SlideShare a Scribd company logo
1 of 4
Download to read offline
IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 3, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 476
Wireless Sensor Network: Topology Issues
Komal Patel1
1
Assistant Professor
1
Department of Computer Science, Ganpat University, Gujarat, INDIA
Abstract-- Wireless Sensor Networks are highly distributed
self-organized systems. WSN have been deployed in various
fields. Now a day, Topology issues have received more and
more attentions in Wireless Sensor Networks (WSN). While
WSN applications are normally optimized by the given
underlying network topology, another trend is to optimize
WSN by means of topology control. In this area, a number
of approaches have been invested, like network connectivity
based topology control, cooperating schemes, topology
directed routing, sensor coverage based topology control.
Most of the schemes have proven to be able to provide a
better network monitoring and communication performance
with prolonged system lifetime. In this survey paper, I
provide a full view of the studies in this area.
I. INTRODUCTION
Wireless Sensor Networks (WSNs) have become an
emerging technology that has a wide range of potential
applications including traffic control, object tracking,
scientific observing and forecasting, and environment
monitoring etc.
.
Fig. 1: WSN Topologies
A WSN normally consists of a large number of
distributed nodes that organize themselves into a multi-hop
wireless network and typically these nodes coordinate to
perform a common task.
Fig. 2: Aspects need to be taken care of
To achieve a lasting and scalable WSN design, the
some aspects have to be carefully taken into account in the
design stage.
II. TOPOLOGY ISSUES, THE TAXONOMY
There are mainly two categories of topology issues.
1) Topology Control Problems and,
2) Topology Awareness Problems
Fig. 3: A Taxonomy of topology issues in WSNs
Topology Control ProblemsA.
It can be further divided into two categories:
Sensor Coverage Topology1)
The coverage topology describes the topology of sensor
coverage and is concerned about how to maximize a reliable
sensing area while consuming less power. There are three
categories into Sensor Coverage Topology: Static Network,
Mobile Network and Hybrid Network.
 Static Network:
For a static sensor network, proposed approaches have
different coverage objectives. I introduce these approaches
separately.
 Partial Coverage:
WSN system functioning time by keeping only a necessary
set of sensors working in case the node deployment density
is much higher than necessary. PEAS protocol consists of
two algorithms: Probing Environment and Adaptive
Sleeping.
 Single Coverage:
The Optimal Geographical Density Control (OGDC)
protocol tries to minimize the overlap of sensing areas of all
sensor nodes for cases when Rc ≥ 2Rs where Rc is the node
communication range and Rs is the node sensing range.
OGDC is a fully localized algorithm but the node location is
needed as a pre-knowledge.
 Multiple Coverage:
A distributed density control algorithm based on time
synchronization among the neighbors. A node can decide its
Low-
quality
communic
ations
Data
processing
Energy
conservatio
n
Limited
bandwidth
Operation
in hostile
environme
nts
Scalability
Unstructured
and time-
varying
network
topology
Wireless Sensor Network: Topology Issues
(IJSRD/Vol. 1/Issue 3/2013/0019)
All rights reserved by www.ijsrd.com
477
on-duty time such that the whole grid still gets the required
degree of coverage.
 Mobile Network:
The deployment schemes for movable sensors. Given an
area to be monitored, the proposed distributed self-
deployment protocols first discover the existence of
coverage holes in the target area then calculate the target
positions and move sensors to diminish the coverage holes.
The sensor network in the viewpoint of virtual forces, nodes
only use their sensed information to make moving
decisions. It is a cost effective and no communication
among the nodes or localization information is needed. For
the DSS (Distributed Self-Spreading) algorithm proposed,
sensors are randomly deployed initially. They start moving
based on partial forces exerted by the neighbors. The forces
exerted on each node by its neighbors depend on the local
density of deployment and on the distance between the node
and the neighbor.
 Hybrid Network:
The coverage scenario with only some of the sensors are
capable of moving has been under active research,
especially in the field of robotics for exploration purpose.
The movement capable sensors can help in deployment and
network repair by moving to appropriate locations within
the field to achieve desired level of coverage. Combined
solution for the exploration and coverage of a given target
area. The coverage problem is solved with the help of a
constantly moving robot in a given target area. The
algorithm does not consider the communications between
the deployed nodes. All decisions are made by the robot by
directly communicating with a neighbor sensor node. Single
coverage problem by moving the available mobile sensors
in a hybrid network to heal coverage holes
Sensor Connectivity Topology2)
The connectivity topology on the other hand is more
concern more about network connectivity and emphasizes
the message retrieve and delivery in the network. Two kinds
of mechanisms have been utilized to maintain an efficient
sensor connectivity topology:
 Power Control Mechanisms:
The goal of power control mechanisms is to dynamically
change the nodes’ transmitting range in order to maintain
some property of the communication graph, while reducing
the energy consumed by node transceivers because they are
one of the primary sources of energy consumption in WSNs.
Power control mechanisms are fundamental to achieving a
good network energy efficiency. Power control is studied in
homogeneous and non-homogeneous scenarios which can
be distinguished by examine if the nodes have the same
transmitting range or not. For homogeneous network, the
CTR (Critical Transmitting Range) problem has been
investigated in theoretical ways as well as practical
viewpoints. A distributed protocol, called COMPOW that
attempts to determine the minimum common transmitting
range needed to ensure network connectivity. They show
that setting the transmitting range to this value has the
beneficial effects of maximizing network capacity, reducing
the contention to access the wireless channel, and
minimizing energy consumption. the tradeoff between the
transmitting range and the size of the largest connected
component in the communication graph. The experimental
results presented show that, in sparse two and three-
dimensional networks, the transmitting range can be reduced
significantly if weaker requirements on connectivity are
acceptable: halving the critical transmitting range, the
largest connected component has an average size of
approximately 0.9n. This means that a considerable amount
of energy is spent to connect relatively few nodes. Non-
homogeneous networks are more challenging because nodes
are allowed to have different transmitting ranges. The
problem of assigning a transmitting range to nodes in such a
way that the resulting communication graph is strongly
connected and the energy cost is minimum is called the
Rang Assignment (RA) problem. It is shown to be NP-hard
in the case of 2D and 3D networks. However the optimal
solution can be approximated within a factor of 2 using the
range assignment generated. An important variant of RA has
been recently studied is based on the concept of symmetry
of the communication graph. Due to the high overhead
needed to handle unidirectional links in routing protocols or
MAC protocols which are naturally designed to work under
the symmetric assumption, Symmetric Range Assignment
(SRA) shows more practical significance. However, SRA
remains NP-hard in 2D and 3D networks, and it even incurs
a considerable additional energy cost over RA. I can refine
SRA to WSRA (Weakly Symmetric Range Assignment)
which weakens the requirement that the communication
graph contains only bidirectional links by allowing the
existence of the unidirectional links but requiring the
symmetric sub graph of the communication graph resulting
from RA connected. In the released WSRA problem, only
marginal effect on the energy cost has been induced while
the desired symmetry property has been kept.
 Power Management Mechanisms:
Power management is concerned of which set of nodes
should be turned on/off and when, for the purpose of
constructing energy saving topology to prolong the network
lifetime. It can utilize information available from all the
layers in the protocol stack. In GAF approach, nodes use
location information to divide the field into fixed square
grids. The size of each grid stays constant, regardless of
node density. Nodes within a grid switch between sleeping
and listening mode, with the guarantee that one node in each
grid stays up so that a dynamic routing backbone is
maintained to forward packets. Span, a power saving
topology maintenance algorithm for multi-hop ad hoc
Wireless Sensor Network: Topology Issues
(IJSRD/Vol. 1/Issue 3/2013/0019)
All rights reserved by www.ijsrd.com
478
wireless networks which adaptively elects coordinators from
all nodes to form a routing backbone and turn off other
nodes’ radio receivers most of the time to conserve power.
STEM approach, which exploits the time dimension rather
than the node density dimension to control a power saving
topology of active nodes. They switch nodes between two
states, “transfer state” and “monitoring state”. Data are only
forwarded in the transfer state. In the monitoring state,
nodes remain their radio off and will switch into transfer
state to be an initiator node on event detected. The extended
study on combining STEM and GAF shows the potential of
further power saving by exploiting both time dimension and
node density dimension.
Topology Awareness ProblemsB.
It includes geographic routing problems and sensor holes
problems.
Geographic routing uses geographic and
topological information of the network to achieve optimal
routing schemes with high routing efficiency and low power
consumption.
Various sensor holes, such as Jamming holes,
sink/black holes and worm holes, may form in a WSN and
create network topology variations which trouble the upper
layer applications. For examples, intense communication
may cause jamming holes which will fail to deliver message
to exterior nodes. Sink/Black holes and worm holes are
caused by nodes exhausted around sink node or pretended
sinks or by malicious nodes. If sensor holes issues are not
treated carefully, they will create costly routing table and
exhaust the intermediate nodes rapidly.
 Geographic Routing:
Geographic routing approach relies on greedy forwarding to
route packets based on nodes’ local information on the
network topology. The protocol starts in greedy forwarding
mode, and assumes the location information of sensor nodes
can be obtained by supporting systems. GPSR recovers from
local maximum position by using perimeter rouging mode
and the right-hand rule. kis et al. propose the Compass
Routing algorithm and FACE-1 algorithms that guarantees
the destination is reached even when local minimum
phenomenon occurs in greedy forwarding. Similar to the
work in, Bose et al. propose the FACE-2 routing algorithm.
In contrast to GPSR, routing in FACE-2 is done through the
perimeter of the Gabriel Graph (CG) formed at each node. It
also modifies the FACE-1 so that the perimeter traversal
follows the next edge whenever that edge crosses the line
from the source to destination. Obviously, the downside of
FACE-2 is that it consumes more energy in the perimeter
nodes.
 Hole Problems:
For most of the geographic routing schemes, a routing hole
consists of a region in the sensor network, where either node
are not available or the available nodes cannot participate in
the actual routing of the data due to various possible
reasons. In order to prevent the infection to the packet
delivery by sensor holes, the geographic routing schemes do
not provide methods to detect and localize the holes.
Theoretical work on determining sensor holes in which so-
called stuck node is defined and an algorithm called
BOUNDHOLE is proposed to find the holes utilizing the
strong stuck nodes. Study an application specific scenario
for the underground monitoring in coal mine. They propose
a topology maintenance protocol SASA, which claims to
rapidly detect the structure variation during underground
collapse by regulating the mesh sensor network deployment
and formulating a collaborating mechanism based on the
regular beacon strategy for sensors. The so-called edge
nodes outline the sensor hole and report it to the sink. To the
best of our knowledge, the SASA protocol is the first work
which relates the topology variation to the actual
geographical changes. Wood et al. discuss jamming hole in.
The resilience of various routing protocols and energy
conserving topology maintenance algorithms against sink
holes. They showed that popular routing protocols like
directed diffusion, rumor routing and multi-path variant of
directed diffusion etc. are all vulnerable to sink holes
attacks. For geographical greedy forwarding algorithms it is
more difficult to create sink holes because in this case a
malicious node has to advertise different attractive locations
to different neighbors in order to qualify as next hop.
III. CONCLUSIONS
Two major issues found in topology in WSNs, namely
topology awareness and topology control. Topology
awareness problems construct applications or upper
protocols to conform the underlying topology. Typical
approaches applied in this category do not actively consider
improving the topology itself for the specific applications.
Topology control mechanisms focus more on constructing
an energy-efficient and reliable network topology and
normally do not touch individual applications.
Power control and power management are two
different types of topology controlling methods. By focusing
on integrating power control and power management, it is
possible to provide noticeable improvements on network
topology and efficiencies of energy usage.
REFERENCES
[1] Pirmez, L., Delicato, F., Pires, P., Mostardinha, A., de
Rezende, N.:2007 Applyingfuzzy logic for decision-
making on wireless sensor networks. In: Fuzzy Systems
Conference '07, Proc., IEEE, 2007.
[2] Wolenetz, M., Kumar, R., Shin, J., Ramachandran,
U.:2005 A simulation-based study of wireless sensor
network middleware. Network Management 15(4),
2005
[3] B. Karp and H. T. Kung, "Greedy Perimeter Stateless
Routing for Wireless Networks," in proceedings of
theSixth Annual International Conference on Mobile
Computing and Networking (Mobicom), 2000.
[4] F. Ye, G. Zhong, S. Lu and L. Zhang, "PEAS: A Robust
Energy Conserving Protocol for Long-lived Sensor
Networks," in proceedings of International Conference
on Distributed Computing Systems (ICDCS), 2003.
[5] H. Zhang and J. Hou, "Maintaining Sensing Coverage
and Connectivity in Large Sensor Networks,"
Department of Computer Science, UIUC UIUCDCS-R-
2003-2351, 2003
[6] G. Wang, G. Cao and T. L. Porta, "Movement-Assisted
Sensor Deployment," in proceedings of IEEE
INFOCOM, 2004
[7] X. Wang, G. Xing, Y. Zhang, C. Lu, R. Pless, et al.,
"Integrated Coverage and Connectivity Configuration in
Wireless Sensor Network: Topology Issues
(IJSRD/Vol. 1/Issue 3/2013/0019)
All rights reserved by www.ijsrd.com
479
Wireless Sensor Networks," in proceedings of ACM
SenSys, 2003.
[8] S. Narayanaswamy, V. Kawadia, R. Sreenivas and P.
Kumar, "Power control in ad hoc networks: Theory,
architecture, algorithm and implementation of the
COMPOW protocol," in proceedings of European
Wireless, 2002.

More Related Content

What's hot

AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORKAN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORKijceronline
 
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...Quality of Service Optimization in Realm of Green Monitoring using Broad Area...
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...IOSR Journals
 
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...ijasuc
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyAli Habeeb
 
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...IOSR Journals
 
A STRUCTURED DEEP NEURAL NETWORK FOR DATA-DRIVEN LOCALIZATION IN HIGH FREQUEN...
A STRUCTURED DEEP NEURAL NETWORK FOR DATA-DRIVEN LOCALIZATION IN HIGH FREQUEN...A STRUCTURED DEEP NEURAL NETWORK FOR DATA-DRIVEN LOCALIZATION IN HIGH FREQUEN...
A STRUCTURED DEEP NEURAL NETWORK FOR DATA-DRIVEN LOCALIZATION IN HIGH FREQUEN...IJCNCJournal
 
Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...
Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...
Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...CSCJournals
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNijsrd.com
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
A seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networksA seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networkspraveen369
 
Effective range free localization scheme for wireless sensor network
Effective range  free localization scheme for wireless sensor networkEffective range  free localization scheme for wireless sensor network
Effective range free localization scheme for wireless sensor networkijmnct
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...ijsrd.com
 
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...cscpconf
 
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...ijwmn
 
A cell based clustering algorithm in large wireless sensor networks
A cell based clustering algorithm in large wireless sensor networksA cell based clustering algorithm in large wireless sensor networks
A cell based clustering algorithm in large wireless sensor networksambitlick
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNIJCNCJournal
 

What's hot (20)

AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORKAN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
 
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...Quality of Service Optimization in Realm of Green Monitoring using Broad Area...
Quality of Service Optimization in Realm of Green Monitoring using Broad Area...
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
 
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
 
A STRUCTURED DEEP NEURAL NETWORK FOR DATA-DRIVEN LOCALIZATION IN HIGH FREQUEN...
A STRUCTURED DEEP NEURAL NETWORK FOR DATA-DRIVEN LOCALIZATION IN HIGH FREQUEN...A STRUCTURED DEEP NEURAL NETWORK FOR DATA-DRIVEN LOCALIZATION IN HIGH FREQUEN...
A STRUCTURED DEEP NEURAL NETWORK FOR DATA-DRIVEN LOCALIZATION IN HIGH FREQUEN...
 
Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...
Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...
Collaborative Re-Localization Method in Mobile Wireless Sensor Network Based ...
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
Matlab 2013 14 papers astract
Matlab 2013 14 papers astractMatlab 2013 14 papers astract
Matlab 2013 14 papers astract
 
A seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networksA seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networks
 
Effective range free localization scheme for wireless sensor network
Effective range  free localization scheme for wireless sensor networkEffective range  free localization scheme for wireless sensor network
Effective range free localization scheme for wireless sensor network
 
I045075155
I045075155I045075155
I045075155
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
 
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...
AN OPTIMIZED WEIGHT BASED CLUSTERING ALGORITHM IN HETEROGENEOUS WIRELESS SENS...
 
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
 
A cell based clustering algorithm in large wireless sensor networks
A cell based clustering algorithm in large wireless sensor networksA cell based clustering algorithm in large wireless sensor networks
A cell based clustering algorithm in large wireless sensor networks
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
 

Viewers also liked

Analysis of Parking Demand and Suggesting Alternative for Parking (A Case Stu...
Analysis of Parking Demand and Suggesting Alternative for Parking (A Case Stu...Analysis of Parking Demand and Suggesting Alternative for Parking (A Case Stu...
Analysis of Parking Demand and Suggesting Alternative for Parking (A Case Stu...ijsrd.com
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
Analysis of SEPIC for PV-Applications using PI Controller and Current Mode Co...
Analysis of SEPIC for PV-Applications using PI Controller and Current Mode Co...Analysis of SEPIC for PV-Applications using PI Controller and Current Mode Co...
Analysis of SEPIC for PV-Applications using PI Controller and Current Mode Co...ijsrd.com
 
Handwritten Script Recognition
Handwritten Script RecognitionHandwritten Script Recognition
Handwritten Script Recognitionijsrd.com
 
Garbage Management using Android Smartphone
Garbage Management using Android SmartphoneGarbage Management using Android Smartphone
Garbage Management using Android Smartphoneijsrd.com
 
Waste Minimization and Cost Reduction in Process Industries
Waste Minimization and Cost Reduction in Process IndustriesWaste Minimization and Cost Reduction in Process Industries
Waste Minimization and Cost Reduction in Process Industriesijsrd.com
 
Exhaust analysis of four stroke single cylinder diesel engine using copper ba...
Exhaust analysis of four stroke single cylinder diesel engine using copper ba...Exhaust analysis of four stroke single cylinder diesel engine using copper ba...
Exhaust analysis of four stroke single cylinder diesel engine using copper ba...ijsrd.com
 
GreenSQL Security
 GreenSQL Security GreenSQL Security
GreenSQL Securityijsrd.com
 
Performance Optimization of Clustering On GPU
 Performance Optimization of Clustering On GPU Performance Optimization of Clustering On GPU
Performance Optimization of Clustering On GPUijsrd.com
 
Process parameter optimization of SLM process and application of Taguchi appr...
Process parameter optimization of SLM process and application of Taguchi appr...Process parameter optimization of SLM process and application of Taguchi appr...
Process parameter optimization of SLM process and application of Taguchi appr...ijsrd.com
 
Performance, Optimization and CFD Analysis of Submersible Pump Impeller
Performance, Optimization and CFD Analysis of Submersible Pump ImpellerPerformance, Optimization and CFD Analysis of Submersible Pump Impeller
Performance, Optimization and CFD Analysis of Submersible Pump Impellerijsrd.com
 
Material Removal Rate, Tool Wear Rate and Surface Roughness Analysis of EDM P...
Material Removal Rate, Tool Wear Rate and Surface Roughness Analysis of EDM P...Material Removal Rate, Tool Wear Rate and Surface Roughness Analysis of EDM P...
Material Removal Rate, Tool Wear Rate and Surface Roughness Analysis of EDM P...ijsrd.com
 
Enhancing the Performance & Emission for the Blend of Diesel & Pyrolysis oil ...
Enhancing the Performance & Emission for the Blend of Diesel & Pyrolysis oil ...Enhancing the Performance & Emission for the Blend of Diesel & Pyrolysis oil ...
Enhancing the Performance & Emission for the Blend of Diesel & Pyrolysis oil ...ijsrd.com
 
VRaaS [Virtual Reality as a Service]: Integrated architecture for VR Applicat...
VRaaS [Virtual Reality as a Service]: Integrated architecture for VR Applicat...VRaaS [Virtual Reality as a Service]: Integrated architecture for VR Applicat...
VRaaS [Virtual Reality as a Service]: Integrated architecture for VR Applicat...ijsrd.com
 
Analysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence ProcedureAnalysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence Procedureijsrd.com
 
Voltage Stability & Power Quality Assessment of Distributed Generation Based ...
Voltage Stability & Power Quality Assessment of Distributed Generation Based ...Voltage Stability & Power Quality Assessment of Distributed Generation Based ...
Voltage Stability & Power Quality Assessment of Distributed Generation Based ...ijsrd.com
 
Real-Time Monitoring and Control System for Industry
Real-Time Monitoring and Control System for IndustryReal-Time Monitoring and Control System for Industry
Real-Time Monitoring and Control System for Industryijsrd.com
 

Viewers also liked (17)

Analysis of Parking Demand and Suggesting Alternative for Parking (A Case Stu...
Analysis of Parking Demand and Suggesting Alternative for Parking (A Case Stu...Analysis of Parking Demand and Suggesting Alternative for Parking (A Case Stu...
Analysis of Parking Demand and Suggesting Alternative for Parking (A Case Stu...
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
Analysis of SEPIC for PV-Applications using PI Controller and Current Mode Co...
Analysis of SEPIC for PV-Applications using PI Controller and Current Mode Co...Analysis of SEPIC for PV-Applications using PI Controller and Current Mode Co...
Analysis of SEPIC for PV-Applications using PI Controller and Current Mode Co...
 
Handwritten Script Recognition
Handwritten Script RecognitionHandwritten Script Recognition
Handwritten Script Recognition
 
Garbage Management using Android Smartphone
Garbage Management using Android SmartphoneGarbage Management using Android Smartphone
Garbage Management using Android Smartphone
 
Waste Minimization and Cost Reduction in Process Industries
Waste Minimization and Cost Reduction in Process IndustriesWaste Minimization and Cost Reduction in Process Industries
Waste Minimization and Cost Reduction in Process Industries
 
Exhaust analysis of four stroke single cylinder diesel engine using copper ba...
Exhaust analysis of four stroke single cylinder diesel engine using copper ba...Exhaust analysis of four stroke single cylinder diesel engine using copper ba...
Exhaust analysis of four stroke single cylinder diesel engine using copper ba...
 
GreenSQL Security
 GreenSQL Security GreenSQL Security
GreenSQL Security
 
Performance Optimization of Clustering On GPU
 Performance Optimization of Clustering On GPU Performance Optimization of Clustering On GPU
Performance Optimization of Clustering On GPU
 
Process parameter optimization of SLM process and application of Taguchi appr...
Process parameter optimization of SLM process and application of Taguchi appr...Process parameter optimization of SLM process and application of Taguchi appr...
Process parameter optimization of SLM process and application of Taguchi appr...
 
Performance, Optimization and CFD Analysis of Submersible Pump Impeller
Performance, Optimization and CFD Analysis of Submersible Pump ImpellerPerformance, Optimization and CFD Analysis of Submersible Pump Impeller
Performance, Optimization and CFD Analysis of Submersible Pump Impeller
 
Material Removal Rate, Tool Wear Rate and Surface Roughness Analysis of EDM P...
Material Removal Rate, Tool Wear Rate and Surface Roughness Analysis of EDM P...Material Removal Rate, Tool Wear Rate and Surface Roughness Analysis of EDM P...
Material Removal Rate, Tool Wear Rate and Surface Roughness Analysis of EDM P...
 
Enhancing the Performance & Emission for the Blend of Diesel & Pyrolysis oil ...
Enhancing the Performance & Emission for the Blend of Diesel & Pyrolysis oil ...Enhancing the Performance & Emission for the Blend of Diesel & Pyrolysis oil ...
Enhancing the Performance & Emission for the Blend of Diesel & Pyrolysis oil ...
 
VRaaS [Virtual Reality as a Service]: Integrated architecture for VR Applicat...
VRaaS [Virtual Reality as a Service]: Integrated architecture for VR Applicat...VRaaS [Virtual Reality as a Service]: Integrated architecture for VR Applicat...
VRaaS [Virtual Reality as a Service]: Integrated architecture for VR Applicat...
 
Analysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence ProcedureAnalysis of VoIP Forensics with Digital Evidence Procedure
Analysis of VoIP Forensics with Digital Evidence Procedure
 
Voltage Stability & Power Quality Assessment of Distributed Generation Based ...
Voltage Stability & Power Quality Assessment of Distributed Generation Based ...Voltage Stability & Power Quality Assessment of Distributed Generation Based ...
Voltage Stability & Power Quality Assessment of Distributed Generation Based ...
 
Real-Time Monitoring and Control System for Industry
Real-Time Monitoring and Control System for IndustryReal-Time Monitoring and Control System for Industry
Real-Time Monitoring and Control System for Industry
 

Similar to Wireless Sensor Network: Topology Issues

AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...ijasuc
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...IJCNCJournal
 
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...IJCNCJournal
 
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...IOSRJECE
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor NetworkA QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Networkijassn
 
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...Editor IJCATR
 
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...IJMIT JOURNAL
 
Direct_studies_report13
Direct_studies_report13Direct_studies_report13
Direct_studies_report13Farhad Gholami
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
 
A Novel Routing Algorithm for Wireless Sensor Network Using Particle Swarm O...
A Novel Routing Algorithm for Wireless Sensor Network Using  Particle Swarm O...A Novel Routing Algorithm for Wireless Sensor Network Using  Particle Swarm O...
A Novel Routing Algorithm for Wireless Sensor Network Using Particle Swarm O...IOSR Journals
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...IRJET Journal
 
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...IJMIT JOURNAL
 
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksSpread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksIDES Editor
 
Balancing stable topology and network lifetime in ad hoc networks
Balancing stable topology and network lifetime in ad hoc networksBalancing stable topology and network lifetime in ad hoc networks
Balancing stable topology and network lifetime in ad hoc networksIAEME Publication
 

Similar to Wireless Sensor Network: Topology Issues (20)

AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
 
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
 
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
1104.0355
1104.03551104.0355
1104.0355
 
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor NetworkA QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
 
F04623943
F04623943F04623943
F04623943
 
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
 
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
 
Direct_studies_report13
Direct_studies_report13Direct_studies_report13
Direct_studies_report13
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 
B05630814
B05630814B05630814
B05630814
 
A Novel Routing Algorithm for Wireless Sensor Network Using Particle Swarm O...
A Novel Routing Algorithm for Wireless Sensor Network Using  Particle Swarm O...A Novel Routing Algorithm for Wireless Sensor Network Using  Particle Swarm O...
A Novel Routing Algorithm for Wireless Sensor Network Using Particle Swarm O...
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
 
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
 
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksSpread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
 
0512ijdps26
0512ijdps260512ijdps26
0512ijdps26
 
Balancing stable topology and network lifetime in ad hoc networks
Balancing stable topology and network lifetime in ad hoc networksBalancing stable topology and network lifetime in ad hoc networks
Balancing stable topology and network lifetime in ad hoc networks
 

More from ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Gridijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation Systemijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigeratorijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparatorsijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Wireless Sensor Network: Topology Issues

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 3, 2013 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 476 Wireless Sensor Network: Topology Issues Komal Patel1 1 Assistant Professor 1 Department of Computer Science, Ganpat University, Gujarat, INDIA Abstract-- Wireless Sensor Networks are highly distributed self-organized systems. WSN have been deployed in various fields. Now a day, Topology issues have received more and more attentions in Wireless Sensor Networks (WSN). While WSN applications are normally optimized by the given underlying network topology, another trend is to optimize WSN by means of topology control. In this area, a number of approaches have been invested, like network connectivity based topology control, cooperating schemes, topology directed routing, sensor coverage based topology control. Most of the schemes have proven to be able to provide a better network monitoring and communication performance with prolonged system lifetime. In this survey paper, I provide a full view of the studies in this area. I. INTRODUCTION Wireless Sensor Networks (WSNs) have become an emerging technology that has a wide range of potential applications including traffic control, object tracking, scientific observing and forecasting, and environment monitoring etc. . Fig. 1: WSN Topologies A WSN normally consists of a large number of distributed nodes that organize themselves into a multi-hop wireless network and typically these nodes coordinate to perform a common task. Fig. 2: Aspects need to be taken care of To achieve a lasting and scalable WSN design, the some aspects have to be carefully taken into account in the design stage. II. TOPOLOGY ISSUES, THE TAXONOMY There are mainly two categories of topology issues. 1) Topology Control Problems and, 2) Topology Awareness Problems Fig. 3: A Taxonomy of topology issues in WSNs Topology Control ProblemsA. It can be further divided into two categories: Sensor Coverage Topology1) The coverage topology describes the topology of sensor coverage and is concerned about how to maximize a reliable sensing area while consuming less power. There are three categories into Sensor Coverage Topology: Static Network, Mobile Network and Hybrid Network.  Static Network: For a static sensor network, proposed approaches have different coverage objectives. I introduce these approaches separately.  Partial Coverage: WSN system functioning time by keeping only a necessary set of sensors working in case the node deployment density is much higher than necessary. PEAS protocol consists of two algorithms: Probing Environment and Adaptive Sleeping.  Single Coverage: The Optimal Geographical Density Control (OGDC) protocol tries to minimize the overlap of sensing areas of all sensor nodes for cases when Rc ≥ 2Rs where Rc is the node communication range and Rs is the node sensing range. OGDC is a fully localized algorithm but the node location is needed as a pre-knowledge.  Multiple Coverage: A distributed density control algorithm based on time synchronization among the neighbors. A node can decide its Low- quality communic ations Data processing Energy conservatio n Limited bandwidth Operation in hostile environme nts Scalability Unstructured and time- varying network topology
  • 2. Wireless Sensor Network: Topology Issues (IJSRD/Vol. 1/Issue 3/2013/0019) All rights reserved by www.ijsrd.com 477 on-duty time such that the whole grid still gets the required degree of coverage.  Mobile Network: The deployment schemes for movable sensors. Given an area to be monitored, the proposed distributed self- deployment protocols first discover the existence of coverage holes in the target area then calculate the target positions and move sensors to diminish the coverage holes. The sensor network in the viewpoint of virtual forces, nodes only use their sensed information to make moving decisions. It is a cost effective and no communication among the nodes or localization information is needed. For the DSS (Distributed Self-Spreading) algorithm proposed, sensors are randomly deployed initially. They start moving based on partial forces exerted by the neighbors. The forces exerted on each node by its neighbors depend on the local density of deployment and on the distance between the node and the neighbor.  Hybrid Network: The coverage scenario with only some of the sensors are capable of moving has been under active research, especially in the field of robotics for exploration purpose. The movement capable sensors can help in deployment and network repair by moving to appropriate locations within the field to achieve desired level of coverage. Combined solution for the exploration and coverage of a given target area. The coverage problem is solved with the help of a constantly moving robot in a given target area. The algorithm does not consider the communications between the deployed nodes. All decisions are made by the robot by directly communicating with a neighbor sensor node. Single coverage problem by moving the available mobile sensors in a hybrid network to heal coverage holes Sensor Connectivity Topology2) The connectivity topology on the other hand is more concern more about network connectivity and emphasizes the message retrieve and delivery in the network. Two kinds of mechanisms have been utilized to maintain an efficient sensor connectivity topology:  Power Control Mechanisms: The goal of power control mechanisms is to dynamically change the nodes’ transmitting range in order to maintain some property of the communication graph, while reducing the energy consumed by node transceivers because they are one of the primary sources of energy consumption in WSNs. Power control mechanisms are fundamental to achieving a good network energy efficiency. Power control is studied in homogeneous and non-homogeneous scenarios which can be distinguished by examine if the nodes have the same transmitting range or not. For homogeneous network, the CTR (Critical Transmitting Range) problem has been investigated in theoretical ways as well as practical viewpoints. A distributed protocol, called COMPOW that attempts to determine the minimum common transmitting range needed to ensure network connectivity. They show that setting the transmitting range to this value has the beneficial effects of maximizing network capacity, reducing the contention to access the wireless channel, and minimizing energy consumption. the tradeoff between the transmitting range and the size of the largest connected component in the communication graph. The experimental results presented show that, in sparse two and three- dimensional networks, the transmitting range can be reduced significantly if weaker requirements on connectivity are acceptable: halving the critical transmitting range, the largest connected component has an average size of approximately 0.9n. This means that a considerable amount of energy is spent to connect relatively few nodes. Non- homogeneous networks are more challenging because nodes are allowed to have different transmitting ranges. The problem of assigning a transmitting range to nodes in such a way that the resulting communication graph is strongly connected and the energy cost is minimum is called the Rang Assignment (RA) problem. It is shown to be NP-hard in the case of 2D and 3D networks. However the optimal solution can be approximated within a factor of 2 using the range assignment generated. An important variant of RA has been recently studied is based on the concept of symmetry of the communication graph. Due to the high overhead needed to handle unidirectional links in routing protocols or MAC protocols which are naturally designed to work under the symmetric assumption, Symmetric Range Assignment (SRA) shows more practical significance. However, SRA remains NP-hard in 2D and 3D networks, and it even incurs a considerable additional energy cost over RA. I can refine SRA to WSRA (Weakly Symmetric Range Assignment) which weakens the requirement that the communication graph contains only bidirectional links by allowing the existence of the unidirectional links but requiring the symmetric sub graph of the communication graph resulting from RA connected. In the released WSRA problem, only marginal effect on the energy cost has been induced while the desired symmetry property has been kept.  Power Management Mechanisms: Power management is concerned of which set of nodes should be turned on/off and when, for the purpose of constructing energy saving topology to prolong the network lifetime. It can utilize information available from all the layers in the protocol stack. In GAF approach, nodes use location information to divide the field into fixed square grids. The size of each grid stays constant, regardless of node density. Nodes within a grid switch between sleeping and listening mode, with the guarantee that one node in each grid stays up so that a dynamic routing backbone is maintained to forward packets. Span, a power saving topology maintenance algorithm for multi-hop ad hoc
  • 3. Wireless Sensor Network: Topology Issues (IJSRD/Vol. 1/Issue 3/2013/0019) All rights reserved by www.ijsrd.com 478 wireless networks which adaptively elects coordinators from all nodes to form a routing backbone and turn off other nodes’ radio receivers most of the time to conserve power. STEM approach, which exploits the time dimension rather than the node density dimension to control a power saving topology of active nodes. They switch nodes between two states, “transfer state” and “monitoring state”. Data are only forwarded in the transfer state. In the monitoring state, nodes remain their radio off and will switch into transfer state to be an initiator node on event detected. The extended study on combining STEM and GAF shows the potential of further power saving by exploiting both time dimension and node density dimension. Topology Awareness ProblemsB. It includes geographic routing problems and sensor holes problems. Geographic routing uses geographic and topological information of the network to achieve optimal routing schemes with high routing efficiency and low power consumption. Various sensor holes, such as Jamming holes, sink/black holes and worm holes, may form in a WSN and create network topology variations which trouble the upper layer applications. For examples, intense communication may cause jamming holes which will fail to deliver message to exterior nodes. Sink/Black holes and worm holes are caused by nodes exhausted around sink node or pretended sinks or by malicious nodes. If sensor holes issues are not treated carefully, they will create costly routing table and exhaust the intermediate nodes rapidly.  Geographic Routing: Geographic routing approach relies on greedy forwarding to route packets based on nodes’ local information on the network topology. The protocol starts in greedy forwarding mode, and assumes the location information of sensor nodes can be obtained by supporting systems. GPSR recovers from local maximum position by using perimeter rouging mode and the right-hand rule. kis et al. propose the Compass Routing algorithm and FACE-1 algorithms that guarantees the destination is reached even when local minimum phenomenon occurs in greedy forwarding. Similar to the work in, Bose et al. propose the FACE-2 routing algorithm. In contrast to GPSR, routing in FACE-2 is done through the perimeter of the Gabriel Graph (CG) formed at each node. It also modifies the FACE-1 so that the perimeter traversal follows the next edge whenever that edge crosses the line from the source to destination. Obviously, the downside of FACE-2 is that it consumes more energy in the perimeter nodes.  Hole Problems: For most of the geographic routing schemes, a routing hole consists of a region in the sensor network, where either node are not available or the available nodes cannot participate in the actual routing of the data due to various possible reasons. In order to prevent the infection to the packet delivery by sensor holes, the geographic routing schemes do not provide methods to detect and localize the holes. Theoretical work on determining sensor holes in which so- called stuck node is defined and an algorithm called BOUNDHOLE is proposed to find the holes utilizing the strong stuck nodes. Study an application specific scenario for the underground monitoring in coal mine. They propose a topology maintenance protocol SASA, which claims to rapidly detect the structure variation during underground collapse by regulating the mesh sensor network deployment and formulating a collaborating mechanism based on the regular beacon strategy for sensors. The so-called edge nodes outline the sensor hole and report it to the sink. To the best of our knowledge, the SASA protocol is the first work which relates the topology variation to the actual geographical changes. Wood et al. discuss jamming hole in. The resilience of various routing protocols and energy conserving topology maintenance algorithms against sink holes. They showed that popular routing protocols like directed diffusion, rumor routing and multi-path variant of directed diffusion etc. are all vulnerable to sink holes attacks. For geographical greedy forwarding algorithms it is more difficult to create sink holes because in this case a malicious node has to advertise different attractive locations to different neighbors in order to qualify as next hop. III. CONCLUSIONS Two major issues found in topology in WSNs, namely topology awareness and topology control. Topology awareness problems construct applications or upper protocols to conform the underlying topology. Typical approaches applied in this category do not actively consider improving the topology itself for the specific applications. Topology control mechanisms focus more on constructing an energy-efficient and reliable network topology and normally do not touch individual applications. Power control and power management are two different types of topology controlling methods. By focusing on integrating power control and power management, it is possible to provide noticeable improvements on network topology and efficiencies of energy usage. REFERENCES [1] Pirmez, L., Delicato, F., Pires, P., Mostardinha, A., de Rezende, N.:2007 Applyingfuzzy logic for decision- making on wireless sensor networks. In: Fuzzy Systems Conference '07, Proc., IEEE, 2007. [2] Wolenetz, M., Kumar, R., Shin, J., Ramachandran, U.:2005 A simulation-based study of wireless sensor network middleware. Network Management 15(4), 2005 [3] B. Karp and H. T. Kung, "Greedy Perimeter Stateless Routing for Wireless Networks," in proceedings of theSixth Annual International Conference on Mobile Computing and Networking (Mobicom), 2000. [4] F. Ye, G. Zhong, S. Lu and L. Zhang, "PEAS: A Robust Energy Conserving Protocol for Long-lived Sensor Networks," in proceedings of International Conference on Distributed Computing Systems (ICDCS), 2003. [5] H. Zhang and J. Hou, "Maintaining Sensing Coverage and Connectivity in Large Sensor Networks," Department of Computer Science, UIUC UIUCDCS-R- 2003-2351, 2003 [6] G. Wang, G. Cao and T. L. Porta, "Movement-Assisted Sensor Deployment," in proceedings of IEEE INFOCOM, 2004 [7] X. Wang, G. Xing, Y. Zhang, C. Lu, R. Pless, et al., "Integrated Coverage and Connectivity Configuration in
  • 4. Wireless Sensor Network: Topology Issues (IJSRD/Vol. 1/Issue 3/2013/0019) All rights reserved by www.ijsrd.com 479 Wireless Sensor Networks," in proceedings of ACM SenSys, 2003. [8] S. Narayanaswamy, V. Kawadia, R. Sreenivas and P. Kumar, "Power control in ad hoc networks: Theory, architecture, algorithm and implementation of the COMPOW protocol," in proceedings of European Wireless, 2002.