SlideShare a Scribd company logo
1 of 6
Download to read offline
Gunjal M.S. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 3), December 2014, pp.78-83
www.ijera.com 78 | P a g e
Energy Efficient Wireless Sensor Network Using Network Coding
Based Multipath Routing Protocol For Multicast Network
Gunjal M.S.1
, Prof.S.A.Shaikh2
*(Department of Electronics & Telecommunication, PUNE University, Loni-413736)
** (Department of Electronics & Telecommunication, PUNE University, Loni-413736)
ABSTRACT
Network Coding is most promising aspect of WSN. This Network Coding method is combined with multipath
routing protocol to form NCMR protocol.(network coding based multipath routing protocol).This protocol is
used to obtain energy efficient wireless sensor network.. These protocol leads to decrease the number of
constrain routes & the total time of transmission. This protocol is applied on unicast and multicast network
separately. And comparison is done with traditional multipath routing protocol for same unicast and multicast
network. Simulation result shows energy consumption of NCMR multicast is lower than NCMR unicast and
also than TMR unicast as well as multicast. This work is proved by the simulation analysis results. The used
multipath model is based on braided multipath routing, and the network coding method is random linear
network coding (practical network coding). In braided network multiple paths to the sink nodes are created for
each source node, and the packets encoded at source nodes are transmitted through the braided multipath
network model. Then, intermediate nodes re-encode these received packets and transfer these new packets to
next cluster. Finally, the multiple sink nodes decode the packets received from different paths and recover the
original data. Results of the analysis show that multicast NCMR provides more reliability. We compare
multicast NCMR routing protocol with NCMR unicast & also with traditional multipath routing protocol for
unicast and multicast networks, in terms of the packet loss, energy consumption, successful delivery ratio & end
to end delay when a packet is transmitted Some special simulations are carried out specially for NCMR
multicast i.e. effect of number of nodes on energy consumption, packet loss & end to end delay.
Keywords - Wireless Sensor Network, Multipath Routing, Network Coding, Energy efficiency, TMR, NCMR
I. INTRODUCTION
A wireless sensor network is a collection of no.
of nodes deployed in work place. Every sensor node
consist of three subsystems are sensor subsystem,
processing subsystem &communication subsystem.
Individual sensor have limited sensing region,
processing power & energy. Networking a large
number of sensors gives rise to robust, reliable &
accurate sensor network covering wider region. The
WSN may consist of 1000s or 10000s nodes. There
are two important features of WSN.First is nodes in
WSN’s transmit the data through wireless channels,
but mostly the link quality of wireless channel is bad
due to instability. And second is nodes are used
batteries as power supply. But the battery life is
limited. Therefore a reliable WSN can be
considering with low energy consumption & higher
successful delivery ratio.
A lot of work is done & different technologies
are developed to improve the energy efficiency &
SDR of WSNs.Multipath routing [10-15] is one of
the technology used to increase reliability of
wireless sensor network. This technique creates no.
of path from each source node to sink (destination
node).Due to this no. of duplicate data copies are
sent through this path. This process increases
reliability by increasing redundancy & redundancy
results in more energy consumption. Forward error
correcting is another technology which also
increases reliability. In FEC technique the sender
encodes the initial data to new codeword with some
redundant bit. Some bits of the data may become
garbage in the channel during the transmissions, but
at the end receiver can retrieve the authentic data
with the redundant bits while the number of
inaccurate bits is not more than the correcting
capacity of FEC. Means it improves the reliability
without retransmission, which is convenient for
wireless networks. But, the disadvantage of FEC is
that in FEC all the original data bits and redundant
data bits in the same packets, and if any one of the
nodes in the route stop working, the packets cannot
successfully transport, so FEC scheme is not
efficient for WSNs. Ideal WSNs should satisfied the
following three requirement. First, it should
decreases the data redundancy. Secondly, it should
avoid retransmission. Third, it is durable to failure of
nodes. Network coding may satisfied that three
requirements. Network coding combine with
multipath routing to obtain energy efficient wireless
sensor network. But this system is implemented for
RESEARCH ARTICLE OPEN ACCESS
Gunjal M.S. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 3), December 2014, pp.78-83
www.ijera.com 79 | P a g e
multicast network model & some intermediate nodes
are considered to be coded.
The flow of this paper is listed as follows.
First, we propose a energy efficient WSN using
NCMR, that help to reduce the number of required
paths and the times of data transmissions. Second,
we compare NCMR routing protocol with traditional
multipath routing protocol for unicast and multicast
network, in terms of the signal delivery ratio, energy
consumption ,packet loss & end to end delay. In
third, we show that different parameters with respect
to number of nodes for NCMR multicast.
The remainder part of this paper is
organized as follows. In Section II, network coding.
In section III, network model used in simulation is
described. In Section IV, we design different
algorithms to permit network coding to worked on
braided multipath networks so that we can obtain the
simulation results. In Section V, We show the results
of extensive simulations , the last section
summarizes the main conclusion.
II. NETWORK CODING SCHEME
In Network coding [1,9] scheme the
intermediate nodes combine packets before
forwarding. Due to this practice of network coding
total no. of transmission & time of transmission is
reduced. Figure.1 shows the random linear network
coding means when there are data to be transmitted
from the source node, these packets are split into K
packets. The source node randomly selects (K+n) ×
K elements from a Galois field to be a coefficient
matrix, and code these K original packets into (K+n)
new packets. Multiply each row vector of the
coefficient matrix by the K original packets is a new
packet which is a linear mixture of these original
packets. Intermediate nodes which are coded nodes
need to be recoding the received packets, and then
these recoded packets send to next cluster. At last
when the destination node successfully receives K
packets of these (K+n) packets, it decodes and
retrieve original data.
Fig.1. Random linear network coding[15]
III. NETWORK MODEL
There are two models of multipath n/w model. Figure
2 shows one of that braided multipath routing model &
another is disjoint n/w model. The braided multipath n/w
model is unicast consist of single source & sink
(destination node) & many intermediate nodes. We
assume that N is no. of paths, therefore total number of
nodes in a cluster is equal to N. There are N-1 backup
nodes for each intermediate node.
Figure.2.Unicast network model[15]
Gunjal M.S. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 3), December 2014, pp.78-83
www.ijera.com 80 | P a g e
Figure.2.Unicast network model[15]
Multicast Network Model
There is only one source node and sink node in
unicast models, and base paper shows that network
coding is dominant in both unicast network and
multicast network model. Fig.3 shows the network
models with single source and multiple sinks are
worthwhile to address i.e. multicast Multicast (one
to-many) is a communication sample in which a
source node sends a message to a group of
destination nodes. Again, multicast network can be
established by sending different unicast (point-to-
point) messages to each of the destination nodes.
There are many cause which make the multicasting
advisable. The first major advantage of using
multicasting is the decreases of the network load.
There are many applications like ticker applications
which are used to transfer packets to different of
stations .The packets sent to these stations share a
group of links on their paths to their destinations. As
multicasting requires the broadcasting of only a
single packet by the source and replicates this
packets at the sink node. Only drawback is multicast
transmission can consume more network bandwidth.
IV. ALGORITHMS FOR PROTOCOL
DESIGN
To obtain simulation result we require a
protocol to facilitate network coding to be deployed
in a braided multipath routing network. Similar to
other routing protocols, the protocol also mainly
consists of routing discovery algorithm, data
disseminating algorithm, and routing maintenance
algorithm.[15]
4.1 Algorithm [15]
1: Routing discovery algorithm Demand: It is
assume that source node must have
knowledge of link quality.
1: //Step 1. To obtain the minimum hops to
sink node
2: The destination (sink) nodes overflow a
route recognition packet (RRP).
3: For each node except destination node
receiving RRP
4: Then transfer ahead the packet.
5: Updates the shortest route to destination and
report all the nodes in the shortest route.
6: Report and updates the number of hops of
the shortest route (H).
7: End
8: //Step2. Routing founding
9: The source node S calculates the number of
essential paths (N) that is equivalent to no.
of total nodes.
10: Then node S sends the value of N to its next
node in downward direction P which is the
first hop in the shortest route to the
destination.
11: Node P finds other N - 1 nodes to provide as
its (supporting) backup nodes. These N
nodes form a (bunch) cluster.
12: Node P sends the value of N to its next
downstream node Q, and node Q performs
the same role as in step 11.
13: If destination (sink) node is reached
14: Finish routing founding.
15: Else
16: Continue routing founding.
17: End
In routing discovery stage, any intermediate node is
used for data transmission must record source nodes
in its cache.
4.2 Algorithm 2: Data Disseminating
Demand: Operations on Galois field are previously
implemented in sensor nodes.
1: //Step 1. Programming at source node
2: The source node S programmes the original K
packets into K’ new packets.
3: Send the new packets to next hop.
Gunjal M.S. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 3), December 2014, pp.78-83
www.ijera.com 81 | P a g e
4: //Step2. Programming at intermediate nodes
5: For each intermediate node
6: If no. of received packets are R>=K%R
7: Then arbitrarily generates a K*K matrix M
to be local coding kernel.
8: Encodes these R packets into K new packets
with matrix M.
9: Else
10: Arbitrarily generates a R*R matrix M to be
local coding kernel
11: Encodes these R packets into R’ new packets
with matrix M.
12: End
13: Transfer the new packets to next hop.
14: End
15: //Step3. Decoding by the destination node
16: If R > = K
17: The destination node recollect the original
packets through Gaussian elimination.
18: End
4.3 Algorithm 3: Routing maintenance
Demand of Algorithm: The routing maintenance
packet (RMP) should be broadcast periodically by
source node.
1: For each head node of cluster receiving
RMP
2: If RMP is from upstream cluster
3: Then forwards it to downstream cluster
4: Else if RMP is from its supporting (backup)
nodes.
5: Save the node identification and increment
counter with 1
6: Answer a message to the backup node.
7: End
8: Then transfer these RMP to the head node of
cluster of next hop.
9: End
10: If counter <N
11: If it selects (N-counter) free nodes to be its
backup nodes.
12: End
13: For each supporting (backup) node receiving
RMP
14: Transmit the RMP to head node of cluster
and waits for a respond.
15: If reply is not received % Cluster-head node
get fails.
16: Choose a new head node of cluster and finds
a new supporting (backup) node.
17: End
18: At the end, the destination node discards
RMP.
4.4 Experimental Set-Up
Table.1 Simulation Parameters
VI. RESULT ANALYSIS
Simulation are done on NCMR unicast and
multicast network as well as TMR multicast and
comparison is done.The graphical result shows that
energy consumption of NCMR multicast is less as
compare to NCMR unicast and TMR unicast as well
as multicast.Fig.4 shows graph of energy
consumption versus bit error rate.Fig.5 shows graph
of successful delivery ratio versus bit error rate.It
observed that SDR of NCMR for multicast is more
than SDR of NCMR for unicast & TMR for unicast
as well as multicast. The comparison is also done in
terms of end to end delay and packet loss.(Fig.6 & 7)
Fig .4. Energy Consumption
Parameters Values Parameters Values
Network plot
300 × 100
m2
Mac layer
protocol
CSMA
Carrier
frequency
2.413e+6Hz
No. of Sink
nodes
04
Max sending
power
50 mw
Net layer
head length
32 bit
Mac layer
head length
24 bit
No. of
source
nodes
01
Gunjal M.S. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 3), December 2014, pp.78-83
www.ijera.com 82 | P a g e
Fig.5.Sucessfull Delivery Ratio
Special simulations are carried out on NCMR
for mulicast network .The Fig 8 shows a graph
number of nodes Vs end to end delay, packet loss in
Fig 9,average energy consumption Fig.10.Graphs
shows as no of nodes increases the energy
consumption increases ,End to end delay decreases
and packet loss also decreases.
Fig.6.End to End Delay
Fig.7.Packet Loss
Fig.8.Nodes Vs End to End Delay
Fig.9.Nodes Vs packet loss
Gunjal M.S. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 3), December 2014, pp.78-83
www.ijera.com 83 | P a g e
Fig.10.Nodes Vs energy consumption
VII. CONCLUSION
We develop a energy efficient ,network coding
based multipath routing protocol for multicast
network,which forwards packets through multiple
paths dynamically based on path durability and
coding opportunity. Comparative study is done
interms of different parameters for unicast and
multicast networks. And it is observed that NCMR
(for multicast) produces higher reliability and energy
efficiency. The NCMR with multiple sink & single
source node is employed. The results of simulations
show that NCMR for multicast is more efficient than
NCMR for unicast & TMR. Some special
simulations are carried out for NCMR(multicast) to
check efficiency.
FUTURE SCOPE
In terms of future work we can consider some
other parameters for simulation to prove that NCMR
is more reliable and energy efficient than traditional
multipath routing protocol. And it is assumed that
many intermediate nodes in the network are
permitted to carry out network coding, which
increases more processing work of nodes. So in
future we can decrease the no. of coded nodes.
References
[1] R. Ahlswede, N. Cai, S. R. Li, and R. W.
Yeung. Network information flow. IEEE
Transactions on Information Theory,
(4):1204–1216, 2000.
[2] D. Bein and S. Q. Zheng. An effective
algorithm for computing energy-efficient
broadcasting trees in all-wireless networks.
In Proc. of IEEE ICDCS, 2008 28
[3] P. Chaporkar and A. Proutiere. Adaptive
network coding and scheduling for
maximizing throughput in wireless
networks. In Proc. of ACM MobiCom, 2007.
[4] F. Dai and J. Wu. Efficient broadcasting in
ad hoc wireless networks using directional
antennas. IEEE Transactions on Parallel
and Distributed Systems, (4):1–13, 2006.
[5] F. Delgosha, E. Ayday, K. Chan, and F.
Fekri. Security services in wireless sensor
networks using sparse random coding. In
Proc. of IEEE INFOCOM, 2007.
[6] A. Dimakis, B. Godfrey, M.Wainwright, and
K. Ramchandran. Network coding for
distributed storage in peer-to-peer networks.
In Proc. of IEEE INFOCOM, 2007.
[7] C. Fragouli, J.Widmer, and J.-Y L. Boudec.
A network coding approach to energy
efficient broadcasting: from theory to
practice. In Proc. of IEEE INFOCOM,
2006..
[8] X. Y. Li, Y. Wu, S. J. Tang, and X. H. Xu.
Broadcast capacity for wireless ad hoc
networks. In Proc. Of IEEE MASS, 2008.
[9] J. Liu, D. Goeckel, and D. Towsley. Bounds
on the gain of network coding and
broadcasting in wireless networks. In Proc.
of IEEE INFOCOM, 2007.
[10] W. Lou and J. Wu. On reducing broadcast
redundancy in ad hoc wireless networks.
IEEE Transactions on Mobile Computing,
(2):111–122, 2002.
[11] A. Mohammed, M. Ould-Khaoua, L. M.
Mackenzie, and J. Abdulai. An adjusted
counter-based broadcast scheme for mobile
ad hoc networks. In Proc. of the Tenth
International Conference on Computer
Modeling and Simulation (UKSIM), 2008.
[12] W. Navidi and T. Camp. Stationary
distributions for the random waypoint
mobility model. IEEE Transactions on
Mobile Computing, (1):99–108, 2004. 29
[13] S. Pleisch, M. Balakrishnan, K. Birman, and
R. Renesse. MISTRAL: Efficient flooding in
mobile ad-hoc networks. In Proc. of ACM
MobiHoc, 2006.
[14] S. Sengupta, S. Rayanchu, and S. Banerjee.
An analysis of wireless network coding for
unicast sessions: The case for coding-aware
routing. In Proc. of IEEE INFOCOM, 2007.
[15] Lei Wang, Yuwang Yang* and Wei Zhao,
Network coding-based multipath routing for
energy efficiency in wireless sensor
networks EURASIP Journal on Wireless
Communications and Networking 2012,
2012:115

More Related Content

What's hot

Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHijsrd.com
 
Secured Data Aggregation using SRL Protocol for Wireless Sensor Networks
Secured Data Aggregation using SRL Protocol for Wireless Sensor NetworksSecured Data Aggregation using SRL Protocol for Wireless Sensor Networks
Secured Data Aggregation using SRL Protocol for Wireless Sensor NetworksAssociate Professor in VSB Coimbatore
 
energy efficiency routing protocol for ws ns
energy efficiency routing protocol for ws nsenergy efficiency routing protocol for ws ns
energy efficiency routing protocol for ws nsINFOGAIN PUBLICATION
 
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...IJECEIAES
 
Multi-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network ArchitectureMulti-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network Architectureijsrd.com
 
Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...eSAT Journals
 
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSEfficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSijircee
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkijcsa
 
Energy efficient routing_in_wireless_sensor_networks
Energy efficient routing_in_wireless_sensor_networksEnergy efficient routing_in_wireless_sensor_networks
Energy efficient routing_in_wireless_sensor_networksGr Patel
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNIJCNCJournal
 
Hybrid networking and distribution
Hybrid networking and distribution Hybrid networking and distribution
Hybrid networking and distribution vivek pratap singh
 

What's hot (19)

Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
 
Secured Data Aggregation using SRL Protocol for Wireless Sensor Networks
Secured Data Aggregation using SRL Protocol for Wireless Sensor NetworksSecured Data Aggregation using SRL Protocol for Wireless Sensor Networks
Secured Data Aggregation using SRL Protocol for Wireless Sensor Networks
 
Bn25384390
Bn25384390Bn25384390
Bn25384390
 
energy efficiency routing protocol for ws ns
energy efficiency routing protocol for ws nsenergy efficiency routing protocol for ws ns
energy efficiency routing protocol for ws ns
 
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
 
Multi-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network ArchitectureMulti-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network Architecture
 
Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...
 
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSEfficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor network
 
Energy efficient routing_in_wireless_sensor_networks
Energy efficient routing_in_wireless_sensor_networksEnergy efficient routing_in_wireless_sensor_networks
Energy efficient routing_in_wireless_sensor_networks
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
Aa35152156
Aa35152156Aa35152156
Aa35152156
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
 
Hybrid networking and distribution
Hybrid networking and distribution Hybrid networking and distribution
Hybrid networking and distribution
 
Enhancing Power Unbiased Cooperative Media Access Control Protocol in Manets
Enhancing Power Unbiased Cooperative Media Access Control Protocol in ManetsEnhancing Power Unbiased Cooperative Media Access Control Protocol in Manets
Enhancing Power Unbiased Cooperative Media Access Control Protocol in Manets
 
i2ct_submission_105
i2ct_submission_105i2ct_submission_105
i2ct_submission_105
 
40520130101003
4052013010100340520130101003
40520130101003
 

Viewers also liked

Presentation knowledgeengine
Presentation knowledgeenginePresentation knowledgeengine
Presentation knowledgeenginemariusgabris
 
Soal osn matematika sma kab. 2013
Soal osn matematika sma kab. 2013Soal osn matematika sma kab. 2013
Soal osn matematika sma kab. 2013thelesssonsblog
 
A Review: Welding Of Dissimilar Metal Alloys by Laser Beam Welding & Friction...
A Review: Welding Of Dissimilar Metal Alloys by Laser Beam Welding & Friction...A Review: Welding Of Dissimilar Metal Alloys by Laser Beam Welding & Friction...
A Review: Welding Of Dissimilar Metal Alloys by Laser Beam Welding & Friction...IJERA Editor
 
госпрограмма постановление от 19 июля 2013 г. № 330 пп
госпрограмма постановление от 19 июля 2013 г. № 330 ппгоспрограмма постановление от 19 июля 2013 г. № 330 пп
госпрограмма постановление от 19 июля 2013 г. № 330 ппpatriot29
 
Οι Υπερέξι
Οι ΥπερέξιΟι Υπερέξι
Οι ΥπερέξιSTALENA
 
Suriye iç savaşının 2014 insani bilançosu
Suriye iç savaşının 2014 insani bilançosuSuriye iç savaşının 2014 insani bilançosu
Suriye iç savaşının 2014 insani bilançosuAksiyon Dergisi
 
Adsorptive Removal Of Dye From Industrial Dye Effluents Using Low-Cost Adsorb...
Adsorptive Removal Of Dye From Industrial Dye Effluents Using Low-Cost Adsorb...Adsorptive Removal Of Dye From Industrial Dye Effluents Using Low-Cost Adsorb...
Adsorptive Removal Of Dye From Industrial Dye Effluents Using Low-Cost Adsorb...IJERA Editor
 
Study on Thinning
Study on Thinning Study on Thinning
Study on Thinning RMwebsite
 
Green Roofs and Green Building Rating Systems
Green Roofs and Green Building Rating SystemsGreen Roofs and Green Building Rating Systems
Green Roofs and Green Building Rating SystemsIJERA Editor
 
Echando Raices: Hispanics Building a Life and Legacy in Western New York
Echando Raices: Hispanics Building a Life and Legacy in Western New YorkEchando Raices: Hispanics Building a Life and Legacy in Western New York
Echando Raices: Hispanics Building a Life and Legacy in Western New YorkThe Buffalo History Museum
 
Qcl 14-v3 flowchart-banasthali university­_shipra yadav
Qcl 14-v3 flowchart-banasthali university­_shipra yadavQcl 14-v3 flowchart-banasthali university­_shipra yadav
Qcl 14-v3 flowchart-banasthali university­_shipra yadavSakshi Sharma
 
Designing instruction laying the foundation
Designing instruction laying the foundationDesigning instruction laying the foundation
Designing instruction laying the foundationKathleen Stone
 

Viewers also liked (19)

Presentation knowledgeengine
Presentation knowledgeenginePresentation knowledgeengine
Presentation knowledgeengine
 
презентация1
презентация1презентация1
презентация1
 
Soal osn matematika sma kab. 2013
Soal osn matematika sma kab. 2013Soal osn matematika sma kab. 2013
Soal osn matematika sma kab. 2013
 
A Review: Welding Of Dissimilar Metal Alloys by Laser Beam Welding & Friction...
A Review: Welding Of Dissimilar Metal Alloys by Laser Beam Welding & Friction...A Review: Welding Of Dissimilar Metal Alloys by Laser Beam Welding & Friction...
A Review: Welding Of Dissimilar Metal Alloys by Laser Beam Welding & Friction...
 
From biomarkers to diagnostics –the road to success
From biomarkers to diagnostics –the road to successFrom biomarkers to diagnostics –the road to success
From biomarkers to diagnostics –the road to success
 
госпрограмма постановление от 19 июля 2013 г. № 330 пп
госпрограмма постановление от 19 июля 2013 г. № 330 ппгоспрограмма постановление от 19 июля 2013 г. № 330 пп
госпрограмма постановление от 19 июля 2013 г. № 330 пп
 
Webinar Turboseo: Ирина Белка
Webinar Turboseo: Ирина БелкаWebinar Turboseo: Ирина Белка
Webinar Turboseo: Ирина Белка
 
Οι Υπερέξι
Οι ΥπερέξιΟι Υπερέξι
Οι Υπερέξι
 
Suriye iç savaşının 2014 insani bilançosu
Suriye iç savaşının 2014 insani bilançosuSuriye iç savaşının 2014 insani bilançosu
Suriye iç savaşının 2014 insani bilançosu
 
Adsorptive Removal Of Dye From Industrial Dye Effluents Using Low-Cost Adsorb...
Adsorptive Removal Of Dye From Industrial Dye Effluents Using Low-Cost Adsorb...Adsorptive Removal Of Dye From Industrial Dye Effluents Using Low-Cost Adsorb...
Adsorptive Removal Of Dye From Industrial Dye Effluents Using Low-Cost Adsorb...
 
Luksemburg ulke raporu_2013
Luksemburg ulke raporu_2013Luksemburg ulke raporu_2013
Luksemburg ulke raporu_2013
 
Study on Thinning
Study on Thinning Study on Thinning
Study on Thinning
 
Green Roofs and Green Building Rating Systems
Green Roofs and Green Building Rating SystemsGreen Roofs and Green Building Rating Systems
Green Roofs and Green Building Rating Systems
 
Vedere guardare mostrare
Vedere guardare mostrareVedere guardare mostrare
Vedere guardare mostrare
 
spic en span
spic en spanspic en span
spic en span
 
Echando Raices: Hispanics Building a Life and Legacy in Western New York
Echando Raices: Hispanics Building a Life and Legacy in Western New YorkEchando Raices: Hispanics Building a Life and Legacy in Western New York
Echando Raices: Hispanics Building a Life and Legacy in Western New York
 
Qcl 14-v3 flowchart-banasthali university­_shipra yadav
Qcl 14-v3 flowchart-banasthali university­_shipra yadavQcl 14-v3 flowchart-banasthali university­_shipra yadav
Qcl 14-v3 flowchart-banasthali university­_shipra yadav
 
Madagaskar ulke raporu_2013
Madagaskar ulke raporu_2013Madagaskar ulke raporu_2013
Madagaskar ulke raporu_2013
 
Designing instruction laying the foundation
Designing instruction laying the foundationDesigning instruction laying the foundation
Designing instruction laying the foundation
 

Similar to Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath Routing Protocol For Multicast Network

“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...eSAT Publishing House
 
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETProviding A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETEditor IJCATR
 
A modified approach for secure routing and power aware in mobile ad hoc network
A modified approach for secure routing and power aware in mobile ad hoc networkA modified approach for secure routing and power aware in mobile ad hoc network
A modified approach for secure routing and power aware in mobile ad hoc networkDiksha Katiyar
 
An Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
An Energy Efficient Routing Protocol Using NCPR and GNDA AlgorithmsAn Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
An Energy Efficient Routing Protocol Using NCPR and GNDA AlgorithmsVignesh DJ Viki
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...acijjournal
 
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...IJEACS
 
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...IJERA Editor
 
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...IJERA Editor
 
Active path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wirelessActive path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wirelessAlexander Decker
 
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh NetworksActive Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networkschetan1nonly
 
Iterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionIterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionijasuc
 
V.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AAV.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AAKARTHIKEYAN V
 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...IJCNCJournal
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routingIJCNCJournal
 
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...AIRCC Publishing Corporation
 
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IJNSA Journal
 

Similar to Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath Routing Protocol For Multicast Network (20)

“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...
 
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETProviding A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
 
ENERGY EFFICIENT ROUTING ALGORITHM
ENERGY EFFICIENT ROUTING ALGORITHMENERGY EFFICIENT ROUTING ALGORITHM
ENERGY EFFICIENT ROUTING ALGORITHM
 
A modified approach for secure routing and power aware in mobile ad hoc network
A modified approach for secure routing and power aware in mobile ad hoc networkA modified approach for secure routing and power aware in mobile ad hoc network
A modified approach for secure routing and power aware in mobile ad hoc network
 
An Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
An Energy Efficient Routing Protocol Using NCPR and GNDA AlgorithmsAn Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
An Energy Efficient Routing Protocol Using NCPR and GNDA Algorithms
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
 
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
 
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
 
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...
 
Active path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wirelessActive path updation for layered routing (apular) in wireless
Active path updation for layered routing (apular) in wireless
 
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh NetworksActive Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networks
 
Iterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmissionIterative network channel decoding with cooperative space-time transmission
Iterative network channel decoding with cooperative space-time transmission
 
V.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AAV.KARTHIKEYAN PUBLISHED ARTICLE AA
V.KARTHIKEYAN PUBLISHED ARTICLE AA
 
The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...The improvement of end to end delays in network management system using netwo...
The improvement of end to end delays in network management system using netwo...
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routing
 
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
Energy Location Aware Routing Protocol (ELARP) for Wireless Multimedia Sensor...
 
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
 
M010226367
M010226367M010226367
M010226367
 
Aa35152156
Aa35152156Aa35152156
Aa35152156
 

Recently uploaded

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Recently uploaded (20)

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 

Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath Routing Protocol For Multicast Network

  • 1. Gunjal M.S. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 12( Part 3), December 2014, pp.78-83 www.ijera.com 78 | P a g e Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath Routing Protocol For Multicast Network Gunjal M.S.1 , Prof.S.A.Shaikh2 *(Department of Electronics & Telecommunication, PUNE University, Loni-413736) ** (Department of Electronics & Telecommunication, PUNE University, Loni-413736) ABSTRACT Network Coding is most promising aspect of WSN. This Network Coding method is combined with multipath routing protocol to form NCMR protocol.(network coding based multipath routing protocol).This protocol is used to obtain energy efficient wireless sensor network.. These protocol leads to decrease the number of constrain routes & the total time of transmission. This protocol is applied on unicast and multicast network separately. And comparison is done with traditional multipath routing protocol for same unicast and multicast network. Simulation result shows energy consumption of NCMR multicast is lower than NCMR unicast and also than TMR unicast as well as multicast. This work is proved by the simulation analysis results. The used multipath model is based on braided multipath routing, and the network coding method is random linear network coding (practical network coding). In braided network multiple paths to the sink nodes are created for each source node, and the packets encoded at source nodes are transmitted through the braided multipath network model. Then, intermediate nodes re-encode these received packets and transfer these new packets to next cluster. Finally, the multiple sink nodes decode the packets received from different paths and recover the original data. Results of the analysis show that multicast NCMR provides more reliability. We compare multicast NCMR routing protocol with NCMR unicast & also with traditional multipath routing protocol for unicast and multicast networks, in terms of the packet loss, energy consumption, successful delivery ratio & end to end delay when a packet is transmitted Some special simulations are carried out specially for NCMR multicast i.e. effect of number of nodes on energy consumption, packet loss & end to end delay. Keywords - Wireless Sensor Network, Multipath Routing, Network Coding, Energy efficiency, TMR, NCMR I. INTRODUCTION A wireless sensor network is a collection of no. of nodes deployed in work place. Every sensor node consist of three subsystems are sensor subsystem, processing subsystem &communication subsystem. Individual sensor have limited sensing region, processing power & energy. Networking a large number of sensors gives rise to robust, reliable & accurate sensor network covering wider region. The WSN may consist of 1000s or 10000s nodes. There are two important features of WSN.First is nodes in WSN’s transmit the data through wireless channels, but mostly the link quality of wireless channel is bad due to instability. And second is nodes are used batteries as power supply. But the battery life is limited. Therefore a reliable WSN can be considering with low energy consumption & higher successful delivery ratio. A lot of work is done & different technologies are developed to improve the energy efficiency & SDR of WSNs.Multipath routing [10-15] is one of the technology used to increase reliability of wireless sensor network. This technique creates no. of path from each source node to sink (destination node).Due to this no. of duplicate data copies are sent through this path. This process increases reliability by increasing redundancy & redundancy results in more energy consumption. Forward error correcting is another technology which also increases reliability. In FEC technique the sender encodes the initial data to new codeword with some redundant bit. Some bits of the data may become garbage in the channel during the transmissions, but at the end receiver can retrieve the authentic data with the redundant bits while the number of inaccurate bits is not more than the correcting capacity of FEC. Means it improves the reliability without retransmission, which is convenient for wireless networks. But, the disadvantage of FEC is that in FEC all the original data bits and redundant data bits in the same packets, and if any one of the nodes in the route stop working, the packets cannot successfully transport, so FEC scheme is not efficient for WSNs. Ideal WSNs should satisfied the following three requirement. First, it should decreases the data redundancy. Secondly, it should avoid retransmission. Third, it is durable to failure of nodes. Network coding may satisfied that three requirements. Network coding combine with multipath routing to obtain energy efficient wireless sensor network. But this system is implemented for RESEARCH ARTICLE OPEN ACCESS
  • 2. Gunjal M.S. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 12( Part 3), December 2014, pp.78-83 www.ijera.com 79 | P a g e multicast network model & some intermediate nodes are considered to be coded. The flow of this paper is listed as follows. First, we propose a energy efficient WSN using NCMR, that help to reduce the number of required paths and the times of data transmissions. Second, we compare NCMR routing protocol with traditional multipath routing protocol for unicast and multicast network, in terms of the signal delivery ratio, energy consumption ,packet loss & end to end delay. In third, we show that different parameters with respect to number of nodes for NCMR multicast. The remainder part of this paper is organized as follows. In Section II, network coding. In section III, network model used in simulation is described. In Section IV, we design different algorithms to permit network coding to worked on braided multipath networks so that we can obtain the simulation results. In Section V, We show the results of extensive simulations , the last section summarizes the main conclusion. II. NETWORK CODING SCHEME In Network coding [1,9] scheme the intermediate nodes combine packets before forwarding. Due to this practice of network coding total no. of transmission & time of transmission is reduced. Figure.1 shows the random linear network coding means when there are data to be transmitted from the source node, these packets are split into K packets. The source node randomly selects (K+n) × K elements from a Galois field to be a coefficient matrix, and code these K original packets into (K+n) new packets. Multiply each row vector of the coefficient matrix by the K original packets is a new packet which is a linear mixture of these original packets. Intermediate nodes which are coded nodes need to be recoding the received packets, and then these recoded packets send to next cluster. At last when the destination node successfully receives K packets of these (K+n) packets, it decodes and retrieve original data. Fig.1. Random linear network coding[15] III. NETWORK MODEL There are two models of multipath n/w model. Figure 2 shows one of that braided multipath routing model & another is disjoint n/w model. The braided multipath n/w model is unicast consist of single source & sink (destination node) & many intermediate nodes. We assume that N is no. of paths, therefore total number of nodes in a cluster is equal to N. There are N-1 backup nodes for each intermediate node. Figure.2.Unicast network model[15]
  • 3. Gunjal M.S. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 12( Part 3), December 2014, pp.78-83 www.ijera.com 80 | P a g e Figure.2.Unicast network model[15] Multicast Network Model There is only one source node and sink node in unicast models, and base paper shows that network coding is dominant in both unicast network and multicast network model. Fig.3 shows the network models with single source and multiple sinks are worthwhile to address i.e. multicast Multicast (one to-many) is a communication sample in which a source node sends a message to a group of destination nodes. Again, multicast network can be established by sending different unicast (point-to- point) messages to each of the destination nodes. There are many cause which make the multicasting advisable. The first major advantage of using multicasting is the decreases of the network load. There are many applications like ticker applications which are used to transfer packets to different of stations .The packets sent to these stations share a group of links on their paths to their destinations. As multicasting requires the broadcasting of only a single packet by the source and replicates this packets at the sink node. Only drawback is multicast transmission can consume more network bandwidth. IV. ALGORITHMS FOR PROTOCOL DESIGN To obtain simulation result we require a protocol to facilitate network coding to be deployed in a braided multipath routing network. Similar to other routing protocols, the protocol also mainly consists of routing discovery algorithm, data disseminating algorithm, and routing maintenance algorithm.[15] 4.1 Algorithm [15] 1: Routing discovery algorithm Demand: It is assume that source node must have knowledge of link quality. 1: //Step 1. To obtain the minimum hops to sink node 2: The destination (sink) nodes overflow a route recognition packet (RRP). 3: For each node except destination node receiving RRP 4: Then transfer ahead the packet. 5: Updates the shortest route to destination and report all the nodes in the shortest route. 6: Report and updates the number of hops of the shortest route (H). 7: End 8: //Step2. Routing founding 9: The source node S calculates the number of essential paths (N) that is equivalent to no. of total nodes. 10: Then node S sends the value of N to its next node in downward direction P which is the first hop in the shortest route to the destination. 11: Node P finds other N - 1 nodes to provide as its (supporting) backup nodes. These N nodes form a (bunch) cluster. 12: Node P sends the value of N to its next downstream node Q, and node Q performs the same role as in step 11. 13: If destination (sink) node is reached 14: Finish routing founding. 15: Else 16: Continue routing founding. 17: End In routing discovery stage, any intermediate node is used for data transmission must record source nodes in its cache. 4.2 Algorithm 2: Data Disseminating Demand: Operations on Galois field are previously implemented in sensor nodes. 1: //Step 1. Programming at source node 2: The source node S programmes the original K packets into K’ new packets. 3: Send the new packets to next hop.
  • 4. Gunjal M.S. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 12( Part 3), December 2014, pp.78-83 www.ijera.com 81 | P a g e 4: //Step2. Programming at intermediate nodes 5: For each intermediate node 6: If no. of received packets are R>=K%R 7: Then arbitrarily generates a K*K matrix M to be local coding kernel. 8: Encodes these R packets into K new packets with matrix M. 9: Else 10: Arbitrarily generates a R*R matrix M to be local coding kernel 11: Encodes these R packets into R’ new packets with matrix M. 12: End 13: Transfer the new packets to next hop. 14: End 15: //Step3. Decoding by the destination node 16: If R > = K 17: The destination node recollect the original packets through Gaussian elimination. 18: End 4.3 Algorithm 3: Routing maintenance Demand of Algorithm: The routing maintenance packet (RMP) should be broadcast periodically by source node. 1: For each head node of cluster receiving RMP 2: If RMP is from upstream cluster 3: Then forwards it to downstream cluster 4: Else if RMP is from its supporting (backup) nodes. 5: Save the node identification and increment counter with 1 6: Answer a message to the backup node. 7: End 8: Then transfer these RMP to the head node of cluster of next hop. 9: End 10: If counter <N 11: If it selects (N-counter) free nodes to be its backup nodes. 12: End 13: For each supporting (backup) node receiving RMP 14: Transmit the RMP to head node of cluster and waits for a respond. 15: If reply is not received % Cluster-head node get fails. 16: Choose a new head node of cluster and finds a new supporting (backup) node. 17: End 18: At the end, the destination node discards RMP. 4.4 Experimental Set-Up Table.1 Simulation Parameters VI. RESULT ANALYSIS Simulation are done on NCMR unicast and multicast network as well as TMR multicast and comparison is done.The graphical result shows that energy consumption of NCMR multicast is less as compare to NCMR unicast and TMR unicast as well as multicast.Fig.4 shows graph of energy consumption versus bit error rate.Fig.5 shows graph of successful delivery ratio versus bit error rate.It observed that SDR of NCMR for multicast is more than SDR of NCMR for unicast & TMR for unicast as well as multicast. The comparison is also done in terms of end to end delay and packet loss.(Fig.6 & 7) Fig .4. Energy Consumption Parameters Values Parameters Values Network plot 300 × 100 m2 Mac layer protocol CSMA Carrier frequency 2.413e+6Hz No. of Sink nodes 04 Max sending power 50 mw Net layer head length 32 bit Mac layer head length 24 bit No. of source nodes 01
  • 5. Gunjal M.S. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 12( Part 3), December 2014, pp.78-83 www.ijera.com 82 | P a g e Fig.5.Sucessfull Delivery Ratio Special simulations are carried out on NCMR for mulicast network .The Fig 8 shows a graph number of nodes Vs end to end delay, packet loss in Fig 9,average energy consumption Fig.10.Graphs shows as no of nodes increases the energy consumption increases ,End to end delay decreases and packet loss also decreases. Fig.6.End to End Delay Fig.7.Packet Loss Fig.8.Nodes Vs End to End Delay Fig.9.Nodes Vs packet loss
  • 6. Gunjal M.S. Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 12( Part 3), December 2014, pp.78-83 www.ijera.com 83 | P a g e Fig.10.Nodes Vs energy consumption VII. CONCLUSION We develop a energy efficient ,network coding based multipath routing protocol for multicast network,which forwards packets through multiple paths dynamically based on path durability and coding opportunity. Comparative study is done interms of different parameters for unicast and multicast networks. And it is observed that NCMR (for multicast) produces higher reliability and energy efficiency. The NCMR with multiple sink & single source node is employed. The results of simulations show that NCMR for multicast is more efficient than NCMR for unicast & TMR. Some special simulations are carried out for NCMR(multicast) to check efficiency. FUTURE SCOPE In terms of future work we can consider some other parameters for simulation to prove that NCMR is more reliable and energy efficient than traditional multipath routing protocol. And it is assumed that many intermediate nodes in the network are permitted to carry out network coding, which increases more processing work of nodes. So in future we can decrease the no. of coded nodes. References [1] R. Ahlswede, N. Cai, S. R. Li, and R. W. Yeung. Network information flow. IEEE Transactions on Information Theory, (4):1204–1216, 2000. [2] D. Bein and S. Q. Zheng. An effective algorithm for computing energy-efficient broadcasting trees in all-wireless networks. In Proc. of IEEE ICDCS, 2008 28 [3] P. Chaporkar and A. Proutiere. Adaptive network coding and scheduling for maximizing throughput in wireless networks. In Proc. of ACM MobiCom, 2007. [4] F. Dai and J. Wu. Efficient broadcasting in ad hoc wireless networks using directional antennas. IEEE Transactions on Parallel and Distributed Systems, (4):1–13, 2006. [5] F. Delgosha, E. Ayday, K. Chan, and F. Fekri. Security services in wireless sensor networks using sparse random coding. In Proc. of IEEE INFOCOM, 2007. [6] A. Dimakis, B. Godfrey, M.Wainwright, and K. Ramchandran. Network coding for distributed storage in peer-to-peer networks. In Proc. of IEEE INFOCOM, 2007. [7] C. Fragouli, J.Widmer, and J.-Y L. Boudec. A network coding approach to energy efficient broadcasting: from theory to practice. In Proc. of IEEE INFOCOM, 2006.. [8] X. Y. Li, Y. Wu, S. J. Tang, and X. H. Xu. Broadcast capacity for wireless ad hoc networks. In Proc. Of IEEE MASS, 2008. [9] J. Liu, D. Goeckel, and D. Towsley. Bounds on the gain of network coding and broadcasting in wireless networks. In Proc. of IEEE INFOCOM, 2007. [10] W. Lou and J. Wu. On reducing broadcast redundancy in ad hoc wireless networks. IEEE Transactions on Mobile Computing, (2):111–122, 2002. [11] A. Mohammed, M. Ould-Khaoua, L. M. Mackenzie, and J. Abdulai. An adjusted counter-based broadcast scheme for mobile ad hoc networks. In Proc. of the Tenth International Conference on Computer Modeling and Simulation (UKSIM), 2008. [12] W. Navidi and T. Camp. Stationary distributions for the random waypoint mobility model. IEEE Transactions on Mobile Computing, (1):99–108, 2004. 29 [13] S. Pleisch, M. Balakrishnan, K. Birman, and R. Renesse. MISTRAL: Efficient flooding in mobile ad-hoc networks. In Proc. of ACM MobiHoc, 2006. [14] S. Sengupta, S. Rayanchu, and S. Banerjee. An analysis of wireless network coding for unicast sessions: The case for coding-aware routing. In Proc. of IEEE INFOCOM, 2007. [15] Lei Wang, Yuwang Yang* and Wei Zhao, Network coding-based multipath routing for energy efficiency in wireless sensor networks EURASIP Journal on Wireless Communications and Networking 2012, 2012:115