SlideShare a Scribd company logo
1 of 5
Download to read offline
K. Swathi et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.942-946

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

Novel Approach for Dynamic Data Collection in Tree Based
Wireless Sensor Networks
K. Swathi1, Sk. Abdul Ali2
1.
2.

M.Tech Scholar, Nimra Institute Of Engineering & Technlogy
Associate Professor, Nimra Institute Of Engineering & Technlogy

ABSTRACT
In the wireless sensor networks the energy of the nodes present in the network is limited. Due to the low
manufacturing costs of sensor nodes, they can be organized in large numbers and containing more challenges in
routing, topology and data management protocols. These challenges are complicated by severe energy
constraints and the inherently unreliable nature of wireless communications which have yielded work in
increasing network efficiency. Our main objective is to increase the tolerance level and decrease the complexity
of the wireless sensor network. In this primarily visualize time scheduling on a single frequency channel with
the aim of reducing the number of time slots necessary to entire a convergecast. After we mingle scheduling
with communication power control to moderate the effects of interference, and demonstrate that while power
control helps in reducing the schedule length under a on its own frequency, forecast transmissions using several
frequencies is more capable. We present lower bounds on the schedule length when interference is completely
removed, and recommend algorithms that achieve these bounds. We also estimate the performance of different
channel assignment methods, the use of multi-frequency scheduling can sufficient to eliminate most of the
interference. After that the data collection rate increases by reducing the interference by the topology of the
routing tree.
Index Terms: Convergecast, Data Collection, Degree constrained spanning tree, Hybrid convergecast tree,
Minimal Spanning Tree Time Division Multiple Access Scheduling

I.

INTRODUCTION

Wireless sensor networks consist of
distributed self-governing sensor nodes which are
used in various applications areas such as health,
home, military. Each node receives data from
surroundings and it will forward the data to its base
station. The location of each sensor node is not
predetermined and each sensor nodes contains its
own self organizing capabilities. The unique feature
of sensor nodes is the cooperative effort of sensor
nodes. As an unconventional of sending the raw data
to the nodes responsible for the synthesis, sensor
nodes make use of their processing capabilities to
locally carry out simple computations and it will
transmit only the required and partially processed
data. Sensor nodes are used for continuous sensing,
detecting events, event ID, and sensing the location.
The sensor nodes are scattered in the sensor
network. Each scattered sensor nodes has the ability
to collect and route data to the sink.

Fig.1: Self forming Wireless Sensor Networks
Convergecast is the collection of data from
a set of sensors toward a general sink over a tree
based routing topology, is a primary operation in
wireless sensor networks. In many applications, it is
critical to offer a guarantee on the delivery time as
well as increase the rate of such data collection. For
example, in security and mission-critical
applications where sensor nodes are organized to

www.ijera.com

942 | P a g e
K. Swathi et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.942-946
detect oil/gas leak or structural damage, the
actuators and controllers need to take delivery of
data from all the sensors within an exact deadline,
failure of which might lead to unpredictable and
catastrophic events. The other applications such as
permafrost monitoring require periodic and fast data
delivery over long periods of time, which falls
beneath the grouping of permanent data collection.
For periodic traffic, it is well known that contention
free medium access control (MAC) protocols such
as Time Division Multiple Access are better fit for
fast data collection, since they can reduce collisions
and retransmissions and provide guarantee on the
completion time as divergent to contention-based
protocols. The problem of building conflict free
Time Division Multiple Access schedules even
under the simple graph-based interference model
has been proved to be NP-complete. In this work,
we consider a DMA framework and design
polynomial-time heuristics to minimize the schedule
length for both types of convergecast. We
furthermore find lower bounds on the achievable
schedule lengths and compare the performance of
our heuristics with these bounds.
In Time Division Multiple Access
schedule, time slotted and each slot is long enough
to transmit and receive of a single packet. Hence the
time slots are grouped as a non – overlapping frames
and the schedule for each frame is repeated when
the data collection is periodic. The main objective of
Time Division Multiple Access design is to
minimize schedule length, minimize Latency,
minimizing energy consumption, maximizing
capacity,
maximizing
fairness,
minimizing
communication costs, maximizing the parallel
transmission, meeting deadlines, and minimizing
interference. A Wireless sensor networks has small
or no infrastructure. It contains of a number of
sensor nodes which works together to monitor a
region and it is used to obtain data about the
environment. The Wireless sensor networks are
classified into two types such as structured and
unstructured. An unstructured WSN contains the
dense collection of sensor nodes. The Sensor nodes
are deployed in an ad hoc manner into the field.
Once deployed, the network is kept unattended to
perform monitoring and reporting functions. Hence
network maintenance and failure detection is
difficult since there are so many nodes. In structured
network, all or some of the nodes are deployed in a
pre planned manner. Due to small number of nodes
network maintenance is easy and management cost
is reduced.

II.

RELATED WORK

Collecting data is the basic operation in
wireless sensor networks. Collecting those data in a
well-organized manner is more critical when
compared to the performance of sensor networks.
Each sensor will measure the values at regular time
www.ijera.com

www.ijera.com

intervals and it will send that to sink node. The total
collection of data is called as snapshot. Here the
sensor network is a Time Division Multiple Access
based network. In the past, the data collection
capacity is based on large scale random networks,
though most of the sensors are not deployed
uniformly and the available sensors will not be as
huge as in theory. For this purpose we have to know
about the capacity of data collection in a network.
The capacity of data collection shows how the sink
collects data from sensor nodes quickly by
considering its interference conditions. The upper
and lower bounds for data collection capacity are
constructed based on the protocol interference and
disk graph models. A simple BFS tree based method
is used to achieve the collection capacity which
matches the upper bound.
In sensor networks the packets generated
by each and every node have to reach the sink. This
many – to –one communication is known as
convergecast. A Time Division Multiple Access
schedule is used which minimizes the total time
required to complete the convergecast. A simple
version of problem is considered where every node
generates exactly one packet. Yiin Zhang
constructed a distributed scheduling algorithm for
the tree networks that requires at most max(3nk –
1,N) time slots for convergecast, where nk
corresponds to the maximum number of nodes in
any sub tree and N represents the number of nodes
in network. The Distributed scheduling algorithm
requires at most 3N time slots in any network. The
proposed simulation shows that the number of time
slots required is about 1.5 N. Two bounds are
required for the packets to be buffered at the node
during convergecast. Sleep schedules for nodes are
considered for conserve energy. It reduces the
energy consumption by at least 50% Breadth first
search tree is considered for convergecast
scheduling. The problem of minimizing the schedule
length for raw-data convergecast on single channel
is shown to be NP-complete on general graphs.
Maximizing the throughput of convergecast by
finding a shortest-length, conflict-free schedule is
studied, where a greedy graph coloring strategy
assigns time slots to the senders and prevents
interference and also discussed the impact of routing
trees on the schedule length and proposed a routing
scheme called disjoint strips to transmit data over
different shortest paths. Though the sink remains as
the restricted access, sending data over different
paths does not reduce the schedule length. The
improvement due to the routing structure comes
from using capacitated minimal spanning trees for
raw-data convergecast, where the number of nodes
in a sub tree is no additional than half the total
number of nodes in the remaining sub trees.

943 | P a g e
K. Swathi et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.942-946
III.

TDMA SCHEDULING OF
CONVERGECASTS

3.1 Periodic Aggregated Convergecast
In this consider the scheduling problem
where packets are aggregated. Data aggregation is a
frequently used technique in Wireless Sensor
Networks that can eliminate redundancy and
minimize the number of transmissions, thus
reduction energy and humanizing network lifetime.
Aggregation can be achieved in a lot of ways, such
as by restraining carbon copy messages; using data
compression and packet merging techniques; or
taking advantage of the correlation in the sensor
readings. We reflect on continuous monitoring
applications where perfect aggregation is possible
and each node is capable of aggregating all the
packets received from its children in addition to that
produced by itself into a single packet before
transmitting to its parent. The amount of aggregated
data transmitted by each node is constant and does
not depend on the size of the raw sensor readings.
Usual examples of such aggregation functions are
MIN, MEDIAN, MAX, AVERAGE, COUNT, etc.

www.ijera.com

that at the last part of frame 1, the sink does not
contain packets from nodes 5 and 6; however, as the
schedule is repeated, it accepts aggregated packets
from 2, 5, and 6 in slot 2 of the next frame. In the
same way, the sink also receives aggregated packets
from nodes 1 and 4 opening from slot 1 of frame 2.
The entries {1, 4} and {2, 5, 6} in the table represent
single packets including aggregated data from nodes
1 and 4, and from nodes 2, 5, and 6,
correspondingly. Thus, a pipeline is recognized
from frame 2, and the sink goes on to receive
aggregated packets from all the nodes once every 6
time slots. Thus, the minimum schedule length is 6.
3.2. Assignment of Timeslots
In every iteration of BFS-TIMESLOT
ASSIGNMENT (lines 2-6), an edge e is chosen in
the Breadth First Search (BFS) order starting from
any node, in addition to is allocated the minimum
time slot that is different from all its adjacent edges
respecting intrusive restrictions. Note that, since we
calculate the performance of this algorithm also for
the case when the interfering links are present, we
make sure for the corresponding constraint in line 4;
on the other hand, when interference is removed this
check is redundant. The algorithm runs in O(|ET |2)
time and minimizes the schedule length when there
are no intrusive links and demonstrate the same
network of 1(a) in 1(c) with all the interfering links
removed, and so the network is scheduled in 3 time
slots.

Fig.2: Aggregated convergecast and pipelining:
(a) Schedule length of 6 in the presence of
interfering links.
(b) Node ids from which (aggregated) packets are
received by their corresponding parents in each
time slot over different frames.
(c) Schedule
length
of
3
using
BFSTIMESLOTASSIGNMENT when all the
interfering links are eliminated.
In above Fig. 1(a) and 1(b), illustrates the
notion of pipelining in aggregated convergecast and
that of a schedule length on a network of 6 source
nodes. The hard lines correspond to tree edges, and
the scattered lines represent interfere links. The
numbers nearby the links correspond to the time
slots at which the links are programmed to
broadcast, and the numbers within the circles
represent node ids. The accesses in the table list the
nodes from which packets are received by their
corresponding receivers in each time slot. We note
www.ijera.com

IV.

MULTI-CHANNEL SCHEDULING

Multi-channel communication is an
efficient method to eliminate interference by
enabling concurrent transmissions over different
frequencies. Although typical Wireless Sensor
Networks radios operate on a limited bandwidth,
their working frequencies can be in the swing of
things, thus allowing
more
simultaneous
transmissions and faster data delivery. At this time,
we think about fixed-bandwidth channels, which are
typical of Wireless Sensor Networks radios, as
opposed to the possibility of improving link
bandwidth by consolidating frequencies. We explain
three channel assignment methods that consider the
problem at different levels allowing us to study their
pros and cons for both types of convergecast. These
methods regard as the channel assignment problem
at different levels: the link level (JFTSS), node level
(RBCA), or cluster level (TMCP).
944 | P a g e
K. Swathi et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.942-946
4.1 Joint Frequency Time Slot Scheduling
(JFTSS)
Joint Frequency Time Slot Scheduling
presents a greedy combined solution for
constructing a maximal schedule, such that a
schedule is called to be maximal if it meets the
adjacency and inquisitive constraints, and no more
links can be scheduled for synchronized
transmissions on any time slot and channel
exclusive of breaching the constraints. Joint
Frequency Time Slot Scheduling schedules a
network starting from the link that has the highest
number of packets (load) to be transmitted. While
the connection loads are equal, while in aggregated
convergecast, the most inhibited ink is measured
first, i.e., the link for which the number of other
links breaching the interfering and adjacency
restriction when scheduled at the same time is the
highest. The algorithm starts with an empty
schedule and first sorts the links according to the
loads or constraints. The mainly loaded or unnatural
link in the first accessible slot-channel pair is
scheduled first and added to the schedule. All the
links that have an adjacency restriction with the
programmed link are expelled from the list of the
links to be scheduled at a given slot. The links with
the purpose of do not have an interfering restriction
with the scheduled link can be programmed in the
same slot and channel while the links that have an
inquisitive constraint should be scheduled on
dissimilar channels, if achievable. The algorithm
continues to schedule the links according to the
most loaded (or most constrained) metric.

nodes with the BFSTimeSlot Assignment algorithm.
The advantage of TMCP is that it is designed to
support convergecast traffic and does not require
channel switching. Though, disputation inside the
branches is not determined since all the nodes on the
same branch communicate on the same channel.
4.3. Receiver-Based Channel Assignment (RBCA)
In Receiver-Based Channel Assignment,
the children of a common parent transmit on the
same channel. Each node in the tree, consequently,
operates on at most two channels, therefore avoiding
pair-wise, per-packet, channel negotiation expenses.
The algorithm initially assigns the same channel to
all the receivers. Then, for each receiver, it creates a
set of interfering parents based on SINR thresholds
and iteratively assigns the next available channel
starting from the most interfered parent (the parent
with the highest number of interfering links).
However, due to adjacent channel overlaps, SINR
values at the receivers may not always be high
enough to tolerate interference, in which case the
channels are assigned according to the ability of the
transceivers to reject interference. We proved
approximation factors for Receiver-Based Channel
Assignment when used with greedy scheduling in.
Initially all nodes are on frequency F1. ReceiverBased Channel Assignment starts with the most
interfered parent, node 2 in this example, and
assigns F2. Then it continues to assign F3 to node 3
as the second most interfered parent. Since all
interfering parents are assigned different frequencies
sink can receive on F1.

V.

Fig.3: Scheduling with multi-channels for
aggregated convergecast:
(a) Schedule generated with JFTSS. (b) Schedule
generated with TMCP. (c) Schedule generated with
RBCA. (b) Schedule generated with RBCA.
4.2 Tree-Based Multi-Channel Protocol (TMCP)
Tree-Based Multi-Channel Protocol is a
greedy, tree-based, multi-channel protocol for data
collection applications. It separation the network
into several sub trees and minimizes the intra tree
interference by assigning dissimilar channels to the
nodes residing on unlike branches starting from the
top to the bottom of the tree. The nodes on the
leftmost branch is allocated frequency F1,
subsequent branch is allocated frequency F2 and the
last branch is allocated frequency F3 and after the
channel assignments, time slots are allocated to the
www.ijera.com

www.ijera.com

EVALUATION

We deploy nodes randomly in a region
whose dimensions are varied between 20 × 20 m2
and 300 × 300 m2 to simulate different levels of
density. The number of nodes is kept fixed at 100.
For different parameters, we average each point
over 1000 runs. We use an exponential path-loss
model for signal propagation with the path-loss
exponent α varying between 3 and 4, which is
typical for indoor environments. We also use the
physical interference model and simulate the
behavior of CC2420 radios that are used on Telosb
and TmoteSky motes and are capable of operating
on 16 different frequencies. The transmission power
can be adjusted between −24 dBm and 0 dBm over
8 different levels, and the SINR threshold is set to β
= −3 dB1. We first evaluate the schedule length for
single-channel TDMA, and then its improvement
using transmission power control, multiple channels,
and routing trees.
5.1. Aggregated Convergecast
It shows the variation of schedule length
with density for different values of α on minimumhop tree. We observe that the schedule length
decreases as the deployment gets sparser. This
945 | P a g e
K. Swathi et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.942-946
happens because at low densities the interference is
less, and so more concurrent transmissions can take
place. In the densest deployment (L = 20) when all
the nodes are within the range of each other, the sink
is the only parent, and the network is scheduled in
99 time slots regardless of power control. However,
in sparser scenarios, using power control the
network can be scheduled with fewer time slots as
the level of interference goes down. We achieve a
10 − 20% reduction in schedule length for the best
case.

Fig.4: Scheduling on minimum-hop trees with
multiple channels: (a) Aggregated convergecast.
(b) Raw-data convergecast.
5.2. Raw Data Convergecast
It shows the variation of schedule length on
CMST. The impact of such routing trees is more
prominent in sparser networks (L ≥ 200) than
routing over minimum-hop spanning trees. When L
< 200, the length is bounded by N. Beyond this
point, it is almost always not possible to construct
trees where the constraint 2nk−1 < N holds. In such
cases, the schedule length is some degree of by 2nk
− 1.

VI.

CONCLUSION

Wireless sensor networks can be used in
various applications areas. A sensor networks
consists of large number of nodes and the location
of each sensor nodes is predetermined. By using
TDMA, the nodes communicate on different time
slots in order to prevent conflicts. In order to
improve the data collection the capacity at each
node is adjusted whenever the packet moves from
one sensor node to another sensor node. . A hybrid
convergecast tree is projected for transmitting the
packets with minimum cost for long suited nodes.
Fast convergecast in Wireless Sensor Networks
where nodes communicate using a TDMA protocol
minimize the schedule length. We deal with the
fundamental limitations due to interference and halfduplex transceivers on the nodes and explored
techniques to overcome the same. We set up that
while transmission power control helps in reducing
the schedule length, multiple channels are more
effective and also observed that node-based (RBCA)
and link-based (JFTSS) channel assignment
schemes are more efficient in terms of eliminating
www.ijera.com

www.ijera.com

interference as compared to assigning different
channels on different branches of the tree (TMCP).

REFERENCES
[1]

S. Gandham, Y. Zhang, and Q. Huang,
“Distributed time optimal scheduling for
converge cast in wireless sensor networks,”
Computer Networks, vol. 52, no. 3, pp.
610–629, 2008.
[2]
K. K. Chintalapudi and L. Venkatraman,
“On the design of mac protocols for lowlatency hard real-time discrete control
applications over 802.15.4 hardware,” in
IPSN ’08, pp. 356–367.
[3]
I. Talzi, A. Hasler, S. Gruber, and C.
Tschudin,
“Permasense:
investigating
permafrost with a wsn in the swiss alps,” in
EmNets ’07, Cork, Ireland, pp. 8–12.
[4]
S. Upadhyayula and S. Gupta, “Spanning
tree based algorithms for low latency and
energy efficient data aggregation enhanced
convergecast (dac) in wireless sensor
networks,” Ad Hoc Networks, vol. 5, no. 5,
pp. 626–648, 2007.
[5]
O. D. Incel and B. Krishnamachari,
“Enhancing the data collection rate of treebased aggregation in wireless sensor
networks,” in SECON ’08, San Francisco,
CA, USA, pp. 569–577.
[6]
Y. Wu, J. Stankovic, T. He, and S. Lin,
“Realistic and efficient multi-channel
communications in wireless sensor
networks,” in INFOCOM ’08, pp. 1193–
1201.
[7]
A. Ghosh, O. D. Incel, V. A. Kumar, and
B.
Krishnamachari,
“Multi-channel
scheduling algorithms for fast aggregated
convergecast in sensor networks,” in
MASS ’09, Macau, China.
[8]
V. Annamalai, S. Gupta, and L.
Schwiebert,
“On
tree-based
convergecasting in wireless sensor
networks,” in WCNC ’03, vol. 3, pp. 1942–
1947.
[9]
X. Chen, X. Hu, and J. Zhu, “Minimum
data aggregation time problem in wireless
sensor networks,” in MSN ’05, pp. 133–
142.
[10] H. Choi, J. Wang, and E. Hughes,
“Scheduling for information gathering on
sensor network,” Wireless Networks
(Online), 2007.

946 | P a g e

More Related Content

What's hot

A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...IOSR Journals
 
Distributed Approach for Clock Synchronization in Wireless Sensor Network
Distributed Approach for Clock Synchronization in Wireless Sensor NetworkDistributed Approach for Clock Synchronization in Wireless Sensor Network
Distributed Approach for Clock Synchronization in Wireless Sensor NetworkEditor IJMTER
 
Performance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksPerformance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksDarpan Dekivadiya
 
Energy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksEnergy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksSpandan Spandy
 
Clock Synchronization using Truncated Mean and Whale Optimization for Cluster...
Clock Synchronization using Truncated Mean and Whale Optimization for Cluster...Clock Synchronization using Truncated Mean and Whale Optimization for Cluster...
Clock Synchronization using Truncated Mean and Whale Optimization for Cluster...IJCNCJournal
 
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...ijassn
 
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...
A N  E NERGY -E FFICIENT  A ND  S CALABLE  S LOT - B ASED  P RIVACY  H OMOMOR...A N  E NERGY -E FFICIENT  A ND  S CALABLE  S LOT - B ASED  P RIVACY  H OMOMOR...
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...ijassn
 
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor NetworkAggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Networkijsrd.com
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyAli Habeeb
 
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKSA STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKSpharmaindexing
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Ijarcet vol-2-issue-7-2311-2318
Ijarcet vol-2-issue-7-2311-2318Ijarcet vol-2-issue-7-2311-2318
Ijarcet vol-2-issue-7-2311-2318Editor IJARCET
 

What's hot (19)

2 ijcse-01208
2 ijcse-012082 ijcse-01208
2 ijcse-01208
 
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
 
Distributed Approach for Clock Synchronization in Wireless Sensor Network
Distributed Approach for Clock Synchronization in Wireless Sensor NetworkDistributed Approach for Clock Synchronization in Wireless Sensor Network
Distributed Approach for Clock Synchronization in Wireless Sensor Network
 
Performance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksPerformance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor Networks
 
A250106
A250106A250106
A250106
 
Energy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksEnergy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networks
 
G010433745
G010433745G010433745
G010433745
 
Clock Synchronization using Truncated Mean and Whale Optimization for Cluster...
Clock Synchronization using Truncated Mean and Whale Optimization for Cluster...Clock Synchronization using Truncated Mean and Whale Optimization for Cluster...
Clock Synchronization using Truncated Mean and Whale Optimization for Cluster...
 
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
AN ENERGY-EFFICIENT AND SCALABLE SLOTBASED PRIVACY HOMOMORPHIC ENCRYPTION SCH...
 
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...
A N  E NERGY -E FFICIENT  A ND  S CALABLE  S LOT - B ASED  P RIVACY  H OMOMOR...A N  E NERGY -E FFICIENT  A ND  S CALABLE  S LOT - B ASED  P RIVACY  H OMOMOR...
A N E NERGY -E FFICIENT A ND S CALABLE S LOT - B ASED P RIVACY H OMOMOR...
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
 
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor NetworkAggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
 
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKSA STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
A STUDY ON RECEIVER BASED MULTICAST FOR WIRELESS SENSOR NETWORKS
 
Ed33777782
Ed33777782Ed33777782
Ed33777782
 
i2ct_submission_105
i2ct_submission_105i2ct_submission_105
i2ct_submission_105
 
Cn24588592
Cn24588592Cn24588592
Cn24588592
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Ijarcet vol-2-issue-7-2311-2318
Ijarcet vol-2-issue-7-2311-2318Ijarcet vol-2-issue-7-2311-2318
Ijarcet vol-2-issue-7-2311-2318
 

Viewers also liked (20)

Ex36918926
Ex36918926Ex36918926
Ex36918926
 
Eu36897901
Eu36897901Eu36897901
Eu36897901
 
Em36849854
Em36849854Em36849854
Em36849854
 
Fm3610071011
Fm3610071011Fm3610071011
Fm3610071011
 
Fl3610001006
Fl3610001006Fl3610001006
Fl3610001006
 
Ew36913917
Ew36913917Ew36913917
Ew36913917
 
Ey36927936
Ey36927936Ey36927936
Ey36927936
 
Ev36902912
Ev36902912Ev36902912
Ev36902912
 
Et36891896
Et36891896Et36891896
Et36891896
 
Fb36947950
Fb36947950Fb36947950
Fb36947950
 
Fc36951956
Fc36951956Fc36951956
Fc36951956
 
Es36888890
Es36888890Es36888890
Es36888890
 
Eq36876880
Eq36876880Eq36876880
Eq36876880
 
Giving thanks: Lessons from 100 days of gratitude
Giving thanks: Lessons from 100 days of gratitudeGiving thanks: Lessons from 100 days of gratitude
Giving thanks: Lessons from 100 days of gratitude
 
Er36881887
Er36881887Er36881887
Er36881887
 
Ez36937941
Ez36937941Ez36937941
Ez36937941
 
Aruna proximal humerus
Aruna proximal humerusAruna proximal humerus
Aruna proximal humerus
 
Principium pres sealaska_donna_nov27
Principium pres sealaska_donna_nov27Principium pres sealaska_donna_nov27
Principium pres sealaska_donna_nov27
 
Aborto.
Aborto.Aborto.
Aborto.
 
compartiendo recursos
compartiendo recursoscompartiendo recursos
compartiendo recursos
 

Similar to Fa36942946

A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...ijasuc
 
Fast Data Collection with Interference and Life Time in Tree Based Wireless S...
Fast Data Collection with Interference and Life Time in Tree Based Wireless S...Fast Data Collection with Interference and Life Time in Tree Based Wireless S...
Fast Data Collection with Interference and Life Time in Tree Based Wireless S...IJMER
 
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...Editor IJMTER
 
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...IJCI JOURNAL
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Reviewtheijes
 
J031101064069
J031101064069J031101064069
J031101064069theijes
 
Iaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion inIaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion inIaetsd Iaetsd
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Editor IJARCET
 
An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...
 An Efficient Approach for Data Gathering and Sharing with Inter Node Communi... An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...
An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...cscpconf
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...cscpconf
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Editor IJARCET
 
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...cscpconf
 

Similar to Fa36942946 (20)

A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
 
Fast Data Collection with Interference and Life Time in Tree Based Wireless S...
Fast Data Collection with Interference and Life Time in Tree Based Wireless S...Fast Data Collection with Interference and Life Time in Tree Based Wireless S...
Fast Data Collection with Interference and Life Time in Tree Based Wireless S...
 
D035418024
D035418024D035418024
D035418024
 
50120130406028 2
50120130406028 250120130406028 2
50120130406028 2
 
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
 
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...E FFICIENT  E NERGY  U TILIZATION  P ATH  A LGORITHM  I N  W IRELESS  S ENSOR...
E FFICIENT E NERGY U TILIZATION P ATH A LGORITHM I N W IRELESS S ENSOR...
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
 
J031101064069
J031101064069J031101064069
J031101064069
 
Iaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion inIaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion in
 
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581
 
An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...
 An Efficient Approach for Data Gathering and Sharing with Inter Node Communi... An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...
An Efficient Approach for Data Gathering and Sharing with Inter Node Communi...
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919
 
Ly3421472152
Ly3421472152Ly3421472152
Ly3421472152
 
Ly3421472152
Ly3421472152Ly3421472152
Ly3421472152
 
Ly3421472152
Ly3421472152Ly3421472152
Ly3421472152
 
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
 
Ttacca
TtaccaTtacca
Ttacca
 

Recently uploaded

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Fa36942946

  • 1. K. Swathi et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.942-946 RESEARCH ARTICLE www.ijera.com OPEN ACCESS Novel Approach for Dynamic Data Collection in Tree Based Wireless Sensor Networks K. Swathi1, Sk. Abdul Ali2 1. 2. M.Tech Scholar, Nimra Institute Of Engineering & Technlogy Associate Professor, Nimra Institute Of Engineering & Technlogy ABSTRACT In the wireless sensor networks the energy of the nodes present in the network is limited. Due to the low manufacturing costs of sensor nodes, they can be organized in large numbers and containing more challenges in routing, topology and data management protocols. These challenges are complicated by severe energy constraints and the inherently unreliable nature of wireless communications which have yielded work in increasing network efficiency. Our main objective is to increase the tolerance level and decrease the complexity of the wireless sensor network. In this primarily visualize time scheduling on a single frequency channel with the aim of reducing the number of time slots necessary to entire a convergecast. After we mingle scheduling with communication power control to moderate the effects of interference, and demonstrate that while power control helps in reducing the schedule length under a on its own frequency, forecast transmissions using several frequencies is more capable. We present lower bounds on the schedule length when interference is completely removed, and recommend algorithms that achieve these bounds. We also estimate the performance of different channel assignment methods, the use of multi-frequency scheduling can sufficient to eliminate most of the interference. After that the data collection rate increases by reducing the interference by the topology of the routing tree. Index Terms: Convergecast, Data Collection, Degree constrained spanning tree, Hybrid convergecast tree, Minimal Spanning Tree Time Division Multiple Access Scheduling I. INTRODUCTION Wireless sensor networks consist of distributed self-governing sensor nodes which are used in various applications areas such as health, home, military. Each node receives data from surroundings and it will forward the data to its base station. The location of each sensor node is not predetermined and each sensor nodes contains its own self organizing capabilities. The unique feature of sensor nodes is the cooperative effort of sensor nodes. As an unconventional of sending the raw data to the nodes responsible for the synthesis, sensor nodes make use of their processing capabilities to locally carry out simple computations and it will transmit only the required and partially processed data. Sensor nodes are used for continuous sensing, detecting events, event ID, and sensing the location. The sensor nodes are scattered in the sensor network. Each scattered sensor nodes has the ability to collect and route data to the sink. Fig.1: Self forming Wireless Sensor Networks Convergecast is the collection of data from a set of sensors toward a general sink over a tree based routing topology, is a primary operation in wireless sensor networks. In many applications, it is critical to offer a guarantee on the delivery time as well as increase the rate of such data collection. For example, in security and mission-critical applications where sensor nodes are organized to www.ijera.com 942 | P a g e
  • 2. K. Swathi et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.942-946 detect oil/gas leak or structural damage, the actuators and controllers need to take delivery of data from all the sensors within an exact deadline, failure of which might lead to unpredictable and catastrophic events. The other applications such as permafrost monitoring require periodic and fast data delivery over long periods of time, which falls beneath the grouping of permanent data collection. For periodic traffic, it is well known that contention free medium access control (MAC) protocols such as Time Division Multiple Access are better fit for fast data collection, since they can reduce collisions and retransmissions and provide guarantee on the completion time as divergent to contention-based protocols. The problem of building conflict free Time Division Multiple Access schedules even under the simple graph-based interference model has been proved to be NP-complete. In this work, we consider a DMA framework and design polynomial-time heuristics to minimize the schedule length for both types of convergecast. We furthermore find lower bounds on the achievable schedule lengths and compare the performance of our heuristics with these bounds. In Time Division Multiple Access schedule, time slotted and each slot is long enough to transmit and receive of a single packet. Hence the time slots are grouped as a non – overlapping frames and the schedule for each frame is repeated when the data collection is periodic. The main objective of Time Division Multiple Access design is to minimize schedule length, minimize Latency, minimizing energy consumption, maximizing capacity, maximizing fairness, minimizing communication costs, maximizing the parallel transmission, meeting deadlines, and minimizing interference. A Wireless sensor networks has small or no infrastructure. It contains of a number of sensor nodes which works together to monitor a region and it is used to obtain data about the environment. The Wireless sensor networks are classified into two types such as structured and unstructured. An unstructured WSN contains the dense collection of sensor nodes. The Sensor nodes are deployed in an ad hoc manner into the field. Once deployed, the network is kept unattended to perform monitoring and reporting functions. Hence network maintenance and failure detection is difficult since there are so many nodes. In structured network, all or some of the nodes are deployed in a pre planned manner. Due to small number of nodes network maintenance is easy and management cost is reduced. II. RELATED WORK Collecting data is the basic operation in wireless sensor networks. Collecting those data in a well-organized manner is more critical when compared to the performance of sensor networks. Each sensor will measure the values at regular time www.ijera.com www.ijera.com intervals and it will send that to sink node. The total collection of data is called as snapshot. Here the sensor network is a Time Division Multiple Access based network. In the past, the data collection capacity is based on large scale random networks, though most of the sensors are not deployed uniformly and the available sensors will not be as huge as in theory. For this purpose we have to know about the capacity of data collection in a network. The capacity of data collection shows how the sink collects data from sensor nodes quickly by considering its interference conditions. The upper and lower bounds for data collection capacity are constructed based on the protocol interference and disk graph models. A simple BFS tree based method is used to achieve the collection capacity which matches the upper bound. In sensor networks the packets generated by each and every node have to reach the sink. This many – to –one communication is known as convergecast. A Time Division Multiple Access schedule is used which minimizes the total time required to complete the convergecast. A simple version of problem is considered where every node generates exactly one packet. Yiin Zhang constructed a distributed scheduling algorithm for the tree networks that requires at most max(3nk – 1,N) time slots for convergecast, where nk corresponds to the maximum number of nodes in any sub tree and N represents the number of nodes in network. The Distributed scheduling algorithm requires at most 3N time slots in any network. The proposed simulation shows that the number of time slots required is about 1.5 N. Two bounds are required for the packets to be buffered at the node during convergecast. Sleep schedules for nodes are considered for conserve energy. It reduces the energy consumption by at least 50% Breadth first search tree is considered for convergecast scheduling. The problem of minimizing the schedule length for raw-data convergecast on single channel is shown to be NP-complete on general graphs. Maximizing the throughput of convergecast by finding a shortest-length, conflict-free schedule is studied, where a greedy graph coloring strategy assigns time slots to the senders and prevents interference and also discussed the impact of routing trees on the schedule length and proposed a routing scheme called disjoint strips to transmit data over different shortest paths. Though the sink remains as the restricted access, sending data over different paths does not reduce the schedule length. The improvement due to the routing structure comes from using capacitated minimal spanning trees for raw-data convergecast, where the number of nodes in a sub tree is no additional than half the total number of nodes in the remaining sub trees. 943 | P a g e
  • 3. K. Swathi et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.942-946 III. TDMA SCHEDULING OF CONVERGECASTS 3.1 Periodic Aggregated Convergecast In this consider the scheduling problem where packets are aggregated. Data aggregation is a frequently used technique in Wireless Sensor Networks that can eliminate redundancy and minimize the number of transmissions, thus reduction energy and humanizing network lifetime. Aggregation can be achieved in a lot of ways, such as by restraining carbon copy messages; using data compression and packet merging techniques; or taking advantage of the correlation in the sensor readings. We reflect on continuous monitoring applications where perfect aggregation is possible and each node is capable of aggregating all the packets received from its children in addition to that produced by itself into a single packet before transmitting to its parent. The amount of aggregated data transmitted by each node is constant and does not depend on the size of the raw sensor readings. Usual examples of such aggregation functions are MIN, MEDIAN, MAX, AVERAGE, COUNT, etc. www.ijera.com that at the last part of frame 1, the sink does not contain packets from nodes 5 and 6; however, as the schedule is repeated, it accepts aggregated packets from 2, 5, and 6 in slot 2 of the next frame. In the same way, the sink also receives aggregated packets from nodes 1 and 4 opening from slot 1 of frame 2. The entries {1, 4} and {2, 5, 6} in the table represent single packets including aggregated data from nodes 1 and 4, and from nodes 2, 5, and 6, correspondingly. Thus, a pipeline is recognized from frame 2, and the sink goes on to receive aggregated packets from all the nodes once every 6 time slots. Thus, the minimum schedule length is 6. 3.2. Assignment of Timeslots In every iteration of BFS-TIMESLOT ASSIGNMENT (lines 2-6), an edge e is chosen in the Breadth First Search (BFS) order starting from any node, in addition to is allocated the minimum time slot that is different from all its adjacent edges respecting intrusive restrictions. Note that, since we calculate the performance of this algorithm also for the case when the interfering links are present, we make sure for the corresponding constraint in line 4; on the other hand, when interference is removed this check is redundant. The algorithm runs in O(|ET |2) time and minimizes the schedule length when there are no intrusive links and demonstrate the same network of 1(a) in 1(c) with all the interfering links removed, and so the network is scheduled in 3 time slots. Fig.2: Aggregated convergecast and pipelining: (a) Schedule length of 6 in the presence of interfering links. (b) Node ids from which (aggregated) packets are received by their corresponding parents in each time slot over different frames. (c) Schedule length of 3 using BFSTIMESLOTASSIGNMENT when all the interfering links are eliminated. In above Fig. 1(a) and 1(b), illustrates the notion of pipelining in aggregated convergecast and that of a schedule length on a network of 6 source nodes. The hard lines correspond to tree edges, and the scattered lines represent interfere links. The numbers nearby the links correspond to the time slots at which the links are programmed to broadcast, and the numbers within the circles represent node ids. The accesses in the table list the nodes from which packets are received by their corresponding receivers in each time slot. We note www.ijera.com IV. MULTI-CHANNEL SCHEDULING Multi-channel communication is an efficient method to eliminate interference by enabling concurrent transmissions over different frequencies. Although typical Wireless Sensor Networks radios operate on a limited bandwidth, their working frequencies can be in the swing of things, thus allowing more simultaneous transmissions and faster data delivery. At this time, we think about fixed-bandwidth channels, which are typical of Wireless Sensor Networks radios, as opposed to the possibility of improving link bandwidth by consolidating frequencies. We explain three channel assignment methods that consider the problem at different levels allowing us to study their pros and cons for both types of convergecast. These methods regard as the channel assignment problem at different levels: the link level (JFTSS), node level (RBCA), or cluster level (TMCP). 944 | P a g e
  • 4. K. Swathi et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.942-946 4.1 Joint Frequency Time Slot Scheduling (JFTSS) Joint Frequency Time Slot Scheduling presents a greedy combined solution for constructing a maximal schedule, such that a schedule is called to be maximal if it meets the adjacency and inquisitive constraints, and no more links can be scheduled for synchronized transmissions on any time slot and channel exclusive of breaching the constraints. Joint Frequency Time Slot Scheduling schedules a network starting from the link that has the highest number of packets (load) to be transmitted. While the connection loads are equal, while in aggregated convergecast, the most inhibited ink is measured first, i.e., the link for which the number of other links breaching the interfering and adjacency restriction when scheduled at the same time is the highest. The algorithm starts with an empty schedule and first sorts the links according to the loads or constraints. The mainly loaded or unnatural link in the first accessible slot-channel pair is scheduled first and added to the schedule. All the links that have an adjacency restriction with the programmed link are expelled from the list of the links to be scheduled at a given slot. The links with the purpose of do not have an interfering restriction with the scheduled link can be programmed in the same slot and channel while the links that have an inquisitive constraint should be scheduled on dissimilar channels, if achievable. The algorithm continues to schedule the links according to the most loaded (or most constrained) metric. nodes with the BFSTimeSlot Assignment algorithm. The advantage of TMCP is that it is designed to support convergecast traffic and does not require channel switching. Though, disputation inside the branches is not determined since all the nodes on the same branch communicate on the same channel. 4.3. Receiver-Based Channel Assignment (RBCA) In Receiver-Based Channel Assignment, the children of a common parent transmit on the same channel. Each node in the tree, consequently, operates on at most two channels, therefore avoiding pair-wise, per-packet, channel negotiation expenses. The algorithm initially assigns the same channel to all the receivers. Then, for each receiver, it creates a set of interfering parents based on SINR thresholds and iteratively assigns the next available channel starting from the most interfered parent (the parent with the highest number of interfering links). However, due to adjacent channel overlaps, SINR values at the receivers may not always be high enough to tolerate interference, in which case the channels are assigned according to the ability of the transceivers to reject interference. We proved approximation factors for Receiver-Based Channel Assignment when used with greedy scheduling in. Initially all nodes are on frequency F1. ReceiverBased Channel Assignment starts with the most interfered parent, node 2 in this example, and assigns F2. Then it continues to assign F3 to node 3 as the second most interfered parent. Since all interfering parents are assigned different frequencies sink can receive on F1. V. Fig.3: Scheduling with multi-channels for aggregated convergecast: (a) Schedule generated with JFTSS. (b) Schedule generated with TMCP. (c) Schedule generated with RBCA. (b) Schedule generated with RBCA. 4.2 Tree-Based Multi-Channel Protocol (TMCP) Tree-Based Multi-Channel Protocol is a greedy, tree-based, multi-channel protocol for data collection applications. It separation the network into several sub trees and minimizes the intra tree interference by assigning dissimilar channels to the nodes residing on unlike branches starting from the top to the bottom of the tree. The nodes on the leftmost branch is allocated frequency F1, subsequent branch is allocated frequency F2 and the last branch is allocated frequency F3 and after the channel assignments, time slots are allocated to the www.ijera.com www.ijera.com EVALUATION We deploy nodes randomly in a region whose dimensions are varied between 20 × 20 m2 and 300 × 300 m2 to simulate different levels of density. The number of nodes is kept fixed at 100. For different parameters, we average each point over 1000 runs. We use an exponential path-loss model for signal propagation with the path-loss exponent α varying between 3 and 4, which is typical for indoor environments. We also use the physical interference model and simulate the behavior of CC2420 radios that are used on Telosb and TmoteSky motes and are capable of operating on 16 different frequencies. The transmission power can be adjusted between −24 dBm and 0 dBm over 8 different levels, and the SINR threshold is set to β = −3 dB1. We first evaluate the schedule length for single-channel TDMA, and then its improvement using transmission power control, multiple channels, and routing trees. 5.1. Aggregated Convergecast It shows the variation of schedule length with density for different values of α on minimumhop tree. We observe that the schedule length decreases as the deployment gets sparser. This 945 | P a g e
  • 5. K. Swathi et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.942-946 happens because at low densities the interference is less, and so more concurrent transmissions can take place. In the densest deployment (L = 20) when all the nodes are within the range of each other, the sink is the only parent, and the network is scheduled in 99 time slots regardless of power control. However, in sparser scenarios, using power control the network can be scheduled with fewer time slots as the level of interference goes down. We achieve a 10 − 20% reduction in schedule length for the best case. Fig.4: Scheduling on minimum-hop trees with multiple channels: (a) Aggregated convergecast. (b) Raw-data convergecast. 5.2. Raw Data Convergecast It shows the variation of schedule length on CMST. The impact of such routing trees is more prominent in sparser networks (L ≥ 200) than routing over minimum-hop spanning trees. When L < 200, the length is bounded by N. Beyond this point, it is almost always not possible to construct trees where the constraint 2nk−1 < N holds. In such cases, the schedule length is some degree of by 2nk − 1. VI. CONCLUSION Wireless sensor networks can be used in various applications areas. A sensor networks consists of large number of nodes and the location of each sensor nodes is predetermined. By using TDMA, the nodes communicate on different time slots in order to prevent conflicts. In order to improve the data collection the capacity at each node is adjusted whenever the packet moves from one sensor node to another sensor node. . A hybrid convergecast tree is projected for transmitting the packets with minimum cost for long suited nodes. Fast convergecast in Wireless Sensor Networks where nodes communicate using a TDMA protocol minimize the schedule length. We deal with the fundamental limitations due to interference and halfduplex transceivers on the nodes and explored techniques to overcome the same. We set up that while transmission power control helps in reducing the schedule length, multiple channels are more effective and also observed that node-based (RBCA) and link-based (JFTSS) channel assignment schemes are more efficient in terms of eliminating www.ijera.com www.ijera.com interference as compared to assigning different channels on different branches of the tree (TMCP). REFERENCES [1] S. Gandham, Y. Zhang, and Q. Huang, “Distributed time optimal scheduling for converge cast in wireless sensor networks,” Computer Networks, vol. 52, no. 3, pp. 610–629, 2008. [2] K. K. Chintalapudi and L. Venkatraman, “On the design of mac protocols for lowlatency hard real-time discrete control applications over 802.15.4 hardware,” in IPSN ’08, pp. 356–367. [3] I. Talzi, A. Hasler, S. Gruber, and C. Tschudin, “Permasense: investigating permafrost with a wsn in the swiss alps,” in EmNets ’07, Cork, Ireland, pp. 8–12. [4] S. Upadhyayula and S. Gupta, “Spanning tree based algorithms for low latency and energy efficient data aggregation enhanced convergecast (dac) in wireless sensor networks,” Ad Hoc Networks, vol. 5, no. 5, pp. 626–648, 2007. [5] O. D. Incel and B. Krishnamachari, “Enhancing the data collection rate of treebased aggregation in wireless sensor networks,” in SECON ’08, San Francisco, CA, USA, pp. 569–577. [6] Y. Wu, J. Stankovic, T. He, and S. Lin, “Realistic and efficient multi-channel communications in wireless sensor networks,” in INFOCOM ’08, pp. 1193– 1201. [7] A. Ghosh, O. D. Incel, V. A. Kumar, and B. Krishnamachari, “Multi-channel scheduling algorithms for fast aggregated convergecast in sensor networks,” in MASS ’09, Macau, China. [8] V. Annamalai, S. Gupta, and L. Schwiebert, “On tree-based convergecasting in wireless sensor networks,” in WCNC ’03, vol. 3, pp. 1942– 1947. [9] X. Chen, X. Hu, and J. Zhu, “Minimum data aggregation time problem in wireless sensor networks,” in MSN ’05, pp. 133– 142. [10] H. Choi, J. Wang, and E. Hughes, “Scheduling for information gathering on sensor network,” Wireless Networks (Online), 2007. 946 | P a g e