SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 7, Issue 9 (July 2013), PP. 70-73
70
Understanding a Broadcast Service in Low Duty-Cycle
Wireless Sensor Network
Pankaj G. Ingole1
, Asst. Prof. Archana R. Raut2
1
Department of Computer Science & Engineering, GHRCE, Nagpur
2
Department of Computer Science & Engineering, GHRCE, Nagpur
Abstract:- In low-duty-cycle networks, sensors stay dormant most of time to save their energy and wake up
based on their needs. Such a technique, while prolonging the network lifetime, sets excessive challenges for
efficient broadcast within the network. Broadcast service is widely used during the life time of a wireless sensor
network (WSN), such as networking setup, data collection/storage and query answering. In the past few years,
many works have been done to improve its efficiency by reducing redundant broadcast messages. However,
most of these works assume that all sensor nodes are active throughout a broadcast process and thus are difficult
to be deployed in low duty-cycled WSNs where sensor nodes alternate between active and dormant states, so as
to conserve energy and extend the network lifetime. These conventional approaches could easily fail to cover
the whole network in an acceptable time frame. To this end, we conclude the paper with insights for research
directions about broadcast service in low duty cycle wireless sensor network(WSN).
Keyword:- Broadcast, duty cycle, wireless sensor networks
I. INTRODUCTION
Wireless sensor networks (WSNs) have been used in many long-term sustainable applications such as
environment monitoring, target tracking and infrastructure protection [7]. To guarantee service continuity, a
sensor network normally operates at a very-low-duty-cycle (e.g., 5% or less), in which a sensor node schedules
itself to be active briefly and then stays dormant for a long time. While the lifespan of a network is greatly
prolonged, such low-duty-cycle operation significantly reduces the performance of many network operations
including flooding [4], [6], an important networking primitive for code dissemination, system configuration, and
routing tree formation. Due to the loss of connectivity when sensor nodes are sleeping, the performance of
flooding degrades significantly. It has been studied [4] that the flooding coverage ratio of a pure flooding
process drops to less than 10% as the duty cycle of the network decreases to 5%, showing strong evidence of the
demand for a tailored flooding design for low-duty-cycle networks.
One of the most essential services in wireless sensor networks is broadcast [1], which facilitates sensor
nodes to efficiently propagate messages among the whole network. During networking setup, control messages
may be propagated from the sink to all sensor nodes. For data collection, interest messages may be flooded from
the sink. On observing an event, a sensor node may broadcast a message to coordinate with other nodes to trace
the event and store sensing data. For query answering, the sink may flood the query message among the whole
network to retrieve result data. Thus the efficiency and reliability of broadcast service greatly affects the overall
performance of WSN. Generally, if we assume all sensor nodes are active during a broadcast (referred as all-
node-active assumption), then ideally every node needs to forward the broadcast message at most once to
accomplish the broadcast. Based on this assumption, two basic approaches named flooding and gossiping [1]
were proposed in early stage. To overcome the unstable nature of wireless communication, where a forwarded
message may get lost and only arrive at a subset of a node’s neighbors, many efforts have been done to improve
the reliability of the broadcast service while still keeping efficient. Two past works among them are Smart
Gossip [12] and RBP [13].
However, due to energy constraints, in many applications, sensor nodes are expected to work under low
duty cycle [14], where they may turn down for a while to save energy, then turn up to perform sensing tasks and
necessary communications and then turn down again. By this means, the energy of sensor nodes may be saved
and the lifetime of the whole network thus may be largely extended.
In a low duty-cycled WSN, if the number of nodes is very small, the previous all-node-active assumption for
broadcast may still be kept valid by using global synchronization so that all nodes can wake up together at some
time point, or to pre-determine a rigid schedule so that node waking up and broadcast message forwarding can
be pre-computed. However, for large-scale WSNs, synchronization itself is still an open issue and to pre-
determine a rigid schedule is sometimes too complicated with the consideration of the application and
environment specifics.
Understanding a Broadcast Service in Low Duty-Cycle Wireless Sensor Network
71
The broadcast problem is revisited under a more realistic scenario, where sensor nodes are deployed in
large scale and work in low duty-cycle. To solve this problem, several issues need to be considered. First,
because nodes may turn up and down before and during the broadcast process, the topology of active nodes may
change frequently and dramatically. Also, the large number of sensor nodes makes it impossible to pre-
determine a rigid schedule and use global synchronization to keep all nodes active during broadcast.
Furthermore, the up-down patterns are generally application-specified and dynamically affected by the deployed
environment, and thus can not be determined beforehand. As a result it is impossible for a sensor node to find an
optimal time point for forwarding so that all its neighbors are active and ready to receive the message. Even
with such oracle knowledge, waiting for such time point may still take too much time and leave the message
out-of-date.
With above considerations, we propose further research of broadcast service in low duty cycle wireless
sensor network.
II RELATED WORK
Under low duty cycle conventional broadcast strategies assuming all-node-active would either suffer
from poor performance or simply fail to cover the network. Flooding and gossiping [1] are two basic approaches
used for broadcast in wireless sensor networks. In a WSN, flooding lets every node forward the received
broadcast message and thus may cause message implosion in the network. To solve this problem, gossiping
instead lets a node forward a received broadcast message only with some probability, where the challenge lies in
how to determine the forwarding probability for each node so as to keep the broadcast still efficient and reliable.
Many improvements have been proposed based on these two basic approaches. One work is Smart Gossip [12].
To determine the forwarding probability for each sensor node, the algorithm depends on previous broadcasts
and adaptively adjust the probability to match the topological properties among sensor nodes. Another work is
RBP [13], which is essentially a flooding-based approach. It lets each node flood the received broadcast
message only once, and then by overhearing and explicit ACKs, a node may do some retransmissions for local
repairs. Both the retransmission thresholds and the number of retries depend on the node density and topology
information gathered from previous broadcasts.
There have been recent works investigating low duty cycle wireless sensor networks [2], [3], [4], [5],
[6], [7],[8],[10]. Work in [2] remodeled broadcast problem in new context and showed that it is equivalent to
shortest path problem in a time-convergence graph. Accordingly presented an optimal centralized solution. In
[3], propose L2 practical design of data forwarding in low duty cycle wireless sensor networks. L2 addresses
link burstiness using multivariate Bernoulli link model.L2 enables sensor nodes to work in lazy mode, keep their
radios off as long as they can, and allocates the precious energy for only a limited number of promising
transmissions.
The work introduces in [4] Opportunistic Flooding is a flooding method specially designed for low-
duty-cycle wireless sensor networks. Its main objective is to reduce redundancy in transmission while achieving
fast dissemination.
A dynamic data forwarding(DDF) scheme for low-duty-cycle wireless sensor networks, which
combines a realistic link model with asynchronous duty cycle. The results show that DDF can reduce end-to-end
delay, guarantee delivery ratio and improve network lifetime[6]. Correlated flooding, an energy-efficient
flooding design for low-duty-cycle WSNs that solves the problem caused by both low-duty-cycle operation and
ACK implosion[7]. The goal of Correlated Flooding is to exploit link correlation in the construction of an
energy efficient flooding tree, to save the energy consumption on both data packets and ACKs. First the energy
consumption on transmitting data packets can be reduced compared with flooding tree that only considers limk
quality. ALOHA- like neighbor discovery algorithm solves the problem of neighbor discovery in low duty cycle
WSNs[8].
The flooding algorithm is a commonly used algorithm intended for network-wide dissemination of
data, commands and configurations, but its energy consumption is usually high which conflicts with the limited
resource feature of WSNs.The unreliable and reliable implementation methods of opportunistic flooding to
provide a reference to further optimize the energy cost of flooding. Depending on different network densities,
different data packet sizes and duty cycles, the two implementation methods present different characteristics in
terms of energy cost flooding delivery ratio[9].
III. PROPOSED WORK
In proposed work, we revisit the broadcast problem under a more realistic scenario, where sensor nodes
are deployed in large scale and work in low duty-cycle. To solve this problem,
several issues need to be considered. First, because nodes may turn up and down before and during the
broadcast process, the topology of active nodes may change frequently and dramatically. Also, the large number
of sensor nodes makes it impossible to pre-determine a rigid schedule and use global synchronization to keep all
Understanding a Broadcast Service in Low Duty-Cycle Wireless Sensor Network
72
nodes active during broadcast. Furthermore, the up-down patterns are generally application-specified and
dynamically affected by the deployed environment, and thus can not be determined beforehand. As a result it is
impossible for a sensor node to find an optimal time point for forwarding so that all its neighbors are active and
ready to receive the message. Waiting for such time point may still take too much time and leave the message
out-of-date.
With above considerations, we are proposing an approach which will provide efficient broadcast
service in low duty cycle wireless sensor network. We describe the basic network model and introduces the
assumption used in the paper. In this section, we reformulate the broadcast problem in low duty-cycle wireless
sensor networks. To reflect the operation nature of real sensor products and also to simplify exposition, we
divide time into equal-length slots. The active and dormant periods are both integer multiples of time slots, and
in each slot, an active node can either receive or forward one message only. We make following assumptions in
our network model :
Slotted time model: the time axis is divided into time slots with equal length. The duration of each time slot is
appropriate for the transmission of one packet. Local synchronization: the system works in a locally
synchronized mode. With local synchronization, a sender knows when it shall wake up to transmit a packet to
each of its neighbors according to their working schedules.
Radio model: the radio equipped in each sensor is semiduplex, i.e., a sensor can either transmit or receives a
packet at any given time slot, but not both.
Unreliable links: a transmission may fail and a retransmission is needed to compensate this failure. The delay
increases accordingly. In Fig. 1, sensor 3 fails its transmission to sensor 4 at time slot 2. It needs to wait one
more slot before sensor 4 wakes up again.
Unicast: in low-duty-cycle WSNs, it is easy for us show that it is rare for multiple neighboring sensors waking
up at the same time period. As a result, to flood one packet, a sensor needs to transmit the same packet to each
of its neighbors one by one. Thus the flooding is achieved via a number of unicasts [11].
Fig 1 Illustration of working schedule
A formal description of the duty-cycle-aware broadcast problem in wireless sensor networks. The focus
on the broadcast of a single message with a unique identifier (ID) from one source to all other nodes. By
assigning different identifiers, our solution can be easily extended to broadcast a series of messages or broadcast
messages from multiple sources. Assume there are n nodes in the network, indexed from 1 to n. For node i, Xi(t)
denotes its active/dormant state at time t, where Xi(t)= 1 if it is active and Xi(t)=0 if it is dormant. Represent the
set of 1-hop neighbors of node i by Ni, i.e., those that can be directly covered by a message forwarding from
node i if they are active. Here, we call 1-hop message broadcast from a node to its neighbors as “forward,” so as
to distinguish from our interest of networkwide broadcast (or broadcast in short). Without loss of generality,
assume that the message is to be broadcast from node s, starting from time t0. Let (ui,ti) denote the ith
forwarding, where node ui forward the message at time ti, and Ci be the set of nodes that receive the broadcast
message in the ith forwarding.
IV. SIMULATION RESULT AND DISCUSSION
In this section, we will evaluate the performance of proposed approach via simulation. The proposed
broadcast approach was evaluated using NS-2, a network simulator works on Fedora 7/Windows Platform. A
simulation model is presented that allows performance studies in Low-duty cycle wireless sensor networks.
Basically, consider the following scenario: a total 40 number of Mobile Station (MS) nodes are deployed in a
given area. Following are the simulation results of broadcast in low duty cycle wireless sensor network.
Understanding a Broadcast Service in Low Duty-Cycle Wireless Sensor Network
73
Fig 2 Performance Analysis for Throughput.
Fig 3 Performance Analysis for Energy.
V. CONCLUSION AND FUTURE WORK
In this paper we have studied performance of broadcast in low duty cycle wireless sensor networks.
We discussed that under low duty cycle conventional broadcast techniques assuming all-node-active would
either suffer from poor performance or simply fail to cover the network. In this paper we revisited broadcast
issues in low duty cycle wireless sensor networks with active/dormant cycles.
In future work, we will try to enhance Qos(Quality of service) of broadcast in low duty cycle wireless sensor
network.
REFERENCES
[1]. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A Survey on Sensor Networks,” IEEE
Communications Magazine, vol. 40, no. 8, pp. 102–114, 2002.
[2]. Feng Wang, Jiangchuan Liu, “On Reliable Broadcast in Low Duty-Cycle Wireless Sensor Networks”,
IEEE transactions on mobile computing 2012.
[3]. Zhichao Cao,Yuan He, Yunhao Liu, ” L2 : Lazy forwarding in low duty-cycle wireless sensor
network” IEEE INFOCOM 2012.
[4]. S. Guo, Y. Gu, B. Jiang, and T. He, “Opportunistic Flooding in Low-Duty-Cycle Wireless Sensor
Networks with Unreliable Links ,” in MobiCom’09, 2009.
[5]. Zhenjiang Li, Mo Li, Junliang Liu, and Shaojie Tang, “Understanding the Flooding in Low-Duty-Cycle
Wireless Sensor Networks”, Infernational conference IEEE 2011.
[6]. Yi Duan, Xiaobing Wu, Fan Wu, and Guihai Chen, “Dynamic Data Forwarding in Low-Duty-Cycle
Sensor Networks” ,International conference IEEE 2011.
[7]. Shuo Guo, Song Min Kim, Ting Zhu, Yu Gu, and Tian He, “Correlated Flooding in Low-Duty-Cycle
Wireless Sensor Networks”, IEEE 2011.
[8]. Lizhao You , Zimu Yuan, Panlong Yang, Guihai Chen, “ALOHA-Like Neighbor Discovery in Low-
Duty-Cycle Wireless Sensor Networks”, IEEE WCNC 2011.
[9]. Linchao Zhang, Erwing R. Sanchez and Maurizio Rebaudengo, “Performance Evaluation of Reliable
and Unreliable Opportunistic Flooding in Wireless Sensor Network”, IEEE 2011.
[10]. Linchao Zhang, Erwing R. Sanchez, Murizi Rebaudengo, “Evaluation framework of Opportunistic
Flooding in wireless sensor networks”, Internatinal conference IEEE 2011.
[11]. Ridha Soua, Pascale Minet, “A survey efficient techniques in wireless sensor networks”, IEEE 2011.
[12]. P. Kyasanur, R.R. Choudhury, and I. Gupta, “Smart Gossip: An Adaptive Gossip-based Broadcasting
Service for Sensor Networks,” Proc. IEEE Int’l Conf. Mobile Adhoc and Sensor Systems (MASS),
2006.
[13]. F. Stann, J. Heidemann, R. Shroff, and M. Z. Murtaza, “RBP: Robust Broadcast Propagatin in Wireless
Networks,” in ACM SenSys, 2006.
[14]. T. Yan, T. He, and J. Stankovic, “Differentiated Surveillance Service for Sensor Networks,” in ACM
SenSys, 2003.

More Related Content

What's hot

IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...IRJET Journal
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...ijsrd.com
 
An energy saving algorithm to prolong
An energy saving algorithm to prolongAn energy saving algorithm to prolong
An energy saving algorithm to prolongijwmn
 
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc NetworksHexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc NetworksIJTET Journal
 
Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2Rushin Shah
 
Performance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksPerformance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksDarpan Dekivadiya
 
Wireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingWireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingIOSR Journals
 
Energy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksEnergy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksSpandan Spandy
 
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...IJCNCJournal
 
BeeSensor routing protocol for wireless sensor network
BeeSensor routing protocol for wireless sensor networkBeeSensor routing protocol for wireless sensor network
BeeSensor routing protocol for wireless sensor networkSonam Jain
 
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...IJERD Editor
 
A review of routing protocols in wsn
A review of routing protocols in wsnA review of routing protocols in wsn
A review of routing protocols in wsnAyman Adel
 
Leach-Protocol
Leach-ProtocolLeach-Protocol
Leach-Protocolzhendong
 
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...ijiert bestjournal
 
Flow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networksFlow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networkseSAT Publishing House
 

What's hot (20)

IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
 
An energy saving algorithm to prolong
An energy saving algorithm to prolongAn energy saving algorithm to prolong
An energy saving algorithm to prolong
 
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc NetworksHexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
Hexagonal based Clustering for Reducing Rebroadcasts in Mobile Ad Hoc Networks
 
Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2
 
Performance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksPerformance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor Networks
 
Wireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingWireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop Routing
 
Energy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksEnergy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networks
 
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
 
BeeSensor routing protocol for wireless sensor network
BeeSensor routing protocol for wireless sensor networkBeeSensor routing protocol for wireless sensor network
BeeSensor routing protocol for wireless sensor network
 
GC-14-Aug
GC-14-AugGC-14-Aug
GC-14-Aug
 
Leach
Leach Leach
Leach
 
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
 
A review of routing protocols in wsn
A review of routing protocols in wsnA review of routing protocols in wsn
A review of routing protocols in wsn
 
wsn routing protocol
 wsn routing protocol wsn routing protocol
wsn routing protocol
 
Leach-Protocol
Leach-ProtocolLeach-Protocol
Leach-Protocol
 
Thesis-Final-slide
Thesis-Final-slideThesis-Final-slide
Thesis-Final-slide
 
Bn25384390
Bn25384390Bn25384390
Bn25384390
 
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
 
Flow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networksFlow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networks
 

Viewers also liked

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

Viewers also liked (9)

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 

Similar to International Journal of Engineering Research and Development (IJERD)

CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...ijasuc
 
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSBROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSIJCNCJournal
 
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksBroadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksIJCNCJournal
 
Wireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingWireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingIOSR Journals
 
2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stackSyed Ariful Islam Emon
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop TransmissionIOSR Journals
 
Throughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocolThroughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocoleSAT Publishing House
 
Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...eSAT Journals
 
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET Journal
 
Multi-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network ArchitectureMulti-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network Architectureijsrd.com
 
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...IRJET Journal
 
Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015parry prabhu
 
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksSpread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksIDES Editor
 
Iaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion inIaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion inIaetsd Iaetsd
 

Similar to International Journal of Engineering Research and Development (IJERD) (20)

DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
 
2 ijcse-01208
2 ijcse-012082 ijcse-01208
2 ijcse-01208
 
E044033136
E044033136E044033136
E044033136
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
 
Fa36942946
Fa36942946Fa36942946
Fa36942946
 
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSBROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
 
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksBroadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
 
Wireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingWireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop Routing
 
2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
 
Throughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocolThroughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocol
 
Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...
 
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
IRJET- Load Optimization with Coverage and Connectivity for Wireless Sensor N...
 
Multi-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network ArchitectureMulti-Channel Multi-Interface Wireless Network Architecture
Multi-Channel Multi-Interface Wireless Network Architecture
 
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
 
Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015
 
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksSpread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
 
Iaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion inIaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion in
 

More from IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

More from IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Recently uploaded

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 

Recently uploaded (20)

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 

International Journal of Engineering Research and Development (IJERD)

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 7, Issue 9 (July 2013), PP. 70-73 70 Understanding a Broadcast Service in Low Duty-Cycle Wireless Sensor Network Pankaj G. Ingole1 , Asst. Prof. Archana R. Raut2 1 Department of Computer Science & Engineering, GHRCE, Nagpur 2 Department of Computer Science & Engineering, GHRCE, Nagpur Abstract:- In low-duty-cycle networks, sensors stay dormant most of time to save their energy and wake up based on their needs. Such a technique, while prolonging the network lifetime, sets excessive challenges for efficient broadcast within the network. Broadcast service is widely used during the life time of a wireless sensor network (WSN), such as networking setup, data collection/storage and query answering. In the past few years, many works have been done to improve its efficiency by reducing redundant broadcast messages. However, most of these works assume that all sensor nodes are active throughout a broadcast process and thus are difficult to be deployed in low duty-cycled WSNs where sensor nodes alternate between active and dormant states, so as to conserve energy and extend the network lifetime. These conventional approaches could easily fail to cover the whole network in an acceptable time frame. To this end, we conclude the paper with insights for research directions about broadcast service in low duty cycle wireless sensor network(WSN). Keyword:- Broadcast, duty cycle, wireless sensor networks I. INTRODUCTION Wireless sensor networks (WSNs) have been used in many long-term sustainable applications such as environment monitoring, target tracking and infrastructure protection [7]. To guarantee service continuity, a sensor network normally operates at a very-low-duty-cycle (e.g., 5% or less), in which a sensor node schedules itself to be active briefly and then stays dormant for a long time. While the lifespan of a network is greatly prolonged, such low-duty-cycle operation significantly reduces the performance of many network operations including flooding [4], [6], an important networking primitive for code dissemination, system configuration, and routing tree formation. Due to the loss of connectivity when sensor nodes are sleeping, the performance of flooding degrades significantly. It has been studied [4] that the flooding coverage ratio of a pure flooding process drops to less than 10% as the duty cycle of the network decreases to 5%, showing strong evidence of the demand for a tailored flooding design for low-duty-cycle networks. One of the most essential services in wireless sensor networks is broadcast [1], which facilitates sensor nodes to efficiently propagate messages among the whole network. During networking setup, control messages may be propagated from the sink to all sensor nodes. For data collection, interest messages may be flooded from the sink. On observing an event, a sensor node may broadcast a message to coordinate with other nodes to trace the event and store sensing data. For query answering, the sink may flood the query message among the whole network to retrieve result data. Thus the efficiency and reliability of broadcast service greatly affects the overall performance of WSN. Generally, if we assume all sensor nodes are active during a broadcast (referred as all- node-active assumption), then ideally every node needs to forward the broadcast message at most once to accomplish the broadcast. Based on this assumption, two basic approaches named flooding and gossiping [1] were proposed in early stage. To overcome the unstable nature of wireless communication, where a forwarded message may get lost and only arrive at a subset of a node’s neighbors, many efforts have been done to improve the reliability of the broadcast service while still keeping efficient. Two past works among them are Smart Gossip [12] and RBP [13]. However, due to energy constraints, in many applications, sensor nodes are expected to work under low duty cycle [14], where they may turn down for a while to save energy, then turn up to perform sensing tasks and necessary communications and then turn down again. By this means, the energy of sensor nodes may be saved and the lifetime of the whole network thus may be largely extended. In a low duty-cycled WSN, if the number of nodes is very small, the previous all-node-active assumption for broadcast may still be kept valid by using global synchronization so that all nodes can wake up together at some time point, or to pre-determine a rigid schedule so that node waking up and broadcast message forwarding can be pre-computed. However, for large-scale WSNs, synchronization itself is still an open issue and to pre- determine a rigid schedule is sometimes too complicated with the consideration of the application and environment specifics.
  • 2. Understanding a Broadcast Service in Low Duty-Cycle Wireless Sensor Network 71 The broadcast problem is revisited under a more realistic scenario, where sensor nodes are deployed in large scale and work in low duty-cycle. To solve this problem, several issues need to be considered. First, because nodes may turn up and down before and during the broadcast process, the topology of active nodes may change frequently and dramatically. Also, the large number of sensor nodes makes it impossible to pre- determine a rigid schedule and use global synchronization to keep all nodes active during broadcast. Furthermore, the up-down patterns are generally application-specified and dynamically affected by the deployed environment, and thus can not be determined beforehand. As a result it is impossible for a sensor node to find an optimal time point for forwarding so that all its neighbors are active and ready to receive the message. Even with such oracle knowledge, waiting for such time point may still take too much time and leave the message out-of-date. With above considerations, we propose further research of broadcast service in low duty cycle wireless sensor network. II RELATED WORK Under low duty cycle conventional broadcast strategies assuming all-node-active would either suffer from poor performance or simply fail to cover the network. Flooding and gossiping [1] are two basic approaches used for broadcast in wireless sensor networks. In a WSN, flooding lets every node forward the received broadcast message and thus may cause message implosion in the network. To solve this problem, gossiping instead lets a node forward a received broadcast message only with some probability, where the challenge lies in how to determine the forwarding probability for each node so as to keep the broadcast still efficient and reliable. Many improvements have been proposed based on these two basic approaches. One work is Smart Gossip [12]. To determine the forwarding probability for each sensor node, the algorithm depends on previous broadcasts and adaptively adjust the probability to match the topological properties among sensor nodes. Another work is RBP [13], which is essentially a flooding-based approach. It lets each node flood the received broadcast message only once, and then by overhearing and explicit ACKs, a node may do some retransmissions for local repairs. Both the retransmission thresholds and the number of retries depend on the node density and topology information gathered from previous broadcasts. There have been recent works investigating low duty cycle wireless sensor networks [2], [3], [4], [5], [6], [7],[8],[10]. Work in [2] remodeled broadcast problem in new context and showed that it is equivalent to shortest path problem in a time-convergence graph. Accordingly presented an optimal centralized solution. In [3], propose L2 practical design of data forwarding in low duty cycle wireless sensor networks. L2 addresses link burstiness using multivariate Bernoulli link model.L2 enables sensor nodes to work in lazy mode, keep their radios off as long as they can, and allocates the precious energy for only a limited number of promising transmissions. The work introduces in [4] Opportunistic Flooding is a flooding method specially designed for low- duty-cycle wireless sensor networks. Its main objective is to reduce redundancy in transmission while achieving fast dissemination. A dynamic data forwarding(DDF) scheme for low-duty-cycle wireless sensor networks, which combines a realistic link model with asynchronous duty cycle. The results show that DDF can reduce end-to-end delay, guarantee delivery ratio and improve network lifetime[6]. Correlated flooding, an energy-efficient flooding design for low-duty-cycle WSNs that solves the problem caused by both low-duty-cycle operation and ACK implosion[7]. The goal of Correlated Flooding is to exploit link correlation in the construction of an energy efficient flooding tree, to save the energy consumption on both data packets and ACKs. First the energy consumption on transmitting data packets can be reduced compared with flooding tree that only considers limk quality. ALOHA- like neighbor discovery algorithm solves the problem of neighbor discovery in low duty cycle WSNs[8]. The flooding algorithm is a commonly used algorithm intended for network-wide dissemination of data, commands and configurations, but its energy consumption is usually high which conflicts with the limited resource feature of WSNs.The unreliable and reliable implementation methods of opportunistic flooding to provide a reference to further optimize the energy cost of flooding. Depending on different network densities, different data packet sizes and duty cycles, the two implementation methods present different characteristics in terms of energy cost flooding delivery ratio[9]. III. PROPOSED WORK In proposed work, we revisit the broadcast problem under a more realistic scenario, where sensor nodes are deployed in large scale and work in low duty-cycle. To solve this problem, several issues need to be considered. First, because nodes may turn up and down before and during the broadcast process, the topology of active nodes may change frequently and dramatically. Also, the large number of sensor nodes makes it impossible to pre-determine a rigid schedule and use global synchronization to keep all
  • 3. Understanding a Broadcast Service in Low Duty-Cycle Wireless Sensor Network 72 nodes active during broadcast. Furthermore, the up-down patterns are generally application-specified and dynamically affected by the deployed environment, and thus can not be determined beforehand. As a result it is impossible for a sensor node to find an optimal time point for forwarding so that all its neighbors are active and ready to receive the message. Waiting for such time point may still take too much time and leave the message out-of-date. With above considerations, we are proposing an approach which will provide efficient broadcast service in low duty cycle wireless sensor network. We describe the basic network model and introduces the assumption used in the paper. In this section, we reformulate the broadcast problem in low duty-cycle wireless sensor networks. To reflect the operation nature of real sensor products and also to simplify exposition, we divide time into equal-length slots. The active and dormant periods are both integer multiples of time slots, and in each slot, an active node can either receive or forward one message only. We make following assumptions in our network model : Slotted time model: the time axis is divided into time slots with equal length. The duration of each time slot is appropriate for the transmission of one packet. Local synchronization: the system works in a locally synchronized mode. With local synchronization, a sender knows when it shall wake up to transmit a packet to each of its neighbors according to their working schedules. Radio model: the radio equipped in each sensor is semiduplex, i.e., a sensor can either transmit or receives a packet at any given time slot, but not both. Unreliable links: a transmission may fail and a retransmission is needed to compensate this failure. The delay increases accordingly. In Fig. 1, sensor 3 fails its transmission to sensor 4 at time slot 2. It needs to wait one more slot before sensor 4 wakes up again. Unicast: in low-duty-cycle WSNs, it is easy for us show that it is rare for multiple neighboring sensors waking up at the same time period. As a result, to flood one packet, a sensor needs to transmit the same packet to each of its neighbors one by one. Thus the flooding is achieved via a number of unicasts [11]. Fig 1 Illustration of working schedule A formal description of the duty-cycle-aware broadcast problem in wireless sensor networks. The focus on the broadcast of a single message with a unique identifier (ID) from one source to all other nodes. By assigning different identifiers, our solution can be easily extended to broadcast a series of messages or broadcast messages from multiple sources. Assume there are n nodes in the network, indexed from 1 to n. For node i, Xi(t) denotes its active/dormant state at time t, where Xi(t)= 1 if it is active and Xi(t)=0 if it is dormant. Represent the set of 1-hop neighbors of node i by Ni, i.e., those that can be directly covered by a message forwarding from node i if they are active. Here, we call 1-hop message broadcast from a node to its neighbors as “forward,” so as to distinguish from our interest of networkwide broadcast (or broadcast in short). Without loss of generality, assume that the message is to be broadcast from node s, starting from time t0. Let (ui,ti) denote the ith forwarding, where node ui forward the message at time ti, and Ci be the set of nodes that receive the broadcast message in the ith forwarding. IV. SIMULATION RESULT AND DISCUSSION In this section, we will evaluate the performance of proposed approach via simulation. The proposed broadcast approach was evaluated using NS-2, a network simulator works on Fedora 7/Windows Platform. A simulation model is presented that allows performance studies in Low-duty cycle wireless sensor networks. Basically, consider the following scenario: a total 40 number of Mobile Station (MS) nodes are deployed in a given area. Following are the simulation results of broadcast in low duty cycle wireless sensor network.
  • 4. Understanding a Broadcast Service in Low Duty-Cycle Wireless Sensor Network 73 Fig 2 Performance Analysis for Throughput. Fig 3 Performance Analysis for Energy. V. CONCLUSION AND FUTURE WORK In this paper we have studied performance of broadcast in low duty cycle wireless sensor networks. We discussed that under low duty cycle conventional broadcast techniques assuming all-node-active would either suffer from poor performance or simply fail to cover the network. In this paper we revisited broadcast issues in low duty cycle wireless sensor networks with active/dormant cycles. In future work, we will try to enhance Qos(Quality of service) of broadcast in low duty cycle wireless sensor network. REFERENCES [1]. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A Survey on Sensor Networks,” IEEE Communications Magazine, vol. 40, no. 8, pp. 102–114, 2002. [2]. Feng Wang, Jiangchuan Liu, “On Reliable Broadcast in Low Duty-Cycle Wireless Sensor Networks”, IEEE transactions on mobile computing 2012. [3]. Zhichao Cao,Yuan He, Yunhao Liu, ” L2 : Lazy forwarding in low duty-cycle wireless sensor network” IEEE INFOCOM 2012. [4]. S. Guo, Y. Gu, B. Jiang, and T. He, “Opportunistic Flooding in Low-Duty-Cycle Wireless Sensor Networks with Unreliable Links ,” in MobiCom’09, 2009. [5]. Zhenjiang Li, Mo Li, Junliang Liu, and Shaojie Tang, “Understanding the Flooding in Low-Duty-Cycle Wireless Sensor Networks”, Infernational conference IEEE 2011. [6]. Yi Duan, Xiaobing Wu, Fan Wu, and Guihai Chen, “Dynamic Data Forwarding in Low-Duty-Cycle Sensor Networks” ,International conference IEEE 2011. [7]. Shuo Guo, Song Min Kim, Ting Zhu, Yu Gu, and Tian He, “Correlated Flooding in Low-Duty-Cycle Wireless Sensor Networks”, IEEE 2011. [8]. Lizhao You , Zimu Yuan, Panlong Yang, Guihai Chen, “ALOHA-Like Neighbor Discovery in Low- Duty-Cycle Wireless Sensor Networks”, IEEE WCNC 2011. [9]. Linchao Zhang, Erwing R. Sanchez and Maurizio Rebaudengo, “Performance Evaluation of Reliable and Unreliable Opportunistic Flooding in Wireless Sensor Network”, IEEE 2011. [10]. Linchao Zhang, Erwing R. Sanchez, Murizi Rebaudengo, “Evaluation framework of Opportunistic Flooding in wireless sensor networks”, Internatinal conference IEEE 2011. [11]. Ridha Soua, Pascale Minet, “A survey efficient techniques in wireless sensor networks”, IEEE 2011. [12]. P. Kyasanur, R.R. Choudhury, and I. Gupta, “Smart Gossip: An Adaptive Gossip-based Broadcasting Service for Sensor Networks,” Proc. IEEE Int’l Conf. Mobile Adhoc and Sensor Systems (MASS), 2006. [13]. F. Stann, J. Heidemann, R. Shroff, and M. Z. Murtaza, “RBP: Robust Broadcast Propagatin in Wireless Networks,” in ACM SenSys, 2006. [14]. T. Yan, T. He, and J. Stankovic, “Differentiated Surveillance Service for Sensor Networks,” in ACM SenSys, 2003.