodes and forming a BFS tree from all nodes of each supernode. We summarize the steps as follows. Step 1:) For each node v entering the TERM state and serving as an entry node, it reports the pair (PAR(v), GID(v)) to t. From these information, t constructs a logical tree TL of supernodes. (For example, Fig. 5 is the logical network of Fig. 3.) With TL , t determines its tree parameters as Cm(1) = Rm(1) = (max child degree of TL) and Lm(1) = (height of TL ). This would require m = log2 M bits for addressing, where M = Cm(1)Lm(1)+1−1 Cm(1)−1 is the maximal number of nodes in TL. (In the example of Fig. 5, Cm(1) = Rm(1) = 3 and Lm(1) = 4.) Step 2:) For each node v entering the TERM state and serving as an entry node, it forms a BFS tree T among its members. With T , v determines its tree parameters as Cm(2)(v) = Rm(2)(v) = (max child degree of T) and Lm(2)(v) = (height of T ). This would require n(v) = log2 N bits for addressing, where N = Cm(2)(v)Lm(2)(v)+1−1 Cm(2)(v)−1 is the maximal number of nodes in T . Each entry node v reports its n(v) to t. Then t chooses the maximum one from all n(v)s as the value of n. The above process has determined m, n, and the tree formation parameters for level-1 and level-2 addressing. Next, t can start our two-level address assignment. It sets L1(t) = L2(t) = 0 and periodically broadcasts beacons containing m, n, L1(t), L2(t), the global level-1 parameters (Cm(1), Rm(1), Lm(1)), and its level-2 parameters (Cm(2)(t), Rm(2)(t), Lm(2)(t)). Our address assignment follows the ZigBee style recursively, but in a two-level manner. When a node u without a network address receives a beacon, it will send an Association_Request to the beacon sender. If it receives multiple beacons, the node with the strongest signal strength will be selected. When the beacon sender, say v, receives the association request, there are two cases: Case 1: u and v belonging to different supernodes. If u is an entry node, v will process the request. v first unicasts the request packet to its entry node, say e, to retrieve a level-1 mbit address for u.If this is the i -th request received by e, it will respond the following level-1 address to v. L1(u) = L1(v) + (i − 1) × Cskip(1)(d) + 1, (2) where Cskip(1)(d) = 1−Cm(1)Lm(1)−d 1−Cm(1) . Then v replay an Association_ Response with an address (L1(u), 0) to u. Note that for making our routing simple and efficient, the entry node e will also memorize this information (L1(u), L2(v)) into its DT. The detailed functionality of the DT table will be addressed in Section III-C. On receipt of v’s response, u will start sending beacons containing m, n, L1(u), L2(u), the global level-1 parameters, and its own level-2 parameters (Cm(2)(u), Rm(2)(u), Lm(2)(u)). Case 2: u and v belonging to the same supernode. If this is the j -th request received by v, it will respond the following level-2 address to u. L2(u) = L2(v) + ( j − 1) × Cskip(2)(d) + 1, (3) where Cskip(2)(d) = 1−Cm(2)(e) Lm(2)(e)−d 1−Cm(2)(e) . On receipt of v’s response, u will update its L2(u) and set L1(u) = L1(v). Then u will start sending beacons similar to case 1. In Fig. 6, we have shown a concrete subgraph of Fig. 3 with some assignment results, where each address is expressed in Hex and the first two symbols represent the m-bit address and the last two represent the n-bit address. Through Fig. 5, Cm(1) = Rm(1) and Lm(1) can be determined as 3 and 4, respectively. Hence, m = 7 bits and the L1(x2) = 0 + 1−34 1−3 × 1 + 1 = 41, where x2 is the second child of t. Also, n is determined according to n(x10), whose Cm(2) = Rm(2) = 5 and Lm(2) = 3, which is conducting the largest level-2 address space. Therefore, n = 8 bits and the level-2 address of the second child of x10 is 0 + 1−53 1−5 × 1 + 1 = 32. Other more addressing results will be given in Fig. 6. Note that our two level addressing has better address space utilization than the pure ZigBee address assignment because each cluster/path can have its own network parameters.
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 120 CONCLUSION In this paper, we contribute in formally defining the Automatic Address Assignment Scheme. The Automatic address assignment scheme assigns each node both level-1 and level-2 addresses as its network address. We also show how to allow nodes to utilize shortcuts. With our design, not only network addresses can be efficiently utilized and the spaces required for the network addresses can be significantly reduced, but also the network scale can be enlarged to cover wider areas without suffering from address shortage. In the future, it deserves to consider applying this work to real cases such as environmental monitoring, military, ecology, agriculture, inventory control, robotics and health care. REFERENCES [1] F. Salvadori, M. de Campos, P. S. Sausen, R. F. de Camargo, C. Gehrke,C. Rech, M. A. Spohn, and A. C. Oliveira, “Monitoring in industrial systems using wireless sensor network with dynamic power management,”IEEE Trans. Instrum. Meas., vol. 58, no. 9, pp. 3104– 3111, Sep. 2009. [2] C.-T. Cheng, C. K. Tse, and F. C. M. Lau, “A clustering algorithm for wireless sensor networks based on social insect colonies,” IEEE Sensors J., vol. 11, no. 3, pp. 711–721, Mar. 2011. [4] C.-T. Cheng, C. K. Tse, and F. C. M. Lau, “A delay-aware data collection network structure for wireless sensor networks,” IEEE Sensors J., vol. 11, no. 3, pp. 699–710, Mar. 2011. [5] A. Chen, T. H. Lai, and D. Xuan, “Measuring and guaranteeing quality of barrier-coverage in wireless sensor networks,” in Proc. ACM Int. Symp. Mobile Ad Hoc Netw. Comput., 2008, pp. 421–430. [6] H.-S. Ahn and K. H. Ko, “Simple pedestrian localization algorithms based on distributed wireless sensor networks,” IEEE Trans. Ind. Electron., vol. 56, no. 10, pp. 4296–4302, Oct. 2009. [7] A. Mainwaring, J. Polastre, R. Szewczyk, D. Culler, and J. Anderson,“Wireless sensor networks for habitat monitoring,” in Proc. ACM Int. Workshop Wireless Sensor Netw. Appl., 2002, pp. 88–97. [8] Design and Construction of a Wildfire Instrumentation System Using Networked Sensors [Online]. Available: http://firebug.sourceforge.net/ [9] R. Casas, A. Marco, I. Plaza, Y. Garrido, and J. Falco, “ZigBee-based alarm system for pervasive healthcare in rural areas,” IET Commun., vol. 2, no. 2, pp. 208–214, Feb. 2008. [10] Z. Sun, P. Wang, M. C. Vuran, M. A. Al-Rodhaan, A. M. Al-Dhelaan, and I. F. Akyildiz, “MISE-PIPE: Magnetic induction-based wireless sensor networks for underground pipeline monitoring,” Ad Hoc Netw., vol. 9, no. 3, pp. 218–227, 2011. [11] S. Yoon, W. Ye, J. Heidemann, B. Littlefield, and C. Shahabi, “SWATS: Wireless sensor networks for steamflood and waterflood pipeline monitoring,”IEEE Netw., vol. 25, no. 1, pp. 50–56, Jan.–Feb. 2011. [12] C. Jing, D. Shu, and D. Gu, “Design of streetlight monitoring and control system based on wireless sensor networks,” in Proc. IEEE Conf. Ind. Electron. Appl., May 2007, pp. 57–62. [13] H.-C. Lee, C.-J. Liu, J. Yang, J.-T. Huang, Y.-M. Fang, B.-J. Lee, and C.-T. King, “Using mobile wireless sensors for in-situ tracking of debris flows,” in Proc. ACM Int. Conf. Embedded Netw. Sensor Syst., 2008, p. 1. [14] A. Chen, S. Kumar, and T. H. Lai, “Designing localized algorithms for barrier coverage,” in Proc. ACM Int. Conf. Mobile Comput. Netw., 2007, pp. 1–12.
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- 6367(Print), ISSN 0976 – 6375(Online) Volume 4, Issue 4, July-August (2013), © IAEME 121 [15] J. Kim, J. S. Lim, J. Friedman, U. Lee, L. Vieira, D. Rosso, M. Gerla, and M. B. Srivastava, “SewerSnort: A drifting sensor for in-situ sewer gas monitoring,” in Proc. IEEE Sensor Ad Hoc Commun. Netw. Conf., Jun. 2009, pp. 1–9. [16] M. Ali and Z. A. Uzmi, “An energy-efficient node address naming scheme for wireless sensor networks,” in Proc. IEEE Int. Netw. Commun. Conf., Jun. 2004, pp. 25–30. [17] E. Ould-Ahmed-Vall, D. M. Blough, B. S. Heck, and G. F. Riley,“Distributed unique global ID assignment for sensor networks,” in Proc. IEEE Int. Conf. Mobile Adhoc Sensor Syst., Nov. 2005, pp. 580–587. [18] C. Schurgers, G. Kulkarni, and M. B. Srivastava, “Distributed ondemand address assignment in wireless sensor networks,” IEEE Trans. Parallel Distrib. Syst., vol. 13, no. 10, pp. 1056– 1065, Oct. 2002. [19] H. Zhou, M. W. Mutka, and L. M. Ni, “Reactive ID assignment for sensor networks,” in Proc. IEEE Int. Conf. Mobile Adhoc Sensor Syst., Nov. 2005, pp. 572–577. [20] Y.-C. Tseng and C.-C. Tan, “Termination detection protocols for mobile distributed systems,” IEEE Trans. Parallel Distrib. Syst., vol. 12, no. 6, pp. 558–566, Jun. 2001. [21] S. B. Patil, S. M. Deshmukh, Dr. Preeti Patil and Nitin Chavan, “Intrusion Detection Probability Identification in Homogeneous System of Wireless Sensor Network” International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 12 - 18, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [22] S.R.Shankar and Dr.G.Kalivarathan, “Feasibility Studies of Wireless Sensor Network and its Implications”, International Journal of Electrical Engineering & Technology (IJEET), Volume 4, Issue 2, 2013, pp. 105 - 111, ISSN Print : 0976-6545, ISSN Online: 0976-6553. [23] Revathi Venkataraman, K.Sornalakshmi, M.Pushpalatha and T.Rama Rao, “Implementation of Authentication and Confidentiality in Wireless Sensor Network”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 553 - 560, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.