SlideShare a Scribd company logo
1 of 4
Download to read offline
Hemant kumar Damor, Jitendra S. Dhobi and Kartik N. Shah / International Journal of
Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.1810-1813
1810 | P a g e
Energy Optimization in Wireless Sensor Networks
Hemant kumar Damor1
, Jitendra S. Dhobi2
and Kartik N. Shah3
1, 2
Computer Engineering Department Govt. Engineering College, Modasa
3
School of Computing science and engineering, VIT University, Vellore.
Abstract
Wireless Sensor Nodes are generally
having less memory and low battery life. Due to this
constraint, we need a strong algorithm by which we
can reduce the energy consumption. The main
energy is utilized during sending of the data. Some
part of energy is utilized in processing the data. In
this paper, we will give another approach for
reduced energy consumption. We will consider the
cost of sending as well as processing. So, we will use
short distance path as well as compression of the
data to reduce the power consumption. Finally we
will simulate this scenario by making a small
simulator for 4 nodes.
Keywords—Wireless Sensor Network, Energy
optimization, compression, efficiency
I. INTRODUCTION
From recent years, it is found that the area of
wireless network and mobile computing is evolved
rapidly. When we compare Wireless network with
wired networks, we have benefit with wireless
networks as they are capable of scaling easily, rapidly
deployable and most importantly cost effective.
Sensor nodes are low-power devices that is having
inbuilt functionality of sensing, small amount of
computing and wireless communication. It is
expected that the cost of producing the sensor node is
negligible. A simple transceiver is equipped to
transmit and receive measurements from neighbours.
The microcontroller performs the data processing
task and is responsible for data functionality in sensor
node. These sensor nodes are generally used to sense
light, temperature, sound, position, vibration,
pressure, stress etc. We can define wireless sensor
network as aggregating different sensor nodes into
computation and dedicated communication
infrastructures. Wireless Sensor Networks (WSNs)
are new era of networking system. It deals with scale
and density, which is very hard in the ideal
environments. Sensor networks are made with the
intention of monitoring the physical world. So, they
are often deployed in uncontrolled and natural
environments. Wireless sensor networks must be
designed to operate while unthread (no external
power), unattended (no manual configuration or
management), intermittently connected (radios may
be turned off for substantial periods of time to
conserve power), and uncontrolled environment [1].
Figure 1 : Components of sensor node [1]
The following figure shows the typical
sensor node which is very small like coin and with
limited power and memory.
Figure2: Typical sensor node
WSNs are made up of integrate general-
purpose computing with heterogeneous sensing nodes
and wireless communication and low power sensor.
The power unit is one of the most important
components of a sensor node [2].A WSN can limit
the radio frequency channel, due to, that is to say,
unstable links, limit of physical protection of each
sensor node, actual of each nodes connection,
variation topology in addition dangerousness about
routing security is high by activity spite nodes. The
restrictions in the hardware of the sensor nodes,
makes it difficult to guarantee the maintenance of
security because of its vulnerability.[3][4].A WSN is
consists of spatially distributed autonomous sensors
together monitor physical or environmental
conditions. A sensor network normally makes a
wireless ad-hoc network, that is, each sensor is
deployed with a multi-hop routing algorithm. The
network does not have any already existing
infrastructure, such as routers in wired networks or
access points in managed (infrastructure) wireless
networks.
II. RELATED WORK
Hemant kumar Damor, Jitendra S. Dhobi and Kartik N. Shah / International Journal of
Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.1810-1813
1811 | P a g e
The challenges in deployment of WSNs are
as follows [14-16][17][18]:
1. The WSNs are used for not only collecting
environmental information but it also used for
changing the environment information.
2. The resources are limited and memory is less. It
should manage all the complex functionality
using different topologies.
3. There are many uncertainties in WSNs. They can
affect the functionality of WSN.
4. One of the big challenges of WSN is to make the
node as self-organizing and self-optimizing.
5. There can be a large number of WSN nodes but
network must have limited number of nodes that
guarantee the desired WSN service.
6. WSN operates in the real world. So, it must have
real-time features as per need.
7. WSNs are not safe because it uses free band. So,
there must be some security for managing
original data.
There are lot of techniques and protocols
available for optimizing energy used by sensor nodes.
The categories are mainly categorized into following
types.
1. MAC layer techniques
2. Network layer approaches
3. Transmission control approaches
4. Automatic approaches
A. MAC layer approaches
The main portion of the node's energy is
spent on radio transmission and on listening the
medium for message [5]. MAC protocols manage
communication and regulate the shared medium such
that performance is improved. For example, Zigbee
technology uses MAC protocol for less energy
consumption. The TDMA MAC protocol is based
upon cross layer optimization based upon Physical
layers and MAC [13].
B. Network layer (Routing) approaches
The main objective of WSNs application is
to gather the data from nodes and transfer the data to
sink in energy efficient way using proper routing
protocol. REACA , EARQ, MMSPEED, Energy
Efficient Broadcast Problem (EEBP) and Green
Wave Sleep Scheduling (GWSS) are some of the
algorithm used for less energy consumption at
network layer [6-9].
C. Transmission Control approaches
There are many Transmission Power
Control (TPC) approaches available. Its main goal is
to reduce the energy consumption and improve the
channel capacity. TPC solutions work with single
transmission power for whole network.One of the
algorithm is Power Control Algorithm with Back
Listing (PCBL), in this algorithm, each node transmit
the packet with different transmission power levels to
find optimal transmission power based on Packet
Reception Ratio (PRR) [10]. Local Mean
Algorithm(LMA) and Equal Transmission Power
(ETP) are other approaches used at this layer.
D. Automatic approaches
Autonomic computing was introduced by
IBM in 2001 to describe the systems that are self-
manageable [11].The main properties with are [12]:
Self- configuration: It concern with system's ability to
configure by itself for achieving high level goals.
Self-optimization: It concern with the change in
system pro-actively to optimize the performance or
quality of service.
III. PROPOSED APPROACH
There are many approaches available to
optimize the energy as discussed in previous work
section. Our approach comes under the category of
Network layer (Routing) approaches. The proposed
approach is basically divided into 2 steps. First step
deals with the routing part and second step deals with
the compression-decompression part. Both the steps
when combined, can give better result and benefits of
reliability and also less energy consumption. Our
main objective is to reduce the energy consumed by
the sensor node to have good battery life and also
provide reliability of data. Each step is explained in
details in following sub-sections.
Step1: Routing based upon the cost
The routing plays important role in design of
Wireless networks because the data transfer path is
most important to save energy. If the data follow the
wrong path then it waste the energy of the nodes
which comes on that path as well as waste the time.
So, we can consider the network as a graph where
each node are sensor nodes and the cost of the edge is
cost for transferring data from 1 node to another. It
can be anything like distance or energy consumption.
Here, we will use Floyd-Warshall algorithm to find
the shortest distance between node and destination
via intermediate nodes. So, the route will be shortest
route and the data can be transferred on that path so
that less energy will be utilized. In case, when the
battery life of the node which comes in shortest path
is completed then the distance will become infinite.
So, another shortest route will be calculated based
upon the existing scenario. It will increase the
flexibility and reliability of the data. Floyd-Warshall
algorithm is as follows :
Algorithm 1: Floyd Warshall Algorithm [19]
Hemant kumar Damor, Jitendra S. Dhobi and Kartik N. Shah / International Journal of
Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.1810-1813
1812 | P a g e
Algorithm 2: Floyd Warshall Algorithm for Path
Reconstruction [19]
After calculating shortest path, we can go
for transmission of data. Now we can save more
energy by sending data via shortest path. But we also
require that it should take less energy for
transmission of data. To reduce the energy utilized
during transmission can be reduced by using
compression-decompression. It is discussed in the
step2.
Step2: Compression- Decompression
Before sending the data, we can compress it
to save the energy of the transmitting node as well as
intermediate nodes. It can be achieved by using
binary transfer. For example, there are 4 nodes and
they capture the temperature of the region and send it
to sink node via shortest path. In this case, we can
have 2 bits to represent each nodes (node 1 : 00, node
2: 01, node 3: 10 and node 4 : 11 ). If we take it as
integer then it will take 2 bytes of size. Now, if we
want to send the temperature captured by the node,
we can convert the value in binary. As the node is a
physical device, it cannot stay in temperature more
than 64 degree Celsius. If the temperature goes
beyond the 60 degree, we can say it as fire in that
region. To represent the temperature, we need 6 bits
of size (2^{6} = 64). Total we require 8 bits (2+6). It
is of 1 byte data. So, the data is compressed from 4
byte to 1 byte and we can transfer this information to
destination sink. It will save energy of intermediate
nodes also. On other side, destination sink will check
first 2 bits to check which node sent the data and
remaining 6 bits for checking the temperature of that
region. It is part of decompression process.
IV. IMPLEMENTATION
Above 2 steps process can be achieved by
creating a simulator. The simulator's work will be
divided into above mentioned 2 steps. It can be
implemented using c# language in .NET technology.
The design of the simulator can be as shown in figure
2.
Figure 2: Implementation
In above figure, each nodes (Node A, Node
B, Node C and Node D) are capable of capturing
temperature (in this simulator, it will generate
random temperature). Each textbox will take input as
cost between nodes. Distance button will calculate
the shortest path from each node to destination node
via intermediate node. While the transfer button will
do the functionality of step2 mentioned above. It will
transfer the data from individual node to destination
node via shortest path.
V. CONCLUSIONS
From the above discussion, we can conclude
that the two step procedure proposed in this paper
will save 75% of energy of each node (In case of 4
nodes) in step 2 only.It can be shown as follows:
Before Compression:-
Data for transfer : 2 bytes for storing the
address of node + 2 bytes to store the temperature = 4
bytes
After Compression:-
Data for transfer : 2 bits for identity of node
+ 6 bits for temperature = 8 bits = 1 byte.
Energy saved = 4 byte - 1 byte = 3 byte = 75%Also,
we can save some amount of energy in step1. When
we combine both the steps, it will save too much
energy. One more benefit from the step1 is that it can
work for the case when one of the nodes from the
route is dead. In that case, it can reconstruct the path.
VI. FUTURE WORK
In our case, we have studied the algorithms
for 4 nodes, we can enhance the implementation for
Hemant kumar Damor, Jitendra S. Dhobi and Kartik N. Shah / International Journal of
Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.1810-1813
1813 | P a g e
more than 4 nodes as well. We can have more other
approaches which can be more cost effective. Also
we can use some other algorithms for compression
and decompression. But we must keep in mind that
compression and Decompression also requires energy
to process it. So, the algorithm must be less complex
so that more energy is not wasted on processing the
data compared to sending the data. We can have
modification in hardware to have some more efficient
technique. We can take energy available in the nodes
which comes along with the path as 1 parameter for
comparison.
ACKNOWLEDGMENT
Authors would like to thank the Computer
department of Government Engineering College,
Modasa and VIT University for providing the
resources to carry out this work. Author would also
like to thank Gujarat Technological University to
motivate us to work.
REFERENCES
[1] Debmalya Bhattacharya and R. Krishna
moorthy , “Power Optimization in Wireless
Sensor Networks”, IJCSI International
Journal of Computer Science Issues, Vol. 8,
Issue 5, No 2, September 2011.pp 415-419.
[2] M.Ismail, M. Y. Sanavullah, “Security
Topology in Wireless Sensor Networks
With Routing Optimisation” IEEE 2008.
[3] G.M. Ben Ezovski, S.E. Watkins, "The
Electronic Sensor Node and the Future of
Government-Issued RFID-Based
Identification", RFID 2007.IEEE
International Conference, pp 15-22, 2007.
[4] I.F. Akyiliz, W. Su, Y.Sankarasubramaniam
and E. Cayirci, "A Survey on Sensor
Network", IEEE Communication Magazine,
pp 102-114, 2002.
[5] Gholamzadeh, B. & Nabovati, H. (2008).
“Concepts for Designing Low Power
Wireless Sensor Networks”, World
Academy of Science, Engineering and
Technology.
[6] Felemban, E.; Lee, C. & Ekicin, E. (2006).
“MMSPEED: Multipath Multi]SPEED
Protocol for QoS Guarantee of Reliability
and Timeliness in Wireless Sensor
Networks”. IEEE Transactions on Mobile
Computing, Vol.5, No. 6, pp. 738-754.
[7] Wu, X.; Chen, G. & Das, S. K. (2008).
“Avoiding Energy Holes in Wireless Sensor
Networks with Nonuniform Node
Distribution”. IEEE Transactions on Parallel
and Distributed Systems, Vol. 19, No. 5.
[8] Guha, S.; Basu, P.; Chau, C. & Gibbens, R.
(2011). “Green Wave Sleep Scheduling:
Optimizing Latency and Throughput in Duty
Cycling Wireless Networks”. IEEE Journal
on Selected Areas in Communications, Vol.
29, No. 8.
[9] Quan, Z.; Subramanian, A. & Sayed, A. H.
(2007). “REACA: An Efficient Protocol
Architecture for Large Scale Sensor
Networks. IEEE Transactions on Wireless
Communications”, Vol. 6, No. 10, pp. 3846-
3855, 2007.
[10] Lin, S.; Zhang, J.; Zhou, G.; Gu, L.; He, T.
& Stankovic, J. A. (2006). “ATPC: Adaptive
Transmission Power Control for Wireless
Sensor Networks”. Proceedings of
SenSys’06, November 2006.
[11] Kephart, J.O. , Chess, D.M., “The Vision of
Autonomic Computing”, IEEE Computer,
2003.
[12] Huebscher, M. C. & McCann, J. A. (2008).
“A survey of autonomic computing degrees,
models, and applications”. ACM Comput
Surveys.
[13] Shi, L. & Fapojuwo, A. O. (2010). “TDMA
Scheduling with Optimized Energy
Efficiency and Minimum Delay in Clustered
Wireless Sensor Networks”. IEEE
Transactions on Mobile Computing, Vol. 9,
No. 7, July 2010.
[14] Stankovic, J.A.; Abdelzaher, T.F.; Lu, C.;
Sha, L. & Hou, J. C. (2003). “Real-Time
Communication and Coordination in
Embedded Sensor Networks”. Proceedings
of the IEEE, Vol. 91, No. 7, pp. 1002-1022,
2003
[15] Akyildiz, I. F.; Su W.; Sankarasubramaniam
Y. & Cayirci E. (2002). “A Survey on
Sensor Networks”. IEEE Communications
Magazine, pp. 102-114.
[16] Ilyas, M. & Mahgoub, I. (2005). “Handbook
of Sensor Networks: Compact Wireless and
Wired Sensing Systems,” CRC Press Inc.,
Boca Raton, USA.
[17] Molla, M. & Ahamed, S. I., “A Survey for
Sensor Network and Challenges”. (2006).
Proceedings of the 2006 International
Conference on Parallel Processing
Workshops, 2006.
[18] Yick, J.; Mukherjee, B. & Ghosal, D. (2008).
“Wireless sensor network survey”.
Computer Networks, no. 52, pp. 2292–2330.
[19]
http://en.wikipedia.org/wiki/Floyd%E2%80
%93Wars- hall_algorithm

More Related Content

What's hot

Mobility_Research_paper
Mobility_Research_paperMobility_Research_paper
Mobility_Research_paperPiyush Jalan
 
A review of energy conservation in wireless sensor networks
A review of energy conservation in wireless sensor networksA review of energy conservation in wireless sensor networks
A review of energy conservation in wireless sensor networksAlexander Decker
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...csijjournal
 
A Survey on Data Aggregation Cluster based Technique in Wireless Sensor Netwo...
A Survey on Data Aggregation Cluster based Technique in Wireless Sensor Netwo...A Survey on Data Aggregation Cluster based Technique in Wireless Sensor Netwo...
A Survey on Data Aggregation Cluster based Technique in Wireless Sensor Netwo...IRJET Journal
 
Design and Implementation a New Energy Efficient Clustering Algorithm Using t...
Design and Implementation a New Energy Efficient Clustering Algorithm Using t...Design and Implementation a New Energy Efficient Clustering Algorithm Using t...
Design and Implementation a New Energy Efficient Clustering Algorithm Using t...ijmnct
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Surveyijsrd.com
 
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...IOSR Journals
 
IRJET- An Efficient Dynamic Deputy Cluster Head Selection Method for Wireless...
IRJET- An Efficient Dynamic Deputy Cluster Head Selection Method for Wireless...IRJET- An Efficient Dynamic Deputy Cluster Head Selection Method for Wireless...
IRJET- An Efficient Dynamic Deputy Cluster Head Selection Method for Wireless...IRJET Journal
 
Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Netw...
Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Netw...Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Netw...
Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Netw...IDES Editor
 
Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2IAEME Publication
 
A Review Paper on Power Consumption Improvements in WSN
A Review Paper on Power Consumption Improvements in WSNA Review Paper on Power Consumption Improvements in WSN
A Review Paper on Power Consumption Improvements in WSNIJERA Editor
 
Iisrt divya nagaraj (networks)
Iisrt divya nagaraj (networks)Iisrt divya nagaraj (networks)
Iisrt divya nagaraj (networks)IISRT
 
Design and Implementation a New Energy Efficient Clustering Algorithm Using t...
Design and Implementation a New Energy Efficient Clustering Algorithm Using t...Design and Implementation a New Energy Efficient Clustering Algorithm Using t...
Design and Implementation a New Energy Efficient Clustering Algorithm Using t...ijmnct
 
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...IRJET Journal
 
Iaetsd use of mobile communication in data-intensive
Iaetsd use of mobile communication in data-intensiveIaetsd use of mobile communication in data-intensive
Iaetsd use of mobile communication in data-intensiveIaetsd Iaetsd
 

What's hot (18)

Mobility_Research_paper
Mobility_Research_paperMobility_Research_paper
Mobility_Research_paper
 
A review of energy conservation in wireless sensor networks
A review of energy conservation in wireless sensor networksA review of energy conservation in wireless sensor networks
A review of energy conservation in wireless sensor networks
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
 
A Survey on Data Aggregation Cluster based Technique in Wireless Sensor Netwo...
A Survey on Data Aggregation Cluster based Technique in Wireless Sensor Netwo...A Survey on Data Aggregation Cluster based Technique in Wireless Sensor Netwo...
A Survey on Data Aggregation Cluster based Technique in Wireless Sensor Netwo...
 
Design and Implementation a New Energy Efficient Clustering Algorithm Using t...
Design and Implementation a New Energy Efficient Clustering Algorithm Using t...Design and Implementation a New Energy Efficient Clustering Algorithm Using t...
Design and Implementation a New Energy Efficient Clustering Algorithm Using t...
 
C011131925
C011131925C011131925
C011131925
 
T0440899104
T0440899104T0440899104
T0440899104
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
 
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...
 
IRJET- An Efficient Dynamic Deputy Cluster Head Selection Method for Wireless...
IRJET- An Efficient Dynamic Deputy Cluster Head Selection Method for Wireless...IRJET- An Efficient Dynamic Deputy Cluster Head Selection Method for Wireless...
IRJET- An Efficient Dynamic Deputy Cluster Head Selection Method for Wireless...
 
Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Netw...
Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Netw...Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Netw...
Cross-layer Design of an Asymmetric Loadpower Control Protocol in Ad hoc Netw...
 
Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2
 
A Review Paper on Power Consumption Improvements in WSN
A Review Paper on Power Consumption Improvements in WSNA Review Paper on Power Consumption Improvements in WSN
A Review Paper on Power Consumption Improvements in WSN
 
Iisrt divya nagaraj (networks)
Iisrt divya nagaraj (networks)Iisrt divya nagaraj (networks)
Iisrt divya nagaraj (networks)
 
Design and Implementation a New Energy Efficient Clustering Algorithm Using t...
Design and Implementation a New Energy Efficient Clustering Algorithm Using t...Design and Implementation a New Energy Efficient Clustering Algorithm Using t...
Design and Implementation a New Energy Efficient Clustering Algorithm Using t...
 
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
 
eeca
eecaeeca
eeca
 
Iaetsd use of mobile communication in data-intensive
Iaetsd use of mobile communication in data-intensiveIaetsd use of mobile communication in data-intensive
Iaetsd use of mobile communication in data-intensive
 

Viewers also liked (20)

Km3419041910
Km3419041910Km3419041910
Km3419041910
 
Jx3417921795
Jx3417921795Jx3417921795
Jx3417921795
 
Kd3418211827
Kd3418211827Kd3418211827
Kd3418211827
 
Kh3418561861
Kh3418561861Kh3418561861
Kh3418561861
 
Dj33662668
Dj33662668Dj33662668
Dj33662668
 
Db33621624
Db33621624Db33621624
Db33621624
 
Cl33531536
Cl33531536Cl33531536
Cl33531536
 
Df33642645
Df33642645Df33642645
Df33642645
 
Cy33602608
Cy33602608Cy33602608
Cy33602608
 
Do33694700
Do33694700Do33694700
Do33694700
 
Dg33646652
Dg33646652Dg33646652
Dg33646652
 
Cz33609611
Cz33609611Cz33609611
Cz33609611
 
Ds33717725
Ds33717725Ds33717725
Ds33717725
 
Dp33701704
Dp33701704Dp33701704
Dp33701704
 
Dk33669673
Dk33669673Dk33669673
Dk33669673
 
Dc33625629
Dc33625629Dc33625629
Dc33625629
 
MAD_Power Point_
MAD_Power Point_MAD_Power Point_
MAD_Power Point_
 
Diapositivas yadii
Diapositivas yadiiDiapositivas yadii
Diapositivas yadii
 
How to print with a mac
How to print with a macHow to print with a mac
How to print with a mac
 
Jasamu di kenang
Jasamu di kenangJasamu di kenang
Jasamu di kenang
 

Similar to Kb3418101813

Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...ijcncs
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Reviewtheijes
 
J031101064069
J031101064069J031101064069
J031101064069theijes
 
Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760Editor IJARCET
 
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...IJCNCJournal
 
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...IJCNCJournal
 
Energy efficient routing algorithm in wireless sensor networks
Energy efficient routing algorithm in wireless sensor networksEnergy efficient routing algorithm in wireless sensor networks
Energy efficient routing algorithm in wireless sensor networksAlexander Decker
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET Journal
 
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET Journal
 
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...IOSRJECE
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Editor IJARCET
 
Communication Cost Reduction by Data Aggregation: A Survey
Communication Cost Reduction by Data Aggregation: A SurveyCommunication Cost Reduction by Data Aggregation: A Survey
Communication Cost Reduction by Data Aggregation: A SurveyIJMTST Journal
 
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...ijasuc
 
Energy Efficient Techniques for Data aggregation and collection in WSN
Energy Efficient Techniques for Data aggregation and collection in WSNEnergy Efficient Techniques for Data aggregation and collection in WSN
Energy Efficient Techniques for Data aggregation and collection in WSNIJCSEA Journal
 
Power balancing optimal selective forwarding
Power balancing optimal selective forwardingPower balancing optimal selective forwarding
Power balancing optimal selective forwardingeSAT Publishing House
 

Similar to Kb3418101813 (20)

Aq4103266271
Aq4103266271Aq4103266271
Aq4103266271
 
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
 
J031101064069
J031101064069J031101064069
J031101064069
 
Gm3411871190
Gm3411871190Gm3411871190
Gm3411871190
 
Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760
 
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
 
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
 
Energy efficient routing algorithm in wireless sensor networks
Energy efficient routing algorithm in wireless sensor networksEnergy efficient routing algorithm in wireless sensor networks
Energy efficient routing algorithm in wireless sensor networks
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
 
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
 
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581
 
Communication Cost Reduction by Data Aggregation: A Survey
Communication Cost Reduction by Data Aggregation: A SurveyCommunication Cost Reduction by Data Aggregation: A Survey
Communication Cost Reduction by Data Aggregation: A Survey
 
61 66
61 6661 66
61 66
 
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...
ENERGY EFFICIENT ROUTING ALGORITHM FOR MAXIMIZING THE MINIMUM LIFETIME OF WIR...
 
Energy Efficient Techniques for Data aggregation and collection in WSN
Energy Efficient Techniques for Data aggregation and collection in WSNEnergy Efficient Techniques for Data aggregation and collection in WSN
Energy Efficient Techniques for Data aggregation and collection in WSN
 
Power balancing optimal selective forwarding
Power balancing optimal selective forwardingPower balancing optimal selective forwarding
Power balancing optimal selective forwarding
 

Recently uploaded

Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
99.99% of Your Traces Are (Probably) Trash (SRECon NA 2024).pdf
99.99% of Your Traces  Are (Probably) Trash (SRECon NA 2024).pdf99.99% of Your Traces  Are (Probably) Trash (SRECon NA 2024).pdf
99.99% of Your Traces Are (Probably) Trash (SRECon NA 2024).pdfPaige Cruz
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...Daniel Zivkovic
 
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideIEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideHironori Washizaki
 
Governance in SharePoint Premium:What's in the box?
Governance in SharePoint Premium:What's in the box?Governance in SharePoint Premium:What's in the box?
Governance in SharePoint Premium:What's in the box?Juan Carlos Gonzalez
 
The Kubernetes Gateway API and its role in Cloud Native API Management
The Kubernetes Gateway API and its role in Cloud Native API ManagementThe Kubernetes Gateway API and its role in Cloud Native API Management
The Kubernetes Gateway API and its role in Cloud Native API ManagementNuwan Dias
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintMahmoud Rabie
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 

Recently uploaded (20)

Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
99.99% of Your Traces Are (Probably) Trash (SRECon NA 2024).pdf
99.99% of Your Traces  Are (Probably) Trash (SRECon NA 2024).pdf99.99% of Your Traces  Are (Probably) Trash (SRECon NA 2024).pdf
99.99% of Your Traces Are (Probably) Trash (SRECon NA 2024).pdf
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...
 
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideIEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
 
Governance in SharePoint Premium:What's in the box?
Governance in SharePoint Premium:What's in the box?Governance in SharePoint Premium:What's in the box?
Governance in SharePoint Premium:What's in the box?
 
The Kubernetes Gateway API and its role in Cloud Native API Management
The Kubernetes Gateway API and its role in Cloud Native API ManagementThe Kubernetes Gateway API and its role in Cloud Native API Management
The Kubernetes Gateway API and its role in Cloud Native API Management
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Empowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership BlueprintEmpowering Africa's Next Generation: The AI Leadership Blueprint
Empowering Africa's Next Generation: The AI Leadership Blueprint
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 

Kb3418101813

  • 1. Hemant kumar Damor, Jitendra S. Dhobi and Kartik N. Shah / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1810-1813 1810 | P a g e Energy Optimization in Wireless Sensor Networks Hemant kumar Damor1 , Jitendra S. Dhobi2 and Kartik N. Shah3 1, 2 Computer Engineering Department Govt. Engineering College, Modasa 3 School of Computing science and engineering, VIT University, Vellore. Abstract Wireless Sensor Nodes are generally having less memory and low battery life. Due to this constraint, we need a strong algorithm by which we can reduce the energy consumption. The main energy is utilized during sending of the data. Some part of energy is utilized in processing the data. In this paper, we will give another approach for reduced energy consumption. We will consider the cost of sending as well as processing. So, we will use short distance path as well as compression of the data to reduce the power consumption. Finally we will simulate this scenario by making a small simulator for 4 nodes. Keywords—Wireless Sensor Network, Energy optimization, compression, efficiency I. INTRODUCTION From recent years, it is found that the area of wireless network and mobile computing is evolved rapidly. When we compare Wireless network with wired networks, we have benefit with wireless networks as they are capable of scaling easily, rapidly deployable and most importantly cost effective. Sensor nodes are low-power devices that is having inbuilt functionality of sensing, small amount of computing and wireless communication. It is expected that the cost of producing the sensor node is negligible. A simple transceiver is equipped to transmit and receive measurements from neighbours. The microcontroller performs the data processing task and is responsible for data functionality in sensor node. These sensor nodes are generally used to sense light, temperature, sound, position, vibration, pressure, stress etc. We can define wireless sensor network as aggregating different sensor nodes into computation and dedicated communication infrastructures. Wireless Sensor Networks (WSNs) are new era of networking system. It deals with scale and density, which is very hard in the ideal environments. Sensor networks are made with the intention of monitoring the physical world. So, they are often deployed in uncontrolled and natural environments. Wireless sensor networks must be designed to operate while unthread (no external power), unattended (no manual configuration or management), intermittently connected (radios may be turned off for substantial periods of time to conserve power), and uncontrolled environment [1]. Figure 1 : Components of sensor node [1] The following figure shows the typical sensor node which is very small like coin and with limited power and memory. Figure2: Typical sensor node WSNs are made up of integrate general- purpose computing with heterogeneous sensing nodes and wireless communication and low power sensor. The power unit is one of the most important components of a sensor node [2].A WSN can limit the radio frequency channel, due to, that is to say, unstable links, limit of physical protection of each sensor node, actual of each nodes connection, variation topology in addition dangerousness about routing security is high by activity spite nodes. The restrictions in the hardware of the sensor nodes, makes it difficult to guarantee the maintenance of security because of its vulnerability.[3][4].A WSN is consists of spatially distributed autonomous sensors together monitor physical or environmental conditions. A sensor network normally makes a wireless ad-hoc network, that is, each sensor is deployed with a multi-hop routing algorithm. The network does not have any already existing infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks. II. RELATED WORK
  • 2. Hemant kumar Damor, Jitendra S. Dhobi and Kartik N. Shah / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1810-1813 1811 | P a g e The challenges in deployment of WSNs are as follows [14-16][17][18]: 1. The WSNs are used for not only collecting environmental information but it also used for changing the environment information. 2. The resources are limited and memory is less. It should manage all the complex functionality using different topologies. 3. There are many uncertainties in WSNs. They can affect the functionality of WSN. 4. One of the big challenges of WSN is to make the node as self-organizing and self-optimizing. 5. There can be a large number of WSN nodes but network must have limited number of nodes that guarantee the desired WSN service. 6. WSN operates in the real world. So, it must have real-time features as per need. 7. WSNs are not safe because it uses free band. So, there must be some security for managing original data. There are lot of techniques and protocols available for optimizing energy used by sensor nodes. The categories are mainly categorized into following types. 1. MAC layer techniques 2. Network layer approaches 3. Transmission control approaches 4. Automatic approaches A. MAC layer approaches The main portion of the node's energy is spent on radio transmission and on listening the medium for message [5]. MAC protocols manage communication and regulate the shared medium such that performance is improved. For example, Zigbee technology uses MAC protocol for less energy consumption. The TDMA MAC protocol is based upon cross layer optimization based upon Physical layers and MAC [13]. B. Network layer (Routing) approaches The main objective of WSNs application is to gather the data from nodes and transfer the data to sink in energy efficient way using proper routing protocol. REACA , EARQ, MMSPEED, Energy Efficient Broadcast Problem (EEBP) and Green Wave Sleep Scheduling (GWSS) are some of the algorithm used for less energy consumption at network layer [6-9]. C. Transmission Control approaches There are many Transmission Power Control (TPC) approaches available. Its main goal is to reduce the energy consumption and improve the channel capacity. TPC solutions work with single transmission power for whole network.One of the algorithm is Power Control Algorithm with Back Listing (PCBL), in this algorithm, each node transmit the packet with different transmission power levels to find optimal transmission power based on Packet Reception Ratio (PRR) [10]. Local Mean Algorithm(LMA) and Equal Transmission Power (ETP) are other approaches used at this layer. D. Automatic approaches Autonomic computing was introduced by IBM in 2001 to describe the systems that are self- manageable [11].The main properties with are [12]: Self- configuration: It concern with system's ability to configure by itself for achieving high level goals. Self-optimization: It concern with the change in system pro-actively to optimize the performance or quality of service. III. PROPOSED APPROACH There are many approaches available to optimize the energy as discussed in previous work section. Our approach comes under the category of Network layer (Routing) approaches. The proposed approach is basically divided into 2 steps. First step deals with the routing part and second step deals with the compression-decompression part. Both the steps when combined, can give better result and benefits of reliability and also less energy consumption. Our main objective is to reduce the energy consumed by the sensor node to have good battery life and also provide reliability of data. Each step is explained in details in following sub-sections. Step1: Routing based upon the cost The routing plays important role in design of Wireless networks because the data transfer path is most important to save energy. If the data follow the wrong path then it waste the energy of the nodes which comes on that path as well as waste the time. So, we can consider the network as a graph where each node are sensor nodes and the cost of the edge is cost for transferring data from 1 node to another. It can be anything like distance or energy consumption. Here, we will use Floyd-Warshall algorithm to find the shortest distance between node and destination via intermediate nodes. So, the route will be shortest route and the data can be transferred on that path so that less energy will be utilized. In case, when the battery life of the node which comes in shortest path is completed then the distance will become infinite. So, another shortest route will be calculated based upon the existing scenario. It will increase the flexibility and reliability of the data. Floyd-Warshall algorithm is as follows : Algorithm 1: Floyd Warshall Algorithm [19]
  • 3. Hemant kumar Damor, Jitendra S. Dhobi and Kartik N. Shah / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1810-1813 1812 | P a g e Algorithm 2: Floyd Warshall Algorithm for Path Reconstruction [19] After calculating shortest path, we can go for transmission of data. Now we can save more energy by sending data via shortest path. But we also require that it should take less energy for transmission of data. To reduce the energy utilized during transmission can be reduced by using compression-decompression. It is discussed in the step2. Step2: Compression- Decompression Before sending the data, we can compress it to save the energy of the transmitting node as well as intermediate nodes. It can be achieved by using binary transfer. For example, there are 4 nodes and they capture the temperature of the region and send it to sink node via shortest path. In this case, we can have 2 bits to represent each nodes (node 1 : 00, node 2: 01, node 3: 10 and node 4 : 11 ). If we take it as integer then it will take 2 bytes of size. Now, if we want to send the temperature captured by the node, we can convert the value in binary. As the node is a physical device, it cannot stay in temperature more than 64 degree Celsius. If the temperature goes beyond the 60 degree, we can say it as fire in that region. To represent the temperature, we need 6 bits of size (2^{6} = 64). Total we require 8 bits (2+6). It is of 1 byte data. So, the data is compressed from 4 byte to 1 byte and we can transfer this information to destination sink. It will save energy of intermediate nodes also. On other side, destination sink will check first 2 bits to check which node sent the data and remaining 6 bits for checking the temperature of that region. It is part of decompression process. IV. IMPLEMENTATION Above 2 steps process can be achieved by creating a simulator. The simulator's work will be divided into above mentioned 2 steps. It can be implemented using c# language in .NET technology. The design of the simulator can be as shown in figure 2. Figure 2: Implementation In above figure, each nodes (Node A, Node B, Node C and Node D) are capable of capturing temperature (in this simulator, it will generate random temperature). Each textbox will take input as cost between nodes. Distance button will calculate the shortest path from each node to destination node via intermediate node. While the transfer button will do the functionality of step2 mentioned above. It will transfer the data from individual node to destination node via shortest path. V. CONCLUSIONS From the above discussion, we can conclude that the two step procedure proposed in this paper will save 75% of energy of each node (In case of 4 nodes) in step 2 only.It can be shown as follows: Before Compression:- Data for transfer : 2 bytes for storing the address of node + 2 bytes to store the temperature = 4 bytes After Compression:- Data for transfer : 2 bits for identity of node + 6 bits for temperature = 8 bits = 1 byte. Energy saved = 4 byte - 1 byte = 3 byte = 75%Also, we can save some amount of energy in step1. When we combine both the steps, it will save too much energy. One more benefit from the step1 is that it can work for the case when one of the nodes from the route is dead. In that case, it can reconstruct the path. VI. FUTURE WORK In our case, we have studied the algorithms for 4 nodes, we can enhance the implementation for
  • 4. Hemant kumar Damor, Jitendra S. Dhobi and Kartik N. Shah / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1810-1813 1813 | P a g e more than 4 nodes as well. We can have more other approaches which can be more cost effective. Also we can use some other algorithms for compression and decompression. But we must keep in mind that compression and Decompression also requires energy to process it. So, the algorithm must be less complex so that more energy is not wasted on processing the data compared to sending the data. We can have modification in hardware to have some more efficient technique. We can take energy available in the nodes which comes along with the path as 1 parameter for comparison. ACKNOWLEDGMENT Authors would like to thank the Computer department of Government Engineering College, Modasa and VIT University for providing the resources to carry out this work. Author would also like to thank Gujarat Technological University to motivate us to work. REFERENCES [1] Debmalya Bhattacharya and R. Krishna moorthy , “Power Optimization in Wireless Sensor Networks”, IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 5, No 2, September 2011.pp 415-419. [2] M.Ismail, M. Y. Sanavullah, “Security Topology in Wireless Sensor Networks With Routing Optimisation” IEEE 2008. [3] G.M. Ben Ezovski, S.E. Watkins, "The Electronic Sensor Node and the Future of Government-Issued RFID-Based Identification", RFID 2007.IEEE International Conference, pp 15-22, 2007. [4] I.F. Akyiliz, W. Su, Y.Sankarasubramaniam and E. Cayirci, "A Survey on Sensor Network", IEEE Communication Magazine, pp 102-114, 2002. [5] Gholamzadeh, B. & Nabovati, H. (2008). “Concepts for Designing Low Power Wireless Sensor Networks”, World Academy of Science, Engineering and Technology. [6] Felemban, E.; Lee, C. & Ekicin, E. (2006). “MMSPEED: Multipath Multi]SPEED Protocol for QoS Guarantee of Reliability and Timeliness in Wireless Sensor Networks”. IEEE Transactions on Mobile Computing, Vol.5, No. 6, pp. 738-754. [7] Wu, X.; Chen, G. & Das, S. K. (2008). “Avoiding Energy Holes in Wireless Sensor Networks with Nonuniform Node Distribution”. IEEE Transactions on Parallel and Distributed Systems, Vol. 19, No. 5. [8] Guha, S.; Basu, P.; Chau, C. & Gibbens, R. (2011). “Green Wave Sleep Scheduling: Optimizing Latency and Throughput in Duty Cycling Wireless Networks”. IEEE Journal on Selected Areas in Communications, Vol. 29, No. 8. [9] Quan, Z.; Subramanian, A. & Sayed, A. H. (2007). “REACA: An Efficient Protocol Architecture for Large Scale Sensor Networks. IEEE Transactions on Wireless Communications”, Vol. 6, No. 10, pp. 3846- 3855, 2007. [10] Lin, S.; Zhang, J.; Zhou, G.; Gu, L.; He, T. & Stankovic, J. A. (2006). “ATPC: Adaptive Transmission Power Control for Wireless Sensor Networks”. Proceedings of SenSys’06, November 2006. [11] Kephart, J.O. , Chess, D.M., “The Vision of Autonomic Computing”, IEEE Computer, 2003. [12] Huebscher, M. C. & McCann, J. A. (2008). “A survey of autonomic computing degrees, models, and applications”. ACM Comput Surveys. [13] Shi, L. & Fapojuwo, A. O. (2010). “TDMA Scheduling with Optimized Energy Efficiency and Minimum Delay in Clustered Wireless Sensor Networks”. IEEE Transactions on Mobile Computing, Vol. 9, No. 7, July 2010. [14] Stankovic, J.A.; Abdelzaher, T.F.; Lu, C.; Sha, L. & Hou, J. C. (2003). “Real-Time Communication and Coordination in Embedded Sensor Networks”. Proceedings of the IEEE, Vol. 91, No. 7, pp. 1002-1022, 2003 [15] Akyildiz, I. F.; Su W.; Sankarasubramaniam Y. & Cayirci E. (2002). “A Survey on Sensor Networks”. IEEE Communications Magazine, pp. 102-114. [16] Ilyas, M. & Mahgoub, I. (2005). “Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems,” CRC Press Inc., Boca Raton, USA. [17] Molla, M. & Ahamed, S. I., “A Survey for Sensor Network and Challenges”. (2006). Proceedings of the 2006 International Conference on Parallel Processing Workshops, 2006. [18] Yick, J.; Mukherjee, B. & Ghosal, D. (2008). “Wireless sensor network survey”. Computer Networks, no. 52, pp. 2292–2330. [19] http://en.wikipedia.org/wiki/Floyd%E2%80 %93Wars- hall_algorithm