SlideShare a Scribd company logo
1 of 4
Download to read offline
International Association of Scientific Innovation and Research (IASIR)
(An Association Unifying the Sciences, Engineering, and Applied Research)
International Journal of Emerging Technologies in Computational
and Applied Sciences (IJETCAS)
www.iasir.net
IJETCAS 14-488; © 2014, IJETCAS All Rights Reserved Page 528
ISSN (Print): 2279-0047
ISSN (Online): 2279-0055
Energy Effectiveness in
Sensor Network
Encoding Mechanism
Effective
Routing
Network
Architecture
Study on Different Encoding Mechanism to Perform Secure Network
Communication
Yashu1
& Smita2
1
Research Scholar, 2
Associate Professor,
Department of Computer Science and Engineering,
PDM College of Engineering for Women, Bahadurgarh, Haryana, India
__________________________________________________________________________________________
Abstract: Network security can be achieved in different ways in a communication system. To achieve the
security against different attacks, one approach is to send the encoded information over the network. The
encoded approaches not only provide the information security but also decrease the communication size without
adding the overhead. In energy critical networks such as sensor network, this kind of encoded communication
approach is more effective. In this paper, some of the most common encoding approaches are discussed. The
approaches considered in this work are RS Encoding, Convolution Codes and Hamming Codes.
Keywords: Convolution, Hamming Code, Information Security, WSN
__________________________________________________________________________________________
I. INTRODUCTION
A sensor network is one of the most common network architecture defined under the energy constraints.
Different operations associated with sensor network include the communication over the effective route. As the
communication is performed over the specific route, each participating node consumes some amount of energy.
To perform the energy effective communication some optimized routing approach is required. Another way to
reduce the energy consumption is to reduce the communicating data over the network. As the communication
will be reduced, the energy consumption will also get reduced. To reduce the size of communicating data over
the network some encoding technique can also be adapted. The encoding technique is also effective to provide
the effective mechanism to detect the error over the network and to provide the effective communication. In this
paper, a study on all these aspects of network communication is discussed. The aspect discussed in this paper
includes the routing approach as well as the encoding mechanism adapted to reduce the communication. The
possibilities to improve the energy effectiveness in sensor network are shown in figure 1.
Figure 1: Energy Effectiveness in Sensor Network
In this section, Routing in sensor network is discussed. Routing in sensor network is performed using two main
approaches called unicast routing and multicast routing approach. Global routing and Maze routing are also
some of popular routing approaches adopted by sensor network. These routing approaches are discussed in this
section.
A. Unicast Routing
Unicast routing is about the generation of single path between single source and destination node. The challenge
in such routing is to obtain the QoS while performing the effective utilization of bandwidth and the buffer space.
The state path generation under the bottleneck problem is also a challenge for communicating network. Unicast
Yashu et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 8(6), March-May, 2014, pp. 528-
531
IJETCAS 14-488; © 2014, IJETCAS All Rights Reserved Page 529
routing is also1, which is the bandwidth of the bottleneck link (i, j). For these QoS metrics, two basic routing
problems can be defined. One is called link-optimization routing. An example is the bandwidth-optimization
routing, which is to find a path that has the largest bandwidth on the bottleneck link. Such a path is called the
widest path. The other problem is called link-constrained routing. An example is the bandwidth- constrained
routing, which is to find a path whose bottleneck bandwidth is above a required value [2]. For other QoS metrics
such as delay, delay jitter and cost, the state of a path is determined by the combined state over all links on the
path. For example, if the delay of path s → i → j → t is 10, which is the total delay of all links on the path. Two
basic routing problems can be defined for this type of QoS metrics. One is called path-optimization routing. An
example is the least-cost routing, which is to find a path whose total cost is minimized. The other problem is
called path-constrained routing. An example is the delay-constrained routing, which is to find a path whose
delay is bounded by a required value. [2].
B. Multicast Routing
There are several well-known multicast routing problems. The Steiner tree problem is to find the least-cost tree,
the tree covering a group of destinations with the minimum total cost over all links. It is also called the least-cost
multicast routing problem, belonging to the tree-optimization routing problem class. The constrained Steiner
tree problem is to find the least-cost tree with bounded delay. It is also called the delay-constrained least-cost
routing problem, belonging to the tree-constrained tree-optimization routing problem class [2].
C. Global and Detail Routing:
During global routing, complex design rules are abstracted away and a design is divided into a regular grid.
Routes are created for each net that connect adjacent grid cells. Capacities are assigned to pairs of adjacent grid
cells to model limited routing resources between the cells. Since different metal layers may use distinct wire
pitches, routing capacities at each layer may differ to reflect this. A global routing solution is legal if all nets are
connected and all capacity constraints are satisfied. Detail routing takes a global routing solution with a small
number of capacity violations (overflows), or none at all, and assigns wires to routing tracks while enforcing
spacing constraints and more sophisticated design rules. Starting with slightly illegal global routes can make
detail routing considerably more difficult, therefore a global router must minimize violations and wavelength,
seeking to avoid violations entirely when possible [4].
D. Maze Routing
It connects pairs of terminals on the routing grid using standard search techniques such as BFS and Dijkstra’s
algorithm. The maze router ensures that the least cost route (according to the cost function) is found. More than
50% of nets in modern designs connect only two pins. BFS can find the shortest path between a source location
and a target location, if one exists, but cannot handle routing segments with non-trivial weights [4][8].
In this paper, a study on the encoding techniques in sensor network is defined. The work has covered the routing
mechanism in sensor network. In this section, some of different routing approaches adapted in sensor network
are defined. In section II, the work done by the earlier researchers is discussed. In section III, some of the
effective encoding techniques are discussed. In section IV, the conclusion obtained from the work is defined and
presented.
II. ERROR DETECTION TECHNIQUES
Several schemes exist to achieve error detection. The general idea is to add some redundancy, i.e., some extra
data, to a message, that enables detection of any errors in the delivered message. Most such error-detection
schemes are systematic: the transmitter sends the original data bits, and attaches a fixed number of check bits,
which are derived from the data bits by some deterministic algorithm. The receiver applies the same algorithm
to the received data bits and compares its output to the received check bits; if the values do not match, an error
has occurred at some point during the transmission. In a system that uses a "non-systematic" code, such as some
raptor codes, the original message is transformed into an encoded message that has at least as many bits as the
original message. In general, any hash function may be used to compute the redundancy. However, some
functions are of particularly widespread use, due to their simplicity, or their suitability of detecting certain kinds
of errors, such as the cyclic redundancy check's performance in detecting burst errors. Other mechanisms of
adding redundancy are repetition schemes and error-correcting codes. Repetition schemes are rather inefficient
but very simple to implement. Error-correcting codes can provide strict guarantees on the number of errors that
can be detected.
A. Repetition schemes
Variations on this scheme exist. Given a stream of data that is to be sent, the data is broken up into blocks of
bits, and in sending, each block is sent some predetermined number of times. For example, if we want to send
"1011", we may repeat this block three times each. Suppose we send "1011 1011 1011", and this is received as
"1010 1011 1011". As one group is not the same as the other two, we can determine that an error has occurred.
This scheme is not very efficient, and can be susceptible to problems if the error occurs in exactly the same
place for each group (e.g. "1010 1010 1010" in the example above will be detected as correct in this
scheme).The scheme however is extremely simple, and is in fact used in some transmissions of numbers stations
Yashu et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 8(6), March-May, 2014, pp. 528-
531
IJETCAS 14-488; © 2014, IJETCAS All Rights Reserved Page 530
B. Parity schemes
Parity bit: A simple parity bit is an error detection mechanism that can only detect an odd number of errors. The
stream of data is broken up into blocks of bits, and the number of 1 bits is counted. Then, a "parity bit" is set (or
cleared) if the number of one bits is odd (or even). (This scheme is called even parity; odd parity can also be
used.) If the tested blocks overlap, then the parity bits can be used to isolate the error, and even correct it if the
error affects a single bit: this is the principle behind the Hamming code. There is a limitation to parity schemes.
A parity bit is only guaranteed to detect an odd number of bit errors (one, three, five, and so on). If an even
number of bits(two, four, six and so on) are flipped, the parity bit appears to be correct, even though the data is
corrupt.
III. ENCODING TECHNIQUES
The next process of the system is to perform the channel coding. In this work we have defined three different
encoding schemes listed below.
A. Convolution Codes
A convolutional code is a type of code in which each k-bit information to be encoded is transformed into an n-
bit symbol. A convolutional code introduces redundant bits into the data stream through the use of linear shift
registers as shown in (Figure1). The inputs to the shift registers are information bits and the output encoded bits
are obtained by modulo-2 addition of the input information bits and the contents of the shift registers.
k bits n bits
Figure 1: Encoding Machanism
B. Convolution Code Encoder
A convolutional encoder is made up of a fixed number of shift registers. Each input bit enters a shift register and
the output is derived by combining the bits of the shift register. The number of output bits depends on the
number of modulo 2-adders used with shift registers.
Figure 2: Convolution Code Encoder
Convolutional codes are primarily described by three parameters (n,k,m) where,
n = number of output bits k = number of input bits
m = number of memory registers
A convolutional encoder is characterized by two parameters, namely code rate (r) and constraint length (K). The
code rate is defined as the ratio of the number of message bits(k) to the number of encoded bits (n).
r = k/n
The convolutional code’s structure is easy to draw from its parameters. First draw m boxes representing the m
memory register. Then draw n modulo-2 adders to represent the n output bits. Now connect the memory
registers to the adders using the generator polynomial. This is a rate 1/3 code. Each input bit is coded into 3
output bits. The constraint length of the code is 2. The 3 output bits are produced by the 3 modulo-2 adders by
adding up certain bits in the memory registers. The selection of which bits are to be added to produce the output
bit is called the generator polynomial (g) for that output bit. For example, the first output bit has a generator
polynomial of (1,1,1). The output bit 2 has a generator polynomial of (0,1,1) and the third output bit has a
polynomial of (1,0,1). The output bits just do the sum of these bits.
v1 = mod2 (u1 + u0 + u-1)
v2 = mod2 ( u0 + u-1)
(n,k,m)
Input Encoded
Bits
Encoder
bits
Yashu et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 8(6), March-May, 2014, pp. 528-
531
IJETCAS 14-488; © 2014, IJETCAS All Rights Reserved Page 531
v3 = mod2 (u1 + u-1)
The polynomials give the code its unique error protection quality.
C. Hamming codes
Hamming codes are block codes, so coded vectors, c, of length n coded bits are formed from a data sequence, d,
of length k information bits, and generator matrix, G, as follows:
[c] = [G] [d].
nx1 nxk kx1
There are specific possible sizes of G for hamming codes based on a parameter, m. n = 2m
– 1, k = n – m. So, for
m = 3, n = 7 and k = 4. This is called the (7,4) Hamming code.
D. RS Encoding
Reed Solomon encoding is a block encoding scheme. The system implemented in this study was a (255,223)
system, in which (n,k) denotes an output codeword length of n and an input word of length k, as shown in
Figure 1. It has a symbol size, s, equal to 8. The decoder has a correcting capability of t symbol errors in the
code word, with n – k = 2t, in this case, t=16.
Data (k) Parity (2t)
n
Figure 3: typical RS codeword
The encoder forms a code word xn-k
m(x) + r(x) by means of the following equation:
xn k
m(x)
q(x)
r(x)
g(x) g(x)
The divisor, g(x) is known as the generator polynomial. It is a polynomial of degree (n-k) and which is a factor
of (xn
+1). To maximize the minimum distance between codes, the roots of this polynomial should all be
consecutive. This is a direct consequence of the BCH bound, which states that the minimum distance is always
larger than the number of consecutive factors of g(x). The system used adapted a generator polynomial with
roots from 1
to 32
.
V. CONCLUSIONS
In this paper, a study on different encoding filters is defined. While performing the communication in network,
some mechanism is required that will reduce the communication efforts as well as provide the effective
communication in term of security. The paper has discussed three main encoding techniques called
Convolutional Filters, RS Filter and Hamming encoding.
REFERENCES
[1] Juejia Zhou," A Kind of Application-Specific QoS Control in Wireless Sensor Networks", Proceedings of the 2006 IEEE
International Conference on Information Acquisition 1-4244-0529-7/06©C2006 IEEE
[2] Haifeng Hu, "The Study Of Power Control Based Cooperative Opportunistic Routing In Wireless Sensor Networks",
Proceedings of 2007 International Symposium on Intelligent Signal Processing and Communication Systems 1-4244-1447-4/07
©2007 IEEE
[3] Paulo Sergio Sausen," Energy Efficient Blind Flooding in Wireless Sensors Networks".
[4] Peng Ji," A Power-aware Layering Optimization Scheme for Wireless Sensor Network", 978-1-4244-3693-4/09 ©2009 IEEE
[5] Parvaneh Rezayat," A Novel Real-Time Routing Protocol in Wireless Sensor Networks", 978-1-4244-5757-1/10 ©20091EEE
[6] Kritchai Witheephanich," On The Applicability of Model Predictive Power Control to an IEEE 802.15.4 Wireless Sensor
Network", ISSC 2009.
[7] Djamel Djenouri," Traffic-Differentiation-Based Modular QoS Localized Routing for Wireless Sensor Networks", IEEE
TRANSACTIONS ON MOBILE COMPUTING 1536-1233/11@ 2011 IEEE
[8] A. Chehri," QoS Aware Green Routing Protocol for Wireless Sensor Networks", 2012 25th IEEE Canadian Conference on
Electrical and Computer Engineering (CCECE) 978-1-4673-1433-6/12 ©2012 IEEE
[9] Prof. Arun Biradar," Dual Channel Based Multi-Objectives Genetic Routing Protocol for Ad-Hoc Networks and Optical
Networks Using Power Aware Clustered Topology", 2012 International Conference on Optical Engineering (ICOE) 978-1-4673-
2463-2/12 © 2012 IEEE
[10] Nirmala.S, Nallusamy.R, “An Energy-Efficient and enhanced QoS aware of MAC application specific protocol in the distributed
Wireless Sensor Networks”, IEEE- Fourth International Conference on Advanced Computing, ICoAC 2012 MIT, Anna
University 978-1-4673-5584-1/12@2012 IEEE
[11] Mohammad Arifuzzaman," An Intelligent Hybrid MAC With Traffic-Differentiation-Based QoS for Wireless Sensor Networks",
IEEE SENSORS JOURNAL 1530-437X © 2013 IEEE
[12] Diogo F. Lima Filho," TCNet: Trellis Coded Network - implementation of QoS-aware routing protocols in WSNs".
[13] D. F. L. Filho," TCNet: Trellis Coded Network – Implementation of QoS-aware Routing Protocols in WSNs", IEEE LATIN
AMERICA TRANSACTIONS
[14] Irfan Al-Anbagi," An Adaptive QoS Scheme for WSN-based Smart Grid Monitoring", IEEE International Conference on
Communications 2013: IEEE ICC'13 - 3rd IEEE International Workshop on Smart Communication Protocols and Algorithms
(SCPA 2013) 978-1-4673-5753-1/13 ©2013 IEEE
[15] Luıs Marques," Fighting Uncertainty in Highly Dynamic Wireless Sensor Networks with Probabilistic Models", 2013 IEEE 32nd
International Symposium on Reliable Distributed Systems 1060-9857/13© 2013 IEEE

More Related Content

What's hot

Improved Good put using Harvest-Then-Transmit Protocol for Video Transfer
Improved Good put using Harvest-Then-Transmit Protocol for Video TransferImproved Good put using Harvest-Then-Transmit Protocol for Video Transfer
Improved Good put using Harvest-Then-Transmit Protocol for Video TransferEswar Publications
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...IJCNCJournal
 
Mobile elements scheduling for periodic sensor applications
Mobile elements scheduling for periodic sensor applicationsMobile elements scheduling for periodic sensor applications
Mobile elements scheduling for periodic sensor applicationsijwmn
 
Efficient routing mechanism using cycle based network and k hop security in a...
Efficient routing mechanism using cycle based network and k hop security in a...Efficient routing mechanism using cycle based network and k hop security in a...
Efficient routing mechanism using cycle based network and k hop security in a...ijait
 
Concept of node usage probability from complex networks and its applications ...
Concept of node usage probability from complex networks and its applications ...Concept of node usage probability from complex networks and its applications ...
Concept of node usage probability from complex networks and its applications ...redpel dot com
 
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETSQUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETScseij
 
Fault Tolerant Congestion based Algorithms in OBS Network
Fault Tolerant Congestion based Algorithms in OBS NetworkFault Tolerant Congestion based Algorithms in OBS Network
Fault Tolerant Congestion based Algorithms in OBS NetworkCSCJournals
 
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...IJCNCJournal
 
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETSMULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETSIJCNCJournal
 
On the Tree Construction of Multi hop Wireless Mesh Networks with Evolutionar...
On the Tree Construction of Multi hop Wireless Mesh Networks with Evolutionar...On the Tree Construction of Multi hop Wireless Mesh Networks with Evolutionar...
On the Tree Construction of Multi hop Wireless Mesh Networks with Evolutionar...CSCJournals
 
Mobile ad hoc networks – dangling issues of optimal path strategy
Mobile ad hoc networks – dangling issues of optimal path strategyMobile ad hoc networks – dangling issues of optimal path strategy
Mobile ad hoc networks – dangling issues of optimal path strategyAlexander Decker
 
Simulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet SystemSimulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet SystemIOSR Journals
 
Maximizing Efficiency Of multiple–Path Source Routing in Presence of Jammer
Maximizing Efficiency Of multiple–Path Source Routing in Presence of JammerMaximizing Efficiency Of multiple–Path Source Routing in Presence of Jammer
Maximizing Efficiency Of multiple–Path Source Routing in Presence of JammerIOSR Journals
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNIJCNCJournal
 
Review on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor NetworkReview on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor NetworkEditor IJCATR
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNpaperpublications3
 

What's hot (18)

Improved Good put using Harvest-Then-Transmit Protocol for Video Transfer
Improved Good put using Harvest-Then-Transmit Protocol for Video TransferImproved Good put using Harvest-Then-Transmit Protocol for Video Transfer
Improved Good put using Harvest-Then-Transmit Protocol for Video Transfer
 
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
INVESTIGATING MULTILAYER OMEGA-TYPE NETWORKS OPERATING WITH THE CUT-THROUGH T...
 
Mobile elements scheduling for periodic sensor applications
Mobile elements scheduling for periodic sensor applicationsMobile elements scheduling for periodic sensor applications
Mobile elements scheduling for periodic sensor applications
 
Efficient routing mechanism using cycle based network and k hop security in a...
Efficient routing mechanism using cycle based network and k hop security in a...Efficient routing mechanism using cycle based network and k hop security in a...
Efficient routing mechanism using cycle based network and k hop security in a...
 
Concept of node usage probability from complex networks and its applications ...
Concept of node usage probability from complex networks and its applications ...Concept of node usage probability from complex networks and its applications ...
Concept of node usage probability from complex networks and its applications ...
 
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETSQUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
 
Fault Tolerant Congestion based Algorithms in OBS Network
Fault Tolerant Congestion based Algorithms in OBS NetworkFault Tolerant Congestion based Algorithms in OBS Network
Fault Tolerant Congestion based Algorithms in OBS Network
 
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...
 
Analytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANETAnalytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANET
 
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETSMULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
MULTICASTING BASED ENHANCED PROACTIVE SOURCE ROUTING IN MANETS
 
On the Tree Construction of Multi hop Wireless Mesh Networks with Evolutionar...
On the Tree Construction of Multi hop Wireless Mesh Networks with Evolutionar...On the Tree Construction of Multi hop Wireless Mesh Networks with Evolutionar...
On the Tree Construction of Multi hop Wireless Mesh Networks with Evolutionar...
 
Mobile ad hoc networks – dangling issues of optimal path strategy
Mobile ad hoc networks – dangling issues of optimal path strategyMobile ad hoc networks – dangling issues of optimal path strategy
Mobile ad hoc networks – dangling issues of optimal path strategy
 
Simulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet SystemSimulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet System
 
Maximizing Efficiency Of multiple–Path Source Routing in Presence of Jammer
Maximizing Efficiency Of multiple–Path Source Routing in Presence of JammerMaximizing Efficiency Of multiple–Path Source Routing in Presence of Jammer
Maximizing Efficiency Of multiple–Path Source Routing in Presence of Jammer
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
 
1. 8481 1-pb
1. 8481 1-pb1. 8481 1-pb
1. 8481 1-pb
 
Review on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor NetworkReview on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor Network
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
 

Viewers also liked (19)

Ijetcas14 528
Ijetcas14 528Ijetcas14 528
Ijetcas14 528
 
Ijebea14 287
Ijebea14 287Ijebea14 287
Ijebea14 287
 
Ijetcas14 567
Ijetcas14 567Ijetcas14 567
Ijetcas14 567
 
Aijrfans14 259
Aijrfans14 259Aijrfans14 259
Aijrfans14 259
 
Ijetcas14 545
Ijetcas14 545Ijetcas14 545
Ijetcas14 545
 
Ijetcas14 518
Ijetcas14 518Ijetcas14 518
Ijetcas14 518
 
Ijebea14 244
Ijebea14 244Ijebea14 244
Ijebea14 244
 
Aijrfans14 257
Aijrfans14 257Aijrfans14 257
Aijrfans14 257
 
Aijrfans14 228
Aijrfans14 228Aijrfans14 228
Aijrfans14 228
 
Ijetcas14 578
Ijetcas14 578Ijetcas14 578
Ijetcas14 578
 
Ijetcas14 430
Ijetcas14 430Ijetcas14 430
Ijetcas14 430
 
Ijebea14 272
Ijebea14 272Ijebea14 272
Ijebea14 272
 
Ijetcas14 347
Ijetcas14 347Ijetcas14 347
Ijetcas14 347
 
Ijebea14 260
Ijebea14 260Ijebea14 260
Ijebea14 260
 
Ijebea14 276
Ijebea14 276Ijebea14 276
Ijebea14 276
 
Ijetcas14 396
Ijetcas14 396Ijetcas14 396
Ijetcas14 396
 
Ijetcas14 508
Ijetcas14 508Ijetcas14 508
Ijetcas14 508
 
ijetcas14 650
ijetcas14 650ijetcas14 650
ijetcas14 650
 
Aijrfans14 205
Aijrfans14 205Aijrfans14 205
Aijrfans14 205
 

Similar to Ijetcas14 488

Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...IOSR Journals
 
Enhancenig OLSR routing protocol using K-means clustering in MANETs
Enhancenig OLSR routing protocol using K-means clustering  in MANETs Enhancenig OLSR routing protocol using K-means clustering  in MANETs
Enhancenig OLSR routing protocol using K-means clustering in MANETs IJECEIAES
 
Quality of Service Stability Based Multicast Routing Protocol for MANETs
Quality of Service Stability Based Multicast Routing Protocol for MANETsQuality of Service Stability Based Multicast Routing Protocol for MANETs
Quality of Service Stability Based Multicast Routing Protocol for MANETsCSEIJJournal
 
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETSQUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETScseij
 
7117cseij01
7117cseij017117cseij01
7117cseij01cseij
 
Optimized Traffic Flow over Multipath in Optical Networks
Optimized Traffic Flow over Multipath in Optical NetworksOptimized Traffic Flow over Multipath in Optical Networks
Optimized Traffic Flow over Multipath in Optical Networkspaperpublications3
 
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...Eswar Publications
 
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless NetworkThroughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Networkijtsrd
 
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKDYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKcscpconf
 
A SURVEY ON MULTIPATH ROUTING STRATEGY IN MULTI-HOP WIRELESS SENSOR NETWORK
A SURVEY ON MULTIPATH ROUTING STRATEGY IN MULTI-HOP WIRELESS SENSOR NETWORK A SURVEY ON MULTIPATH ROUTING STRATEGY IN MULTI-HOP WIRELESS SENSOR NETWORK
A SURVEY ON MULTIPATH ROUTING STRATEGY IN MULTI-HOP WIRELESS SENSOR NETWORK ijiert bestjournal
 
Back-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANETBack-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANETijsrd.com
 
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...csandit
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Journals
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...eSAT Publishing House
 
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...Editor IJCATR
 
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...IOSR Journals
 
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...AIRCC Publishing Corporation
 
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...IOSR Journals
 
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATIONRASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATIONAIRCC Publishing Corporation
 

Similar to Ijetcas14 488 (20)

Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
Multipath Routing Protocol by Breadth First Search Algorithm in Wireless Mesh...
 
Enhancenig OLSR routing protocol using K-means clustering in MANETs
Enhancenig OLSR routing protocol using K-means clustering  in MANETs Enhancenig OLSR routing protocol using K-means clustering  in MANETs
Enhancenig OLSR routing protocol using K-means clustering in MANETs
 
Quality of Service Stability Based Multicast Routing Protocol for MANETs
Quality of Service Stability Based Multicast Routing Protocol for MANETsQuality of Service Stability Based Multicast Routing Protocol for MANETs
Quality of Service Stability Based Multicast Routing Protocol for MANETs
 
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETSQUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
 
7117cseij01
7117cseij017117cseij01
7117cseij01
 
Optimized Traffic Flow over Multipath in Optical Networks
Optimized Traffic Flow over Multipath in Optical NetworksOptimized Traffic Flow over Multipath in Optical Networks
Optimized Traffic Flow over Multipath in Optical Networks
 
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
Mitigating Link Failures & Implementing Security Mechanism in Multipath Flows...
 
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless NetworkThroughput Maximization using Spatial Reusability in Multi Hop Wireless Network
Throughput Maximization using Spatial Reusability in Multi Hop Wireless Network
 
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKDYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
 
A SURVEY ON MULTIPATH ROUTING STRATEGY IN MULTI-HOP WIRELESS SENSOR NETWORK
A SURVEY ON MULTIPATH ROUTING STRATEGY IN MULTI-HOP WIRELESS SENSOR NETWORK A SURVEY ON MULTIPATH ROUTING STRATEGY IN MULTI-HOP WIRELESS SENSOR NETWORK
A SURVEY ON MULTIPATH ROUTING STRATEGY IN MULTI-HOP WIRELESS SENSOR NETWORK
 
F04503057062
F04503057062F04503057062
F04503057062
 
Back-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANETBack-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANET
 
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...
JCWAEED: JOINT CHANNEL ASSIGNMENT AND WEIGHTED AVERAGE EXPECTED END-TO-END DE...
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
 
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
Enhancement of qos in multihop wireless networks by delivering cbr using lb a...
 
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...
 
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
 
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
 
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...CPCRT: Crosslayered and Power Conserved Routing Topology  for congestion Cont...
CPCRT: Crosslayered and Power Conserved Routing Topology for congestion Cont...
 
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATIONRASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
RASPBERRY PI AND ARDUINO UNO WORKING TOGETHER AS A BASIC METEOROLOGICAL STATION
 

More from Iasir Journals (20)

Ijetcas14 648
Ijetcas14 648Ijetcas14 648
Ijetcas14 648
 
Ijetcas14 647
Ijetcas14 647Ijetcas14 647
Ijetcas14 647
 
Ijetcas14 643
Ijetcas14 643Ijetcas14 643
Ijetcas14 643
 
Ijetcas14 641
Ijetcas14 641Ijetcas14 641
Ijetcas14 641
 
Ijetcas14 639
Ijetcas14 639Ijetcas14 639
Ijetcas14 639
 
Ijetcas14 632
Ijetcas14 632Ijetcas14 632
Ijetcas14 632
 
Ijetcas14 624
Ijetcas14 624Ijetcas14 624
Ijetcas14 624
 
Ijetcas14 619
Ijetcas14 619Ijetcas14 619
Ijetcas14 619
 
Ijetcas14 615
Ijetcas14 615Ijetcas14 615
Ijetcas14 615
 
Ijetcas14 608
Ijetcas14 608Ijetcas14 608
Ijetcas14 608
 
Ijetcas14 605
Ijetcas14 605Ijetcas14 605
Ijetcas14 605
 
Ijetcas14 604
Ijetcas14 604Ijetcas14 604
Ijetcas14 604
 
Ijetcas14 598
Ijetcas14 598Ijetcas14 598
Ijetcas14 598
 
Ijetcas14 594
Ijetcas14 594Ijetcas14 594
Ijetcas14 594
 
Ijetcas14 593
Ijetcas14 593Ijetcas14 593
Ijetcas14 593
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
Ijetcas14 589
Ijetcas14 589Ijetcas14 589
Ijetcas14 589
 
Ijetcas14 585
Ijetcas14 585Ijetcas14 585
Ijetcas14 585
 
Ijetcas14 584
Ijetcas14 584Ijetcas14 584
Ijetcas14 584
 
Ijetcas14 583
Ijetcas14 583Ijetcas14 583
Ijetcas14 583
 

Recently uploaded

ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 

Recently uploaded (20)

Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 

Ijetcas14 488

  • 1. International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net IJETCAS 14-488; © 2014, IJETCAS All Rights Reserved Page 528 ISSN (Print): 2279-0047 ISSN (Online): 2279-0055 Energy Effectiveness in Sensor Network Encoding Mechanism Effective Routing Network Architecture Study on Different Encoding Mechanism to Perform Secure Network Communication Yashu1 & Smita2 1 Research Scholar, 2 Associate Professor, Department of Computer Science and Engineering, PDM College of Engineering for Women, Bahadurgarh, Haryana, India __________________________________________________________________________________________ Abstract: Network security can be achieved in different ways in a communication system. To achieve the security against different attacks, one approach is to send the encoded information over the network. The encoded approaches not only provide the information security but also decrease the communication size without adding the overhead. In energy critical networks such as sensor network, this kind of encoded communication approach is more effective. In this paper, some of the most common encoding approaches are discussed. The approaches considered in this work are RS Encoding, Convolution Codes and Hamming Codes. Keywords: Convolution, Hamming Code, Information Security, WSN __________________________________________________________________________________________ I. INTRODUCTION A sensor network is one of the most common network architecture defined under the energy constraints. Different operations associated with sensor network include the communication over the effective route. As the communication is performed over the specific route, each participating node consumes some amount of energy. To perform the energy effective communication some optimized routing approach is required. Another way to reduce the energy consumption is to reduce the communicating data over the network. As the communication will be reduced, the energy consumption will also get reduced. To reduce the size of communicating data over the network some encoding technique can also be adapted. The encoding technique is also effective to provide the effective mechanism to detect the error over the network and to provide the effective communication. In this paper, a study on all these aspects of network communication is discussed. The aspect discussed in this paper includes the routing approach as well as the encoding mechanism adapted to reduce the communication. The possibilities to improve the energy effectiveness in sensor network are shown in figure 1. Figure 1: Energy Effectiveness in Sensor Network In this section, Routing in sensor network is discussed. Routing in sensor network is performed using two main approaches called unicast routing and multicast routing approach. Global routing and Maze routing are also some of popular routing approaches adopted by sensor network. These routing approaches are discussed in this section. A. Unicast Routing Unicast routing is about the generation of single path between single source and destination node. The challenge in such routing is to obtain the QoS while performing the effective utilization of bandwidth and the buffer space. The state path generation under the bottleneck problem is also a challenge for communicating network. Unicast
  • 2. Yashu et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 8(6), March-May, 2014, pp. 528- 531 IJETCAS 14-488; © 2014, IJETCAS All Rights Reserved Page 529 routing is also1, which is the bandwidth of the bottleneck link (i, j). For these QoS metrics, two basic routing problems can be defined. One is called link-optimization routing. An example is the bandwidth-optimization routing, which is to find a path that has the largest bandwidth on the bottleneck link. Such a path is called the widest path. The other problem is called link-constrained routing. An example is the bandwidth- constrained routing, which is to find a path whose bottleneck bandwidth is above a required value [2]. For other QoS metrics such as delay, delay jitter and cost, the state of a path is determined by the combined state over all links on the path. For example, if the delay of path s → i → j → t is 10, which is the total delay of all links on the path. Two basic routing problems can be defined for this type of QoS metrics. One is called path-optimization routing. An example is the least-cost routing, which is to find a path whose total cost is minimized. The other problem is called path-constrained routing. An example is the delay-constrained routing, which is to find a path whose delay is bounded by a required value. [2]. B. Multicast Routing There are several well-known multicast routing problems. The Steiner tree problem is to find the least-cost tree, the tree covering a group of destinations with the minimum total cost over all links. It is also called the least-cost multicast routing problem, belonging to the tree-optimization routing problem class. The constrained Steiner tree problem is to find the least-cost tree with bounded delay. It is also called the delay-constrained least-cost routing problem, belonging to the tree-constrained tree-optimization routing problem class [2]. C. Global and Detail Routing: During global routing, complex design rules are abstracted away and a design is divided into a regular grid. Routes are created for each net that connect adjacent grid cells. Capacities are assigned to pairs of adjacent grid cells to model limited routing resources between the cells. Since different metal layers may use distinct wire pitches, routing capacities at each layer may differ to reflect this. A global routing solution is legal if all nets are connected and all capacity constraints are satisfied. Detail routing takes a global routing solution with a small number of capacity violations (overflows), or none at all, and assigns wires to routing tracks while enforcing spacing constraints and more sophisticated design rules. Starting with slightly illegal global routes can make detail routing considerably more difficult, therefore a global router must minimize violations and wavelength, seeking to avoid violations entirely when possible [4]. D. Maze Routing It connects pairs of terminals on the routing grid using standard search techniques such as BFS and Dijkstra’s algorithm. The maze router ensures that the least cost route (according to the cost function) is found. More than 50% of nets in modern designs connect only two pins. BFS can find the shortest path between a source location and a target location, if one exists, but cannot handle routing segments with non-trivial weights [4][8]. In this paper, a study on the encoding techniques in sensor network is defined. The work has covered the routing mechanism in sensor network. In this section, some of different routing approaches adapted in sensor network are defined. In section II, the work done by the earlier researchers is discussed. In section III, some of the effective encoding techniques are discussed. In section IV, the conclusion obtained from the work is defined and presented. II. ERROR DETECTION TECHNIQUES Several schemes exist to achieve error detection. The general idea is to add some redundancy, i.e., some extra data, to a message, that enables detection of any errors in the delivered message. Most such error-detection schemes are systematic: the transmitter sends the original data bits, and attaches a fixed number of check bits, which are derived from the data bits by some deterministic algorithm. The receiver applies the same algorithm to the received data bits and compares its output to the received check bits; if the values do not match, an error has occurred at some point during the transmission. In a system that uses a "non-systematic" code, such as some raptor codes, the original message is transformed into an encoded message that has at least as many bits as the original message. In general, any hash function may be used to compute the redundancy. However, some functions are of particularly widespread use, due to their simplicity, or their suitability of detecting certain kinds of errors, such as the cyclic redundancy check's performance in detecting burst errors. Other mechanisms of adding redundancy are repetition schemes and error-correcting codes. Repetition schemes are rather inefficient but very simple to implement. Error-correcting codes can provide strict guarantees on the number of errors that can be detected. A. Repetition schemes Variations on this scheme exist. Given a stream of data that is to be sent, the data is broken up into blocks of bits, and in sending, each block is sent some predetermined number of times. For example, if we want to send "1011", we may repeat this block three times each. Suppose we send "1011 1011 1011", and this is received as "1010 1011 1011". As one group is not the same as the other two, we can determine that an error has occurred. This scheme is not very efficient, and can be susceptible to problems if the error occurs in exactly the same place for each group (e.g. "1010 1010 1010" in the example above will be detected as correct in this scheme).The scheme however is extremely simple, and is in fact used in some transmissions of numbers stations
  • 3. Yashu et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 8(6), March-May, 2014, pp. 528- 531 IJETCAS 14-488; © 2014, IJETCAS All Rights Reserved Page 530 B. Parity schemes Parity bit: A simple parity bit is an error detection mechanism that can only detect an odd number of errors. The stream of data is broken up into blocks of bits, and the number of 1 bits is counted. Then, a "parity bit" is set (or cleared) if the number of one bits is odd (or even). (This scheme is called even parity; odd parity can also be used.) If the tested blocks overlap, then the parity bits can be used to isolate the error, and even correct it if the error affects a single bit: this is the principle behind the Hamming code. There is a limitation to parity schemes. A parity bit is only guaranteed to detect an odd number of bit errors (one, three, five, and so on). If an even number of bits(two, four, six and so on) are flipped, the parity bit appears to be correct, even though the data is corrupt. III. ENCODING TECHNIQUES The next process of the system is to perform the channel coding. In this work we have defined three different encoding schemes listed below. A. Convolution Codes A convolutional code is a type of code in which each k-bit information to be encoded is transformed into an n- bit symbol. A convolutional code introduces redundant bits into the data stream through the use of linear shift registers as shown in (Figure1). The inputs to the shift registers are information bits and the output encoded bits are obtained by modulo-2 addition of the input information bits and the contents of the shift registers. k bits n bits Figure 1: Encoding Machanism B. Convolution Code Encoder A convolutional encoder is made up of a fixed number of shift registers. Each input bit enters a shift register and the output is derived by combining the bits of the shift register. The number of output bits depends on the number of modulo 2-adders used with shift registers. Figure 2: Convolution Code Encoder Convolutional codes are primarily described by three parameters (n,k,m) where, n = number of output bits k = number of input bits m = number of memory registers A convolutional encoder is characterized by two parameters, namely code rate (r) and constraint length (K). The code rate is defined as the ratio of the number of message bits(k) to the number of encoded bits (n). r = k/n The convolutional code’s structure is easy to draw from its parameters. First draw m boxes representing the m memory register. Then draw n modulo-2 adders to represent the n output bits. Now connect the memory registers to the adders using the generator polynomial. This is a rate 1/3 code. Each input bit is coded into 3 output bits. The constraint length of the code is 2. The 3 output bits are produced by the 3 modulo-2 adders by adding up certain bits in the memory registers. The selection of which bits are to be added to produce the output bit is called the generator polynomial (g) for that output bit. For example, the first output bit has a generator polynomial of (1,1,1). The output bit 2 has a generator polynomial of (0,1,1) and the third output bit has a polynomial of (1,0,1). The output bits just do the sum of these bits. v1 = mod2 (u1 + u0 + u-1) v2 = mod2 ( u0 + u-1) (n,k,m) Input Encoded Bits Encoder bits
  • 4. Yashu et al., International Journal of Emerging Technologies in Computational and Applied Sciences, 8(6), March-May, 2014, pp. 528- 531 IJETCAS 14-488; © 2014, IJETCAS All Rights Reserved Page 531 v3 = mod2 (u1 + u-1) The polynomials give the code its unique error protection quality. C. Hamming codes Hamming codes are block codes, so coded vectors, c, of length n coded bits are formed from a data sequence, d, of length k information bits, and generator matrix, G, as follows: [c] = [G] [d]. nx1 nxk kx1 There are specific possible sizes of G for hamming codes based on a parameter, m. n = 2m – 1, k = n – m. So, for m = 3, n = 7 and k = 4. This is called the (7,4) Hamming code. D. RS Encoding Reed Solomon encoding is a block encoding scheme. The system implemented in this study was a (255,223) system, in which (n,k) denotes an output codeword length of n and an input word of length k, as shown in Figure 1. It has a symbol size, s, equal to 8. The decoder has a correcting capability of t symbol errors in the code word, with n – k = 2t, in this case, t=16. Data (k) Parity (2t) n Figure 3: typical RS codeword The encoder forms a code word xn-k m(x) + r(x) by means of the following equation: xn k m(x) q(x) r(x) g(x) g(x) The divisor, g(x) is known as the generator polynomial. It is a polynomial of degree (n-k) and which is a factor of (xn +1). To maximize the minimum distance between codes, the roots of this polynomial should all be consecutive. This is a direct consequence of the BCH bound, which states that the minimum distance is always larger than the number of consecutive factors of g(x). The system used adapted a generator polynomial with roots from 1 to 32 . V. CONCLUSIONS In this paper, a study on different encoding filters is defined. While performing the communication in network, some mechanism is required that will reduce the communication efforts as well as provide the effective communication in term of security. The paper has discussed three main encoding techniques called Convolutional Filters, RS Filter and Hamming encoding. REFERENCES [1] Juejia Zhou," A Kind of Application-Specific QoS Control in Wireless Sensor Networks", Proceedings of the 2006 IEEE International Conference on Information Acquisition 1-4244-0529-7/06©C2006 IEEE [2] Haifeng Hu, "The Study Of Power Control Based Cooperative Opportunistic Routing In Wireless Sensor Networks", Proceedings of 2007 International Symposium on Intelligent Signal Processing and Communication Systems 1-4244-1447-4/07 ©2007 IEEE [3] Paulo Sergio Sausen," Energy Efficient Blind Flooding in Wireless Sensors Networks". [4] Peng Ji," A Power-aware Layering Optimization Scheme for Wireless Sensor Network", 978-1-4244-3693-4/09 ©2009 IEEE [5] Parvaneh Rezayat," A Novel Real-Time Routing Protocol in Wireless Sensor Networks", 978-1-4244-5757-1/10 ©20091EEE [6] Kritchai Witheephanich," On The Applicability of Model Predictive Power Control to an IEEE 802.15.4 Wireless Sensor Network", ISSC 2009. [7] Djamel Djenouri," Traffic-Differentiation-Based Modular QoS Localized Routing for Wireless Sensor Networks", IEEE TRANSACTIONS ON MOBILE COMPUTING 1536-1233/11@ 2011 IEEE [8] A. Chehri," QoS Aware Green Routing Protocol for Wireless Sensor Networks", 2012 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE) 978-1-4673-1433-6/12 ©2012 IEEE [9] Prof. Arun Biradar," Dual Channel Based Multi-Objectives Genetic Routing Protocol for Ad-Hoc Networks and Optical Networks Using Power Aware Clustered Topology", 2012 International Conference on Optical Engineering (ICOE) 978-1-4673- 2463-2/12 © 2012 IEEE [10] Nirmala.S, Nallusamy.R, “An Energy-Efficient and enhanced QoS aware of MAC application specific protocol in the distributed Wireless Sensor Networks”, IEEE- Fourth International Conference on Advanced Computing, ICoAC 2012 MIT, Anna University 978-1-4673-5584-1/12@2012 IEEE [11] Mohammad Arifuzzaman," An Intelligent Hybrid MAC With Traffic-Differentiation-Based QoS for Wireless Sensor Networks", IEEE SENSORS JOURNAL 1530-437X © 2013 IEEE [12] Diogo F. Lima Filho," TCNet: Trellis Coded Network - implementation of QoS-aware routing protocols in WSNs". [13] D. F. L. Filho," TCNet: Trellis Coded Network – Implementation of QoS-aware Routing Protocols in WSNs", IEEE LATIN AMERICA TRANSACTIONS [14] Irfan Al-Anbagi," An Adaptive QoS Scheme for WSN-based Smart Grid Monitoring", IEEE International Conference on Communications 2013: IEEE ICC'13 - 3rd IEEE International Workshop on Smart Communication Protocols and Algorithms (SCPA 2013) 978-1-4673-5753-1/13 ©2013 IEEE [15] Luıs Marques," Fighting Uncertainty in Highly Dynamic Wireless Sensor Networks with Probabilistic Models", 2013 IEEE 32nd International Symposium on Reliable Distributed Systems 1060-9857/13© 2013 IEEE