SlideShare a Scribd company logo
1 of 5
Download to read offline
Kakelli Anil Kumar et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 12, (Part - 3) December 2015, pp.34-38
www.ijera.com 34 | P a g e
Interference Minimization Protocol in Heterogeneous Wireless
Sensor Network for High Quality Data Transmission
Kakelli Anil Kumar*, Dr. Addepalli VN Krishna**, Dr. K. Shahu
Chatrapati***
*Associate Professor, Department of CSE, Indore Institute of Science and Technology, RGPV, Indore, MP,
India, 453331,
**Professor& Head, Department of CSE, Navodaya Institute of Technology, Raichur, KA, India, 584103,
***Associate Professor& Head, Department of CSE, COE, Manthani, Jawaharlal Nehru Technological
University, Hyderabad, TS, India, 505212,
ABSTRACT
High-quality data transmission is the primary objective of WSN for achieving quality of service.
Heterogeneous wireless sensor networks (HTWSN) can be used to deploy in sensitive and unmanned areas
to monitor the objects. HTWSN is high configured network used to capture high-quality images and videos
of targeted objects. During the data transmission in HTWSN, we identified that, the formation of
interference with in the network due to link capacity overhead. Due to that, the quality data transmission is
not possible through the network. In this research paper, we described the deployment of HTWSN network
and identifying the primary sources for interference and introducing the proposed Interference
Minimization Protocol (IMP). The IM protocol has achieved better quality of service by minimizing the
interference in HTWSN.
Keywords – Wireless Sensor Networks, Interference Minimization Protocol, Heterogeneous WSN.
I. INTRODUCTION
Wireless sensor network (WSN) is an emerging
technology consists of small sensor nodes having
low power, limited communication and computing
capabilities. Heterogeneous and homogeneous are
two modes of deployments in WSN. Heterogeneous
WSN (HTWSN) is having distinct configured sensor
nodes which are highly effective and economical for
military applications as compared to homogeneous
WSN (HOWSN). HOWSN is having low configured
sensor nodes which may not handles complex events
for longer duration. HTWSN consist of few sensors
are highly capable in terms of sensing, computation,
wireless communication. These nodes are having
electro optic capability [1] to capture the images and
videos of sensor targeted objects [2]. Large numbers
of low configured sensors are deployable as
intermediate nodes (IN) in HTWSN. All these
devices cooperatively establish the HTWSN to
monitor targeted objects from remote locations and
transmit the sensed data to destination node (DN)
over flexible network architecture. However,
interference is the major problem results data
collision, high packet drop and high end to end delay
and minimization of network life time. Due to the
interference [3], the HTWSN will become useless
for user community.
II. RELATED WORK
Jenn-yue Teo [1] proposed I2MR protocol for
minimization of interference by discovering the node
dis-joint multiple paths for load balancing. Gerla and
Xu [2] propose the deployment of large-scale sensor
network with deployment of Unmanned Air Vehicle
(UAV) for high rate of streamlining in WSN. Jain et
al [3] considered the effects of interference in
wireless sensor networks. Pearlman et al [4]
demonstrated benefits of multipath load balancing
for multichannel wireless networks. Nguyen et al
had given [5] the electric field lines to select
physically separated paths for multi load balancing.
Based on the review of all these related works, we
propose interference minimization protocol in
HTWSN.
III. HTWSN DEPLOYMENT
Large numbers of low capable sensor nodes
(LCSN) and few number of high capable sensor
nodes (EOSN) are air dropped into area of operation
(AO). The nodes can establish the network with
provided bandwidth and frequency by unmanned air
vehicle (UAV) or base station. The High-power
gateway sensor nodes (HPGSN) are known as DN or
sink nodes are located near the HTWSN to receive
the data to forward the control station (CS). DN
nodes are capable of linking up the ground HTWSN
and UAV. When targeted objects may enter into the
AO, EOSN of respective location can start to capture
RESEARCH ARTICLE OPEN ACCESS
Kakelli Anil Kumar et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 12, (Part - 3) December 2015, pp.34-38
www.ijera.com 35 | P a g e
the images of the enemy object images of object.
This information can forward to the DN through
LCSN in multi hop mode through the shortest routes
for efficient load balancing [4]. The data DN
receives the data from HTWSN and forwards to
control station (CS) through UAV. The received data
at CS can helps to take intelligent decisions.
IV. PROBLEM STATEMNT
4.1 Identifying Interference in Heterogeneous
WSN
After deployment of HTWSN, source nodes
(SNs) can start the sensing the enemy objects’ data.
The SNs can send the data packets to intermediate
nodes (INs) which are in the active route towards
DN. The IN nodes receive the data and send to DN
through multi hop mode. Due to simultaneous data
packets transmission by multiple SNs to
intermediate nodes, the interference can exists at any
IN with in the network. Because all the nodes within
the network are sharing same wireless medium.
Once if any node experiences the interference, it can
lose its healthy physical properties like quick
discharge of battery, poor performance, high packet
dropping and high end to end data delivery [13].
Consider the network with two sender nodes SN 1
and SN2 , IN n is intermediate nodes DN sensor
nodes, CL n is communication links between nodes,
RP n is routing path and total number of nodes are N.
N= 𝛴(SN n + IN n) where n>=1 (1)
RP (SN n to DN) = , n >= 1 (2)
Node level interference [14] is Ω and estimated
based on the link capacity α between the node N i
and its sender node SN i. α is estimated as
α = 1/ (Ps + As) (3)
Ps is the number of packets successfully transmitted
through the link and As is number of successful
acknowledgements received by SN I from N i. if the
data packet delivery through the link is beyond its
capacity leads to interference. So each node with in
the network should have to estimate the required
number of data packets to transmit through the link
based on the pre estimated link capacity. The data
packet delivery overhead over link is β, δ is the total
number of packets transmitted during the data
delivery process, γ is the number of data packets
successfully received at receiver node. β = δ / γ
where β=1. If the β is exceeding the value 1 which
indicates the link between the two sensor nodes are
experiencing interference.
V. INTERFERENCE MINIMIZATION
PROTOCOL (IMP)
IMP in heterogeneous Wireless Sensor
Network can efficiently estimates the link capacity
of each link between the any nodes. IM protocol can
consider the following assumption as static
HTWSN, location of SN and DN are known, single
radio channel and uniform transmission range for all
the sensor nodes. The IM protocol can estimate the
link quality of each link which is exists between the
nodes in active route. Based on the link quality
factor, the nodes can estimates the required number
of data packets delivery through the link to its
neighboring nodes. The data delivery ratio Π = γ / δ.
When simultaneous data transmission takes place
through routing paths within the network, the nodes
and their communication links are affecting highly
with interference [9]. IM protocol can estimates the
interference factor on each link [8]. Based on the
estimation of IF value for the link, the IM protocol
can decides the number of data packets can be
released through it. When the nodes IF value is
higher than defined threshold value of the link, IM
protocol concludes the link is poor quality link.
Many routing protocols like AODV [7], DSR,
DSDV and I2MR don not consider the link quality
during the data delivery phase. Even though the
efficient route established in WSN, but link quality
will not consider which results poor quality of
service [12]. However, IM protocol identifies the
total number of nodes N and their communication
links CL n. There are three types of links active,
passive and hybrid. Active link is communication
links in between the active nodes, whereas passive
link quality means communication links between the
nodes which are not involving in the route. Hybrid
links means the links between active and passive
nodes. IM protocol can mainly focus on the active
links. The sender node communication area is CA.
The CA can be divided in to three equal regions as
CA1, CA2, CA3. The sender sensor node estimates the
distance D from itself to receiver node. If D value is
0>=D<= CA1, the sender node can have good
communication link and D value is CA1>=D<= CA2,
the communication links is moderate. D value is
CA2>=D<= CA3, the communication links is weak.
IM protocol prefers the moderate communication
links MCL n to maintain the better communication
link quality and optimized routes. During the
neighbor node discovery phase, nodes can start the
identification of each node within the network. In
this phase the Hello message can be broadcast in the
network. T1 is the time of Hello message sent by the
sender node. T2 is the tome of reply Hello message
received by sender node form receiver node.
TD = T2- T1 (4)
Kakelli Anil Kumar et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 12, (Part - 3) December 2015, pp.34-38
www.ijera.com 36 | P a g e
If TD is higher than threshold time TT the link quality
of MCL n is low MCL L. The TD is equals to TT the
link quality moderate MCL M and TD is less than TT,
the link quality is high MCL H. So IM protocol is
prefers the MCL H for high quality data delivery. But
many times high quality links may not available
within the network for route constructions. During
the situation, it is highly essential to estimate the
link capacity. The link capacity α can estimate
through equation 3.
VI. RESULT ANALASIS
All of our experiments are conducted based
on simulations with static heterogeneous wireless
sensor network. IM protocol is implemented in
GloMoSim simulator [15]. Consider the scenario
with heterogeneous sensor nodes in 1000*1000
terrain area dimension. The type of deployment is
random deployment and no mobility of the nodes.
The propagation limit is -111.0; noise level is 10 and
radio type is used as RADIO-Accnoise, which is
stander radio model and available bandwidth is
244.14KB, frequency 2.4 GHz ISM. The routing
protocol is interference minimization protocol (IMP)
where the interference zone hot spot nodes and links
are identified in HTWSN. With this mechanism, the
energy consumption and traffic load is minimized.
Figure 1, describes the interference level at node in
the network without IM protocol by introducing
single and multiple events in to the network. We
observed that, the nodes experienced high
interference. Figure 4, represents the interference
minimization with IM protocol at node and link
level. IM protocol has given satisfactory results for
single and multiple events during high traffic
conditions also. The energy consumption can also
estimate at each node with the IM protocol and with
IM protocol. Figure 3 and 4 are represents the
energy preservation with IM protocol. IM protocol
has given satisfactory results to extend the network
lifetime.
Fig 1. Interference level of a sensor node in HTWSN with single
events (blue color) and multi events (red color)
Fig: 2 Energy Consumption due to interference with single events
(blue color) and multi events (red color)
Fig: 3 Energy Consumption with IM protocol in HTWSN with
single events (blue color) and multi events (red color)
Fig: 4 Interference minimization with IM protocol in HTWSN
with single events (blue color) and multi events (red color)
VII. CONCLUSION AND FUTURE
DIRECTIONS
Interference minimization protocol (IMP) has
implemented successfully for heterogeneous WSN
environment. It is tested with various simulation
parameters like single and multiple events detection.
The IM protocol has given satisfactory results in
terms of energy saving and performance in
heterogeneous WSN environment at variable data
traffic load. We are extending our research work on
the proposed protocol to improve the performance
by increasing the node density up to 500 nodes.
REFERENCES
[1] Jenn-yue teo,yajun Ha and chen- knong tham,
Interferences minimization multipath Routing
with congestion control in Wireless sensor
network for highrate streaming, IEEE
transactions on mobile computing, Vol 7,
No.9, 2008.
[2] Mario Gerla, Kaixin Xu, Multimedia
streamlining in large scale sensor networks
Kakelli Anil Kumar et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 12, (Part - 3) December 2015, pp.34-38
www.ijera.com 37 | P a g e
with mobile swarms, SIGMOD, Vol 32, no.4,
2003.
[3] K. Jain, J. Pandhye, V.N.Padmanabhan and L.
Qiu, Impact of Interference on multihop
wireless networks, In: Proc MOBICOM’03,pp
66-80, 2003.
[4] M.R Pearlman, Z.J.Hass, P.Sholander and
S.S.Tabizi, On the impact of alternative path
routing for load balancing for mobile ad_hoc
networks, In: Proc MOBIHOC’00,pp3-10,
2000.
[5] N.T. Nguyen, A.-I.A. Wang, P. Reiher, and
G. Kuenning, Electric Field-Based Routing:
A Reliable Framework for Routing in
Manets, SIGMOBILE Mobile Computing and
Comm. Rev., vol. 8, 2004.35-49
[6] Y. Wang, H. Lin, and S. Chang, Interference
on Multipath QoS Routing for Ad Hoc
Wireless Network, in ICDCSW'04, IEEE
Computer Society, 2004, pp. 104-109.
[7] M. K. Marina and S. R. Das, Ad hoc On-
demand Multipath Distance Vector Routing,
Wireless Communications and Mobile
Computing, vol. 6, no. 7, 2006, pp. 969–988.
[8] P. Agrawal and G.K. Das, Improved
Interference in Wireless Sensor Networks,
Distributed Computing and Internet
Technology, 2013, pp. 92-102.
[9] P. Von Rickenbach, R. Wattenhofer, and A.
Zollinger, Algorithmic models of interference
in wireless ad hoc and sensor networks,
IEEE/ACM Transactions on Networking
(TON), vol. 17, 2009, pp. 172-185.
[10] T. M. Chiwewe and G. P. Hancke, A
distributed topology control technique for low
interference and energy efficiency in wireless
sensor networks, Industrial Informatics, IEEE
Transactions on, vol. 8, 2012, pp. 11-19.
[11] H.Huang, G.Hu, F.Yu, and Z.Zhang, Energy-
aware interferencesensitive geographic routing
in wireless sensor networks, Communications,
IET, vol. 5, 2011, pp. 2692-2702.
[12] M. A. Hassan and A. Chickadel, “A review of
interference reduction in wireless networks
using graph coloring methods,” International
Journal on application of graph theory in
wireless adhoc networks and sensor networks
(GRAPHHOC), 2011, 58-67.
[13] P. Cardieri, Modelling interference in wireless
ad hoc networks, IEEE Communications
Surveys & Tutorials, 2010; 12(4): 551-572.
[14] T. M. Chiwewe, and G. P. Hancke, A
distributed topology control technique for low
interference and energy efficiency in wireless
sensor networks, IEEE Transactions on
Industrial Informatics, 2012; 8(1): 11-19.
[15] Xiang Zeng, Rajive Bagrodia, and Mario
Gerla. Glomosim: a library for parallel
simulation of large-scale wireless networks. In
PADS ’98: Proceedings of the twelfth
workshop on Parallel and distributed
simulation, Washington, DC, USA, IEEE
Computer Society, 1998, pp 154–161.
Author's Biography
First A. Kakelli Anil Kumar is
working as Associate Professor,
Department of Computer
Science and Engineering, Indore
Institute of Science and
Technology, Indore, Madhya
Pradesh, India. He was received
M. Tech degree in 2009 in Computer Science and
Engineering with specialization of Software
Engineering from Jawaharlal Nehru Technological
University, Hyderabad, TS, India. He is currently
working towards a Ph.D. degree at the Department
of Computer Science and Engineering, Jawaharlal
Nehru Technological University, Hyderabad, TS,
India. His current research interests include protocol
design, security, high quality data transmissions and
cross layer design in wireless sensor networks,
Mobile ad_hoc Networks, wireless communications
and mobile computing.
Second B. Dr. Addepalli VN
Krishna is working as Professor
and Head, Computer Science
and Engineering department at
Navodaya Institute Technology,
Raichur, KA, India. He received
Ph. D in 2010 at Department of
Computer Science and engineering, Acharya
Nagarjuna University, AP, India and M. Tech degree
in 2001, at department of Computer Science and
Engineering, Birla Institute of Technology, Mesra,
Ranchi, India. He is having 24 years of teaching
experience at under and postgraduate engineering
level and guiding 6 Ph. D research scholars from
reputed universities in India. He published 25
research papers in national and international journals
and 9 research papers in national and international
conferences. His current research interest includes
security algorithm design in wireless sensor
networks, advanced key management algorithms for
computer security and protocol design for network
security.
Kakelli Anil Kumar et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 5, Issue 12, (Part - 3) December 2015, pp.34-38
www.ijera.com 38 | P a g e
Third C. Dr. K. Shahu
Chatrapati is working as
Associate Professor and Head
of the Department, Computer
Science and Engineering
department at College of
Engineering, Manthani,
Jawaharlal Nehru Technological University,
Hyderabad, TS, India. He is having 13 years of
teaching experience at under and postgraduate
engineering level and guiding 6 Ph. D research
scholars from reputed universities in India. He
published 15 research papers in national and
international journals and conferences. He organized
various conferences and workshops at JNTUCEM
on ethical hacking, robotics with the collaboration of
IIT Kharagpur and Advances in Computing and
Networking sponsored by CSI. His current research
interest includes Compilers, Theory of Automata,
and Distributed Computing.

More Related Content

What's hot

Performance Analysis of Routing Metrics for Wireless Sensor Networks
Performance Analysis of Routing Metrics for Wireless Sensor NetworksPerformance Analysis of Routing Metrics for Wireless Sensor Networks
Performance Analysis of Routing Metrics for Wireless Sensor NetworksIJMER
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Journals
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...eSAT Publishing House
 
1 p pranitha final_paper--1-5
1 p pranitha final_paper--1-51 p pranitha final_paper--1-5
1 p pranitha final_paper--1-5Alexander Decker
 
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...IRJET Journal
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNpaperpublications3
 
Survey on dynamic source routing, attacks and counter measures in wireless se...
Survey on dynamic source routing, attacks and counter measures in wireless se...Survey on dynamic source routing, attacks and counter measures in wireless se...
Survey on dynamic source routing, attacks and counter measures in wireless se...eSAT Publishing House
 
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...ijeei-iaes
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationPerformance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationIDES Editor
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...eSAT Journals
 
Heterogeneous heed protocol for wireless sensor networks springer
Heterogeneous heed protocol for wireless sensor networks   springerHeterogeneous heed protocol for wireless sensor networks   springer
Heterogeneous heed protocol for wireless sensor networks springerRaja Ram
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKIJNSA Journal
 
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...Munisekhar Gunapati
 

What's hot (18)

Ns2 x graphs
Ns2 x graphsNs2 x graphs
Ns2 x graphs
 
40120130406013
4012013040601340120130406013
40120130406013
 
Performance Analysis of Routing Metrics for Wireless Sensor Networks
Performance Analysis of Routing Metrics for Wireless Sensor NetworksPerformance Analysis of Routing Metrics for Wireless Sensor Networks
Performance Analysis of Routing Metrics for Wireless Sensor Networks
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
 
Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...Intrusion detection in heterogeneous network by multipath routing based toler...
Intrusion detection in heterogeneous network by multipath routing based toler...
 
1 p pranitha final_paper--1-5
1 p pranitha final_paper--1-51 p pranitha final_paper--1-5
1 p pranitha final_paper--1-5
 
47 50
47 5047 50
47 50
 
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
An Extensive Literature Review of Various Routing Protocols in Delay Tolerant...
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
 
Survey on dynamic source routing, attacks and counter measures in wireless se...
Survey on dynamic source routing, attacks and counter measures in wireless se...Survey on dynamic source routing, attacks and counter measures in wireless se...
Survey on dynamic source routing, attacks and counter measures in wireless se...
 
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationPerformance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...
 
Heterogeneous heed protocol for wireless sensor networks springer
Heterogeneous heed protocol for wireless sensor networks   springerHeterogeneous heed protocol for wireless sensor networks   springer
Heterogeneous heed protocol for wireless sensor networks springer
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
 
Hu3114871491
Hu3114871491Hu3114871491
Hu3114871491
 
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
LOAD BALANCED CLUSTERING WITH MIMO UPLOADING TECHNIQUE FOR MOBILE DATA GATHER...
 

Viewers also liked

Finger Movement Based Wearable Communication & Navigation Aid for partially d...
Finger Movement Based Wearable Communication & Navigation Aid for partially d...Finger Movement Based Wearable Communication & Navigation Aid for partially d...
Finger Movement Based Wearable Communication & Navigation Aid for partially d...IJERA Editor
 
Trace Analysis of Driver Behavior on Traffic Violator by Using Big Data (Traf...
Trace Analysis of Driver Behavior on Traffic Violator by Using Big Data (Traf...Trace Analysis of Driver Behavior on Traffic Violator by Using Big Data (Traf...
Trace Analysis of Driver Behavior on Traffic Violator by Using Big Data (Traf...IJERA Editor
 
Crystal Growth and Studies of Dihydrogen Phosphates of Potassium and Ammonium...
Crystal Growth and Studies of Dihydrogen Phosphates of Potassium and Ammonium...Crystal Growth and Studies of Dihydrogen Phosphates of Potassium and Ammonium...
Crystal Growth and Studies of Dihydrogen Phosphates of Potassium and Ammonium...IJERA Editor
 
Mechanical Properties of Concrete with Marine Sand as Partial Replacement of ...
Mechanical Properties of Concrete with Marine Sand as Partial Replacement of ...Mechanical Properties of Concrete with Marine Sand as Partial Replacement of ...
Mechanical Properties of Concrete with Marine Sand as Partial Replacement of ...IJERA Editor
 
Maximum PowerPoint Tracking of PV System Based on a SEPIC Converter Using Fuz...
Maximum PowerPoint Tracking of PV System Based on a SEPIC Converter Using Fuz...Maximum PowerPoint Tracking of PV System Based on a SEPIC Converter Using Fuz...
Maximum PowerPoint Tracking of PV System Based on a SEPIC Converter Using Fuz...IJERA Editor
 
Comparison of Cell formation techniques in Cellular manufacturing using three...
Comparison of Cell formation techniques in Cellular manufacturing using three...Comparison of Cell formation techniques in Cellular manufacturing using three...
Comparison of Cell formation techniques in Cellular manufacturing using three...IJERA Editor
 
Machining of Aircraft Bearing Rings using High Quality Bearing Steel
Machining of Aircraft Bearing Rings using High Quality Bearing SteelMachining of Aircraft Bearing Rings using High Quality Bearing Steel
Machining of Aircraft Bearing Rings using High Quality Bearing SteelIJERA Editor
 
Developing an Environmentally Sustainable Hot Mix Asphalt Using Recycled Conc...
Developing an Environmentally Sustainable Hot Mix Asphalt Using Recycled Conc...Developing an Environmentally Sustainable Hot Mix Asphalt Using Recycled Conc...
Developing an Environmentally Sustainable Hot Mix Asphalt Using Recycled Conc...IJERA Editor
 
Transient Stability Analysis of IEEE 9 Bus System in Power World Simulator
Transient Stability Analysis of IEEE 9 Bus System in Power World SimulatorTransient Stability Analysis of IEEE 9 Bus System in Power World Simulator
Transient Stability Analysis of IEEE 9 Bus System in Power World SimulatorIJERA Editor
 
FEA based Dissipation Energy and Temperature Distribution of Rubber Bushing
FEA based Dissipation Energy and Temperature Distribution of Rubber BushingFEA based Dissipation Energy and Temperature Distribution of Rubber Bushing
FEA based Dissipation Energy and Temperature Distribution of Rubber BushingIJERA Editor
 
Seismic Drift Control in soft storied RCC buildings
Seismic Drift Control in soft storied RCC buildingsSeismic Drift Control in soft storied RCC buildings
Seismic Drift Control in soft storied RCC buildingsIJERA Editor
 
Studying nanotube-based oscillators and their application as memory cells via...
Studying nanotube-based oscillators and their application as memory cells via...Studying nanotube-based oscillators and their application as memory cells via...
Studying nanotube-based oscillators and their application as memory cells via...IJERA Editor
 
Investigation of Significant Process Parameter in Manganese Phosphating of Pi...
Investigation of Significant Process Parameter in Manganese Phosphating of Pi...Investigation of Significant Process Parameter in Manganese Phosphating of Pi...
Investigation of Significant Process Parameter in Manganese Phosphating of Pi...IJERA Editor
 
Strategies of detecting Profile-injection attacks in E-Commerce Recommender S...
Strategies of detecting Profile-injection attacks in E-Commerce Recommender S...Strategies of detecting Profile-injection attacks in E-Commerce Recommender S...
Strategies of detecting Profile-injection attacks in E-Commerce Recommender S...IJERA Editor
 
from Ruby to Objective-C
from Ruby to Objective-Cfrom Ruby to Objective-C
from Ruby to Objective-CEddie Kao
 
Synthesis, Characterization and Electrical Properties of Polyaniline Doped wi...
Synthesis, Characterization and Electrical Properties of Polyaniline Doped wi...Synthesis, Characterization and Electrical Properties of Polyaniline Doped wi...
Synthesis, Characterization and Electrical Properties of Polyaniline Doped wi...IJERA Editor
 
Hypothesis on Different Data Mining Algorithms
Hypothesis on Different Data Mining AlgorithmsHypothesis on Different Data Mining Algorithms
Hypothesis on Different Data Mining AlgorithmsIJERA Editor
 

Viewers also liked (20)

Finger Movement Based Wearable Communication & Navigation Aid for partially d...
Finger Movement Based Wearable Communication & Navigation Aid for partially d...Finger Movement Based Wearable Communication & Navigation Aid for partially d...
Finger Movement Based Wearable Communication & Navigation Aid for partially d...
 
Trace Analysis of Driver Behavior on Traffic Violator by Using Big Data (Traf...
Trace Analysis of Driver Behavior on Traffic Violator by Using Big Data (Traf...Trace Analysis of Driver Behavior on Traffic Violator by Using Big Data (Traf...
Trace Analysis of Driver Behavior on Traffic Violator by Using Big Data (Traf...
 
Crystal Growth and Studies of Dihydrogen Phosphates of Potassium and Ammonium...
Crystal Growth and Studies of Dihydrogen Phosphates of Potassium and Ammonium...Crystal Growth and Studies of Dihydrogen Phosphates of Potassium and Ammonium...
Crystal Growth and Studies of Dihydrogen Phosphates of Potassium and Ammonium...
 
Mechanical Properties of Concrete with Marine Sand as Partial Replacement of ...
Mechanical Properties of Concrete with Marine Sand as Partial Replacement of ...Mechanical Properties of Concrete with Marine Sand as Partial Replacement of ...
Mechanical Properties of Concrete with Marine Sand as Partial Replacement of ...
 
Maximum PowerPoint Tracking of PV System Based on a SEPIC Converter Using Fuz...
Maximum PowerPoint Tracking of PV System Based on a SEPIC Converter Using Fuz...Maximum PowerPoint Tracking of PV System Based on a SEPIC Converter Using Fuz...
Maximum PowerPoint Tracking of PV System Based on a SEPIC Converter Using Fuz...
 
Comparison of Cell formation techniques in Cellular manufacturing using three...
Comparison of Cell formation techniques in Cellular manufacturing using three...Comparison of Cell formation techniques in Cellular manufacturing using three...
Comparison of Cell formation techniques in Cellular manufacturing using three...
 
Machining of Aircraft Bearing Rings using High Quality Bearing Steel
Machining of Aircraft Bearing Rings using High Quality Bearing SteelMachining of Aircraft Bearing Rings using High Quality Bearing Steel
Machining of Aircraft Bearing Rings using High Quality Bearing Steel
 
Developing an Environmentally Sustainable Hot Mix Asphalt Using Recycled Conc...
Developing an Environmentally Sustainable Hot Mix Asphalt Using Recycled Conc...Developing an Environmentally Sustainable Hot Mix Asphalt Using Recycled Conc...
Developing an Environmentally Sustainable Hot Mix Asphalt Using Recycled Conc...
 
Transient Stability Analysis of IEEE 9 Bus System in Power World Simulator
Transient Stability Analysis of IEEE 9 Bus System in Power World SimulatorTransient Stability Analysis of IEEE 9 Bus System in Power World Simulator
Transient Stability Analysis of IEEE 9 Bus System in Power World Simulator
 
FEA based Dissipation Energy and Temperature Distribution of Rubber Bushing
FEA based Dissipation Energy and Temperature Distribution of Rubber BushingFEA based Dissipation Energy and Temperature Distribution of Rubber Bushing
FEA based Dissipation Energy and Temperature Distribution of Rubber Bushing
 
Bullyngsara
BullyngsaraBullyngsara
Bullyngsara
 
Examen fffinal
Examen fffinalExamen fffinal
Examen fffinal
 
Seismic Drift Control in soft storied RCC buildings
Seismic Drift Control in soft storied RCC buildingsSeismic Drift Control in soft storied RCC buildings
Seismic Drift Control in soft storied RCC buildings
 
Studying nanotube-based oscillators and their application as memory cells via...
Studying nanotube-based oscillators and their application as memory cells via...Studying nanotube-based oscillators and their application as memory cells via...
Studying nanotube-based oscillators and their application as memory cells via...
 
Åpen dag 2013
Åpen dag 2013Åpen dag 2013
Åpen dag 2013
 
Investigation of Significant Process Parameter in Manganese Phosphating of Pi...
Investigation of Significant Process Parameter in Manganese Phosphating of Pi...Investigation of Significant Process Parameter in Manganese Phosphating of Pi...
Investigation of Significant Process Parameter in Manganese Phosphating of Pi...
 
Strategies of detecting Profile-injection attacks in E-Commerce Recommender S...
Strategies of detecting Profile-injection attacks in E-Commerce Recommender S...Strategies of detecting Profile-injection attacks in E-Commerce Recommender S...
Strategies of detecting Profile-injection attacks in E-Commerce Recommender S...
 
from Ruby to Objective-C
from Ruby to Objective-Cfrom Ruby to Objective-C
from Ruby to Objective-C
 
Synthesis, Characterization and Electrical Properties of Polyaniline Doped wi...
Synthesis, Characterization and Electrical Properties of Polyaniline Doped wi...Synthesis, Characterization and Electrical Properties of Polyaniline Doped wi...
Synthesis, Characterization and Electrical Properties of Polyaniline Doped wi...
 
Hypothesis on Different Data Mining Algorithms
Hypothesis on Different Data Mining AlgorithmsHypothesis on Different Data Mining Algorithms
Hypothesis on Different Data Mining Algorithms
 

Similar to Interference Minimization Protocol in Heterogeneous Wireless Sensor Network for High Quality Data Transmission

Bb2641284132
Bb2641284132Bb2641284132
Bb2641284132IJMER
 
11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...Alexander Decker
 
Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Dr Sandeep Kumar Poonia
 
REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS
REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS
REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS ijdpsjournal
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...eSAT Publishing House
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...eSAT Journals
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...IJMER
 
Fault tolerant routing scheme based on
Fault tolerant routing scheme based onFault tolerant routing scheme based on
Fault tolerant routing scheme based onIJCNCJournal
 
A Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc NetworksA Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc Networkspijans
 
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...IOSR Journals
 
Wireless Sensor Network over High Altitude Platform
Wireless Sensor Network over High Altitude PlatformWireless Sensor Network over High Altitude Platform
Wireless Sensor Network over High Altitude PlatformTELKOMNIKA JOURNAL
 
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...iosrjce
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 

Similar to Interference Minimization Protocol in Heterogeneous Wireless Sensor Network for High Quality Data Transmission (20)

Ijnsa050209
Ijnsa050209Ijnsa050209
Ijnsa050209
 
Bb2641284132
Bb2641284132Bb2641284132
Bb2641284132
 
iPGCON14_134
iPGCON14_134iPGCON14_134
iPGCON14_134
 
11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...
 
Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...
 
Aj33201205
Aj33201205Aj33201205
Aj33201205
 
Aj33201205
Aj33201205Aj33201205
Aj33201205
 
REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS
REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS
REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS
 
i2ct_submission_105
i2ct_submission_105i2ct_submission_105
i2ct_submission_105
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
 
Fault tolerant routing scheme based on
Fault tolerant routing scheme based onFault tolerant routing scheme based on
Fault tolerant routing scheme based on
 
A Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc NetworksA Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc Networks
 
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
 
Wireless Sensor Network over High Altitude Platform
Wireless Sensor Network over High Altitude PlatformWireless Sensor Network over High Altitude Platform
Wireless Sensor Network over High Altitude Platform
 
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
 
M017358794
M017358794M017358794
M017358794
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 

Recently uploaded

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 

Recently uploaded (20)

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 

Interference Minimization Protocol in Heterogeneous Wireless Sensor Network for High Quality Data Transmission

  • 1. Kakelli Anil Kumar et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 5, Issue 12, (Part - 3) December 2015, pp.34-38 www.ijera.com 34 | P a g e Interference Minimization Protocol in Heterogeneous Wireless Sensor Network for High Quality Data Transmission Kakelli Anil Kumar*, Dr. Addepalli VN Krishna**, Dr. K. Shahu Chatrapati*** *Associate Professor, Department of CSE, Indore Institute of Science and Technology, RGPV, Indore, MP, India, 453331, **Professor& Head, Department of CSE, Navodaya Institute of Technology, Raichur, KA, India, 584103, ***Associate Professor& Head, Department of CSE, COE, Manthani, Jawaharlal Nehru Technological University, Hyderabad, TS, India, 505212, ABSTRACT High-quality data transmission is the primary objective of WSN for achieving quality of service. Heterogeneous wireless sensor networks (HTWSN) can be used to deploy in sensitive and unmanned areas to monitor the objects. HTWSN is high configured network used to capture high-quality images and videos of targeted objects. During the data transmission in HTWSN, we identified that, the formation of interference with in the network due to link capacity overhead. Due to that, the quality data transmission is not possible through the network. In this research paper, we described the deployment of HTWSN network and identifying the primary sources for interference and introducing the proposed Interference Minimization Protocol (IMP). The IM protocol has achieved better quality of service by minimizing the interference in HTWSN. Keywords – Wireless Sensor Networks, Interference Minimization Protocol, Heterogeneous WSN. I. INTRODUCTION Wireless sensor network (WSN) is an emerging technology consists of small sensor nodes having low power, limited communication and computing capabilities. Heterogeneous and homogeneous are two modes of deployments in WSN. Heterogeneous WSN (HTWSN) is having distinct configured sensor nodes which are highly effective and economical for military applications as compared to homogeneous WSN (HOWSN). HOWSN is having low configured sensor nodes which may not handles complex events for longer duration. HTWSN consist of few sensors are highly capable in terms of sensing, computation, wireless communication. These nodes are having electro optic capability [1] to capture the images and videos of sensor targeted objects [2]. Large numbers of low configured sensors are deployable as intermediate nodes (IN) in HTWSN. All these devices cooperatively establish the HTWSN to monitor targeted objects from remote locations and transmit the sensed data to destination node (DN) over flexible network architecture. However, interference is the major problem results data collision, high packet drop and high end to end delay and minimization of network life time. Due to the interference [3], the HTWSN will become useless for user community. II. RELATED WORK Jenn-yue Teo [1] proposed I2MR protocol for minimization of interference by discovering the node dis-joint multiple paths for load balancing. Gerla and Xu [2] propose the deployment of large-scale sensor network with deployment of Unmanned Air Vehicle (UAV) for high rate of streamlining in WSN. Jain et al [3] considered the effects of interference in wireless sensor networks. Pearlman et al [4] demonstrated benefits of multipath load balancing for multichannel wireless networks. Nguyen et al had given [5] the electric field lines to select physically separated paths for multi load balancing. Based on the review of all these related works, we propose interference minimization protocol in HTWSN. III. HTWSN DEPLOYMENT Large numbers of low capable sensor nodes (LCSN) and few number of high capable sensor nodes (EOSN) are air dropped into area of operation (AO). The nodes can establish the network with provided bandwidth and frequency by unmanned air vehicle (UAV) or base station. The High-power gateway sensor nodes (HPGSN) are known as DN or sink nodes are located near the HTWSN to receive the data to forward the control station (CS). DN nodes are capable of linking up the ground HTWSN and UAV. When targeted objects may enter into the AO, EOSN of respective location can start to capture RESEARCH ARTICLE OPEN ACCESS
  • 2. Kakelli Anil Kumar et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 5, Issue 12, (Part - 3) December 2015, pp.34-38 www.ijera.com 35 | P a g e the images of the enemy object images of object. This information can forward to the DN through LCSN in multi hop mode through the shortest routes for efficient load balancing [4]. The data DN receives the data from HTWSN and forwards to control station (CS) through UAV. The received data at CS can helps to take intelligent decisions. IV. PROBLEM STATEMNT 4.1 Identifying Interference in Heterogeneous WSN After deployment of HTWSN, source nodes (SNs) can start the sensing the enemy objects’ data. The SNs can send the data packets to intermediate nodes (INs) which are in the active route towards DN. The IN nodes receive the data and send to DN through multi hop mode. Due to simultaneous data packets transmission by multiple SNs to intermediate nodes, the interference can exists at any IN with in the network. Because all the nodes within the network are sharing same wireless medium. Once if any node experiences the interference, it can lose its healthy physical properties like quick discharge of battery, poor performance, high packet dropping and high end to end data delivery [13]. Consider the network with two sender nodes SN 1 and SN2 , IN n is intermediate nodes DN sensor nodes, CL n is communication links between nodes, RP n is routing path and total number of nodes are N. N= 𝛴(SN n + IN n) where n>=1 (1) RP (SN n to DN) = , n >= 1 (2) Node level interference [14] is Ω and estimated based on the link capacity α between the node N i and its sender node SN i. α is estimated as α = 1/ (Ps + As) (3) Ps is the number of packets successfully transmitted through the link and As is number of successful acknowledgements received by SN I from N i. if the data packet delivery through the link is beyond its capacity leads to interference. So each node with in the network should have to estimate the required number of data packets to transmit through the link based on the pre estimated link capacity. The data packet delivery overhead over link is β, δ is the total number of packets transmitted during the data delivery process, γ is the number of data packets successfully received at receiver node. β = δ / γ where β=1. If the β is exceeding the value 1 which indicates the link between the two sensor nodes are experiencing interference. V. INTERFERENCE MINIMIZATION PROTOCOL (IMP) IMP in heterogeneous Wireless Sensor Network can efficiently estimates the link capacity of each link between the any nodes. IM protocol can consider the following assumption as static HTWSN, location of SN and DN are known, single radio channel and uniform transmission range for all the sensor nodes. The IM protocol can estimate the link quality of each link which is exists between the nodes in active route. Based on the link quality factor, the nodes can estimates the required number of data packets delivery through the link to its neighboring nodes. The data delivery ratio Π = γ / δ. When simultaneous data transmission takes place through routing paths within the network, the nodes and their communication links are affecting highly with interference [9]. IM protocol can estimates the interference factor on each link [8]. Based on the estimation of IF value for the link, the IM protocol can decides the number of data packets can be released through it. When the nodes IF value is higher than defined threshold value of the link, IM protocol concludes the link is poor quality link. Many routing protocols like AODV [7], DSR, DSDV and I2MR don not consider the link quality during the data delivery phase. Even though the efficient route established in WSN, but link quality will not consider which results poor quality of service [12]. However, IM protocol identifies the total number of nodes N and their communication links CL n. There are three types of links active, passive and hybrid. Active link is communication links in between the active nodes, whereas passive link quality means communication links between the nodes which are not involving in the route. Hybrid links means the links between active and passive nodes. IM protocol can mainly focus on the active links. The sender node communication area is CA. The CA can be divided in to three equal regions as CA1, CA2, CA3. The sender sensor node estimates the distance D from itself to receiver node. If D value is 0>=D<= CA1, the sender node can have good communication link and D value is CA1>=D<= CA2, the communication links is moderate. D value is CA2>=D<= CA3, the communication links is weak. IM protocol prefers the moderate communication links MCL n to maintain the better communication link quality and optimized routes. During the neighbor node discovery phase, nodes can start the identification of each node within the network. In this phase the Hello message can be broadcast in the network. T1 is the time of Hello message sent by the sender node. T2 is the tome of reply Hello message received by sender node form receiver node. TD = T2- T1 (4)
  • 3. Kakelli Anil Kumar et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 5, Issue 12, (Part - 3) December 2015, pp.34-38 www.ijera.com 36 | P a g e If TD is higher than threshold time TT the link quality of MCL n is low MCL L. The TD is equals to TT the link quality moderate MCL M and TD is less than TT, the link quality is high MCL H. So IM protocol is prefers the MCL H for high quality data delivery. But many times high quality links may not available within the network for route constructions. During the situation, it is highly essential to estimate the link capacity. The link capacity α can estimate through equation 3. VI. RESULT ANALASIS All of our experiments are conducted based on simulations with static heterogeneous wireless sensor network. IM protocol is implemented in GloMoSim simulator [15]. Consider the scenario with heterogeneous sensor nodes in 1000*1000 terrain area dimension. The type of deployment is random deployment and no mobility of the nodes. The propagation limit is -111.0; noise level is 10 and radio type is used as RADIO-Accnoise, which is stander radio model and available bandwidth is 244.14KB, frequency 2.4 GHz ISM. The routing protocol is interference minimization protocol (IMP) where the interference zone hot spot nodes and links are identified in HTWSN. With this mechanism, the energy consumption and traffic load is minimized. Figure 1, describes the interference level at node in the network without IM protocol by introducing single and multiple events in to the network. We observed that, the nodes experienced high interference. Figure 4, represents the interference minimization with IM protocol at node and link level. IM protocol has given satisfactory results for single and multiple events during high traffic conditions also. The energy consumption can also estimate at each node with the IM protocol and with IM protocol. Figure 3 and 4 are represents the energy preservation with IM protocol. IM protocol has given satisfactory results to extend the network lifetime. Fig 1. Interference level of a sensor node in HTWSN with single events (blue color) and multi events (red color) Fig: 2 Energy Consumption due to interference with single events (blue color) and multi events (red color) Fig: 3 Energy Consumption with IM protocol in HTWSN with single events (blue color) and multi events (red color) Fig: 4 Interference minimization with IM protocol in HTWSN with single events (blue color) and multi events (red color) VII. CONCLUSION AND FUTURE DIRECTIONS Interference minimization protocol (IMP) has implemented successfully for heterogeneous WSN environment. It is tested with various simulation parameters like single and multiple events detection. The IM protocol has given satisfactory results in terms of energy saving and performance in heterogeneous WSN environment at variable data traffic load. We are extending our research work on the proposed protocol to improve the performance by increasing the node density up to 500 nodes. REFERENCES [1] Jenn-yue teo,yajun Ha and chen- knong tham, Interferences minimization multipath Routing with congestion control in Wireless sensor network for highrate streaming, IEEE transactions on mobile computing, Vol 7, No.9, 2008. [2] Mario Gerla, Kaixin Xu, Multimedia streamlining in large scale sensor networks
  • 4. Kakelli Anil Kumar et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 5, Issue 12, (Part - 3) December 2015, pp.34-38 www.ijera.com 37 | P a g e with mobile swarms, SIGMOD, Vol 32, no.4, 2003. [3] K. Jain, J. Pandhye, V.N.Padmanabhan and L. Qiu, Impact of Interference on multihop wireless networks, In: Proc MOBICOM’03,pp 66-80, 2003. [4] M.R Pearlman, Z.J.Hass, P.Sholander and S.S.Tabizi, On the impact of alternative path routing for load balancing for mobile ad_hoc networks, In: Proc MOBIHOC’00,pp3-10, 2000. [5] N.T. Nguyen, A.-I.A. Wang, P. Reiher, and G. Kuenning, Electric Field-Based Routing: A Reliable Framework for Routing in Manets, SIGMOBILE Mobile Computing and Comm. Rev., vol. 8, 2004.35-49 [6] Y. Wang, H. Lin, and S. Chang, Interference on Multipath QoS Routing for Ad Hoc Wireless Network, in ICDCSW'04, IEEE Computer Society, 2004, pp. 104-109. [7] M. K. Marina and S. R. Das, Ad hoc On- demand Multipath Distance Vector Routing, Wireless Communications and Mobile Computing, vol. 6, no. 7, 2006, pp. 969–988. [8] P. Agrawal and G.K. Das, Improved Interference in Wireless Sensor Networks, Distributed Computing and Internet Technology, 2013, pp. 92-102. [9] P. Von Rickenbach, R. Wattenhofer, and A. Zollinger, Algorithmic models of interference in wireless ad hoc and sensor networks, IEEE/ACM Transactions on Networking (TON), vol. 17, 2009, pp. 172-185. [10] T. M. Chiwewe and G. P. Hancke, A distributed topology control technique for low interference and energy efficiency in wireless sensor networks, Industrial Informatics, IEEE Transactions on, vol. 8, 2012, pp. 11-19. [11] H.Huang, G.Hu, F.Yu, and Z.Zhang, Energy- aware interferencesensitive geographic routing in wireless sensor networks, Communications, IET, vol. 5, 2011, pp. 2692-2702. [12] M. A. Hassan and A. Chickadel, “A review of interference reduction in wireless networks using graph coloring methods,” International Journal on application of graph theory in wireless adhoc networks and sensor networks (GRAPHHOC), 2011, 58-67. [13] P. Cardieri, Modelling interference in wireless ad hoc networks, IEEE Communications Surveys & Tutorials, 2010; 12(4): 551-572. [14] T. M. Chiwewe, and G. P. Hancke, A distributed topology control technique for low interference and energy efficiency in wireless sensor networks, IEEE Transactions on Industrial Informatics, 2012; 8(1): 11-19. [15] Xiang Zeng, Rajive Bagrodia, and Mario Gerla. Glomosim: a library for parallel simulation of large-scale wireless networks. In PADS ’98: Proceedings of the twelfth workshop on Parallel and distributed simulation, Washington, DC, USA, IEEE Computer Society, 1998, pp 154–161. Author's Biography First A. Kakelli Anil Kumar is working as Associate Professor, Department of Computer Science and Engineering, Indore Institute of Science and Technology, Indore, Madhya Pradesh, India. He was received M. Tech degree in 2009 in Computer Science and Engineering with specialization of Software Engineering from Jawaharlal Nehru Technological University, Hyderabad, TS, India. He is currently working towards a Ph.D. degree at the Department of Computer Science and Engineering, Jawaharlal Nehru Technological University, Hyderabad, TS, India. His current research interests include protocol design, security, high quality data transmissions and cross layer design in wireless sensor networks, Mobile ad_hoc Networks, wireless communications and mobile computing. Second B. Dr. Addepalli VN Krishna is working as Professor and Head, Computer Science and Engineering department at Navodaya Institute Technology, Raichur, KA, India. He received Ph. D in 2010 at Department of Computer Science and engineering, Acharya Nagarjuna University, AP, India and M. Tech degree in 2001, at department of Computer Science and Engineering, Birla Institute of Technology, Mesra, Ranchi, India. He is having 24 years of teaching experience at under and postgraduate engineering level and guiding 6 Ph. D research scholars from reputed universities in India. He published 25 research papers in national and international journals and 9 research papers in national and international conferences. His current research interest includes security algorithm design in wireless sensor networks, advanced key management algorithms for computer security and protocol design for network security.
  • 5. Kakelli Anil Kumar et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 5, Issue 12, (Part - 3) December 2015, pp.34-38 www.ijera.com 38 | P a g e Third C. Dr. K. Shahu Chatrapati is working as Associate Professor and Head of the Department, Computer Science and Engineering department at College of Engineering, Manthani, Jawaharlal Nehru Technological University, Hyderabad, TS, India. He is having 13 years of teaching experience at under and postgraduate engineering level and guiding 6 Ph. D research scholars from reputed universities in India. He published 15 research papers in national and international journals and conferences. He organized various conferences and workshops at JNTUCEM on ethical hacking, robotics with the collaboration of IIT Kharagpur and Advances in Computing and Networking sponsored by CSI. His current research interest includes Compilers, Theory of Automata, and Distributed Computing.