SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1322
Dynamic Slot Allocation for Improving Traffic Performance in Wireless
Sensor Network
Arti Kamal1, Dr. Prabhat Patel2
1Research Scholar, Department of Electronics and Communication Engineering ,Jabalpur ,Madhya Pradesh, India
2Professor, Department of Electronics and Communication Engineering, Jabalpur, Madhya Pradesh, India
----------------------------------------------------------------------***--------------------------------------------------------------------
Abstract -Wireless sensor networks have recently received
increased attention for a broad array of applications such as
surveillance, environment monitoring, medical diagnostics,
and industrial control. A wireless sensor network (WSN)
contains numerous small sized sensor nodes that have
computation power. In WSNs serious incident data collected
by the sensor nodes are to be reliably delivered to the sink for
successful monitoring of an environment. The battery is the
main energy source in the wireless sensor network. For better
performance battery power should be sufficient. More energy
consumption reduces the lifetime of the wireless sensor
network. Also, if the channel utilization is more than
throughput of the wireless sensor network reduces. Thus,
wireless sensor networks medium access control (MAC)
protocols for energy efficiency comes at the cost of extra
packet delay and limited throughput, since a senderisallowed
to transmit in the short active periods, only. However, typical
applications, in addition to low rate periodic traffic, also
present burst traffic triggered upon event detections.
Therefore, there is an emerging need for a MAC protocol that
adapts its offered bandwidth to a dynamic traffic load, i.e.,
maintain low duty-cycle in light traffic conditionandschedule
more transmission opportunitieswhentraffic increasessothat
the energy is only used for carrying the application traffic
whenever needed. In this paper we propose a scheme which
reduces the traffic in the network using dynamic channel
allocation. The duty cycle of the network is also improved.
Key Words: Wireless Sensor Network, dynamic slot
allocation, MAC, CSMA, TDMA, Queue length.
1.INTRODUCTION
A wireless sensor network (WSN) [1] encompasses of
several lesser sized sensor nodes that have low working
out power. It also have communication ability and sensing
functionalities. Wireless sensornetworksestablisha specific
type of wireless data communicationnetworks.Everysensor
node can sense physical characteristics. WSNshavebeenthe
favorite choiceforthesucceedinggenerationmonitoring and
control systems. It can sense temperature, light, vibration,
humidity, electromagnetic strength or any other physical
characteristic, and communicate the sensed information [2]
to the other node through a series of numerous in-between
nodes that assist in forwarding the data. The design
challenges of WSN are limited energy capacity, sensor
locations [3], random and massive node disposition,
inadequate hardware devices, network system features and
data aggregation, unreliable environment, scalability, and
assorted recognizingapplicationnecessities.In WSNs,severe
happening data composed by the sensor nodes is to be
consistently distributed to the sink for efficacious observing
of an environment. The various applications of wireless
sensor network are smart grids and energy control systems,
industrial applications, transportations and logistics, smart
building for example indoor climate control, health care for
example medical health diagnostics and health monitoring,
precision agriculture,animal tracking,urbanterraintracking
and civil structure monitoring, entertainment, security and
surveillance.
The communication of WSN is not only effected by antenna
angle but also by weather conditions, obstacles etc. Further,
it is also depends on interference. Nodes in WSNs are
disposed to letdown due to hardware letdown, energy
reduction, communication link faults, mischievous attack,
and so on.
Nodes in sensor networks have very limited energy. The
main WSN objectives are less power consumption, better
channel utilization, less node cost, small node size,
scalability, security, fault tolerance, adaptability, QoS [4]
support and self configurability. Routing rules of wireless
sensor network naturally adjustthemselveswiththecurrent
environments which may vary with high mobility to low
mobility in extremes along with high bandwidth.
Routing in wireless network is different from simple adhoc
network. Wireless sensor network is infrastructure less.
Wireless links are not reliable. All the routing protocols of
wireless sensor network require good energy. Wireless
sensor node may fail because of infrastructure. The wireless
sensor network protocols are location based protocols,
hierarchical protocols, data centric protocols, multipath
based protocols, QoS based protocols, mobility based
protocols, and heterogeneity basedprotocol.Afewprotocols
reported in literature are as follows: Location based - GAF,
TBF, SMECH, GeRaF, MECN [5], GEAR, Span, BVGF;
Hierarchical Protocols - APTEEN, LEACH, HEED, PEGASIS,
TEEN; Data-centric Protocols - Rumor Routing, ACQUIRE,
Quorum-Based Information Dissemination, SPIN, EAD,
Information-Directed Routing, HABID, GBR, EAR, IDR,
COUGAR, DD; Heterogeneity-based Protocols - CHR, CADR,
IDSQ; Multipath-based Protocols - Braided Multipath,
Sensor-Disjoint Multipath , N-to-1 Multipath Discovery;
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1323
Mobility-based Protocols - TTDD, SEAD [6], Dynamic Proxy
Tree-Base Data Dissemination, Joint Mobility and Routing,
Data MULES; and finally QoS-based protocols - SPEED,
Energy-aware routing, SAR.
The battery condition of WSN node is very important factor
for better communication.Thehardwareingoodconditionis
very necessary for WSN communication. To maintain a
sensor network running in a normal condition, many
applications such as time synchronization, reprogramming,
protocol update, etc are necessaryinflooding[8]manner.To
achieve availability, integrity and reliability routing rules
should be robust against malevolent attacks.
In this paper, we propose an algorithm which improves the
duty cycle, the network lifetime and reduces energy
consumption. The experimental outcomes depict the
improvement in the throughputofthesystemand endtoend
data transmission, reduction in the traffic of the wireless
sensor network due to dynamic channel allocation thereby
improving the overall system performance.
The rest of the paper is organized as follows. Section 2
provides a brief literature survey related to wireless sensor
network, and the routing protocols used in wireless sensor
network. Section 3 concentrates on the proposed work,
algorithm of the proposed work. Section 4 provides the
implementation and result analysis. Finally, Section 5
provides concluding remarks, limitation discussion.
2. LITERATURE SURVEY
Wireless sensor networks (WSNs) have been widely used in
many application areas such as infrastructure protection,
environment monitoring and habitat tracing. Because of
more energy consumption, the lifetime of the wireless
sensor network reduces. Also, if the channel utilization is
more than throughput of the wireless sensor network
reduces. Thus, wireless sensor networks medium access
control (MAC) protocols for energy efficiency comes at the
cost of extra packet delay and limited throughput, since a
sender is allowed to transmit in the short active periods,
only. Hence, to provide high throughput and short delay,
while still keeping low power consumption is still a research
challenge in current WSNs MAC protocols. However, typical
applications, in addition to low rate periodic traffic, also
present burst traffic triggered upon event detections.
Therefore, there is an emerging need fora MACprotocol that
adapts its offered bandwidth to a dynamic traffic load, i.e.,
maintain low duty-cycle in light traffic condition and
schedule more transmission opportunities when traffic
increases so that the energy is only used for carrying the
application traffic whenever needed. When the load
increases, the number of collisions and retransmissions
strongly degrade their bandwidth efficiency and generate
long delays.
Low duty-cycle is always used to improve the network
lifetime in WSN. However, its disadvantage is long delayand
low throughput if traffic is more. Authors in [9] proposed
hybrid CSMA/TDMA MAC protocol called iQueue-MAC for
dynamic and busy traffic. In this method if the traffic in a
system is low then the protocol uses a contention-based
CSMA mechanism that provides low delay with scattered
transmissions and if traffic is more and dynamic then it uses
a contention-free TDMA mechanism allocatingtransmission
slots. iQueue-MAC mitigates packet buffering and reduces
packet delay, combining the best of TDMA and CSMA. This
system can be used in both multi-channel andsinglechannel
mode. iQueue-MAC is able to effectively use multiple
channels, duplicating its throughput when compared to
single channel operation. Authors also proposed a
distributed sub-channel selectionalgorithmtoassignunique
sub-channels to routers to arrange theslottedtransmissions
in parallel.
For continuous transmission Wise-MAC [10] a contention-
based protocols, uses a ”more-bit” information in the data
packet header of data packets.RIMAC[11]Receiver-initiated
MAC uses beacon as the ACK transmission and next
forwarding for continuous transmission. RI-MAC and Wise-
MAC have low throughput at heavy load because of collision
between receiver and senders.
Z-MAC uses hybrid CSMA/TDMA procedure for static slot
allocation and reduces traffic overhead. In this mechanism
vacant slot can be used by others. Duetostaticslotallocation
the bandwidth is reduced. Strawman MAC [12] reduces the
contention by using extra Collision packets. The sender who
has sent the longest Collision packet wins the channel. But
the Collision packets introduce a considerable amount of
overheads to the system. RCMAC [13] improves RI-MAC,
that designates the nextsenderthroughACKpiggybackingto
reduce collision. However,howtoallocatebandwidthamong
senders is not specified.
CoSenS [14], a collecting then sending burst protocol was
proposed to provide traffic adaptation. It dynamically
adjusts the duration of its data collectingperiodaccordingto
the estimated traffic load. The traffic estimation algorithmis
based on the weighted exponential average (similar to that
used for RTT estimation in TCP protocol). ContikiMAC [15]
efficiently integrates several unique techniques of other
WSNs MACs, such as burst forwarding, phase-lock, and data
packet strobe. However, ContikiMAC is mostly designed to
handle low rate packets, it has no specific mechanism to
handle burst traffic loads.
WirelessHart [16], ISA100 and the new IEEE802.15.4e
standard are currently the most popular wireless solutions
for industrial applications. These standards utilize Time
Slotted Channel Hopping (TSCH) technique to provide
deterministic transmissions and robustness. However,
currently, they lack link scheduling algorithms which are
crucial for assigning slots/frequency resources in WSNs.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1324
Compared to existing solutions, iQueue-MAC mitigates
contention and retransmission by shifting intensivesenders
into the TDMA slots period. The senders’ queue-length
information is piggybacked on data packet, so that the time
slots are assigned right upon queuing detection. The crux of
iQueue-MAC is an efficient closed loop control mechanism
that uses nodes’ queue-length as the measured output and
uses adaptive time slots assignment as the control input to
mitigate packets queuing. In fact, prior to iQueue-MAC, the
similar idea emerged in the FTT (Flexible Time-Triggered)
paradigm which is originallyproposedforCAN andEthernet,
however, iQueue-MAC makes it more suitable for WSNs.
The different methods provided for dynamic slot allocation
[17] comes at the cost of limited throughput, and additional
packet delay. The sender is allowed to transmit in the short
active periods, only with less energy efficiency. Thus, under
high traffic load, the absence of collisions makes them very
efficient supporting high throughput.However,iftheoffered
bandwidth does not match exactly the communication
requirements, either bandwidth will bewastedifnodeshave
nothing to transmit or queues will build up if nodes have
more to transmit than what fits in the allocatedslots,leading
to long delays.
How to make available short delay, high throughputandless
power consumption is main problemand researchchallenge
in existing WSNs protocols. The different low duty-cycle
protocols deliver low energy effectiveness under the
assumption that the system has long-standing low rate
intervallic traffic. Nevertheless, typical applications, in
addition to low rate interrupted traffic, also require
contemporary burst traffic generated upon occurrence
detections, e.g., target detection. Consequently, there is a
developing need for a protocol that get usedtoitsobtainable
bandwidth to a dynamic data traffic load, i.e., conserve little
duty-cycle in low traffic condition and provide more
transmission prospects when data traffic increases,andthat
the energy is only applied for carrying the network traffic on
every occasion needed. The methods may have more traffic
overhead and more energy consumption.
3. PROPOSED ALGORITHM
Keeping in view the above we propose an algorithm which
caters for the requirements to improve the WSNs lifetime
and throughput. The steps in the proposed algorithm are as
follows:
Step1. Network initialization stage: Node chooses neighbors
unique ID and broadcasts beacons for network
establishment. Any node receiving beacons from different
coordinators at the same moment will be tagged as the
alternative gateway node, and the one with the nearest
neighbor will be considered as the gateway by coordinators.
All coordinators determine the position of their own and
neighbors using gateway.
Step2. Nodes access stage: After nodesaccesstothenetwork,
they apply for the allocation time according to the step 3.
Step3. Nodes mobility tracking and prediction: When the
position information indicates that the node has already
moved to another network, the current associated network
will inform the target node to reserve time slots for the
coming node.
Step4. Nodes mobility support:Ifthereare bufferedpacketsin
the former associated network when nodes enter intoa new
network, the former coordinator would forward those
packets to the new one.
Proposed Algorithm
1) Initialization step: minq=0.20 * queue size
Maxq=0.80 * queue size, Warn=queue size/2
Threshold value setup
2) Each node checks its congestion statues by using
average queue length, channel utilization ration and
residual energy. Compute average queue length.
The frequency of data packet is decided according to
congestion status
If frequency is high then
Ok incoming traffic is low, no action is taken
Else if frequency is medium, congested and
neighboring nodes perform data transmission
then
Traffic is medium, low amount of data can be
transmitted
Else if frequency is low, high congestion in network
then
Traffic is high, alternate best path is
dynamically established and data can be
transmitted
End if
3) Test data packet distribution ratio of the system
If data packet distribution ratio drop to the given
threshold then
Starting source node arbitrarily pick the
supportive address of any one node
neighbor
Send request to the nod
If anyone node reply from other path except
neighbor node then take the reverse locating
program and direct check data packets
Else
Goto End
End if
End
The first step is initialization step. In this step, all the
initialization parameters are set. The minimum queue is set
to 20% of queue size. Maximum queue issetto80%ofqueue
size. Warning value is set to half of the queue size. Threshold
value is set to .75.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1325
In next step, each node checksitscongestionstatuesbyusing
average queue length, channel utilizationrationandresidual
energy. It also compute the average queue length. The
frequency of data packet is decided according to congestion
status. If frequency is high then congestion is up to the mark
i.e. incoming traffic is low, no action is taken. Otherwise if
frequency is medium, congested and neighboring nodes
perform data transmission then traffic is medium, low
amount of data can be transmitted. Else if frequency is low,
high congestion in network then traffic ishigh,alternatebest
bath is dynamically established and data can betransmitted.
The next step is to test data packet distribution ratio of the
system If data packet distribution ratio drop to the given
threshold then starting source node arbitrarily pick the
supportive address of any one node neighbor. Send request
to the node If anyone node reply from other path except
neighbor node then take the reverse locating program and
direct check data packets otherwise data canbetransmitted.
4. IMPLEMENTATION AND RESULT ANALYSIS
We used Network Simulator 2 simulator software for
implementation of proposed algorithm. We also usedC/C++
and TCL language for implementation. We performed our
experiment in Intel i3 4.0 GHz machine with 2GB RAM.
Figure 1: Channel searching at 72.9 second
Figure 1 represents the channel searching at 72.9 second.
The different nodes aresearchingpathfordata transmission.
We used 50 nodes for simulation of algorithm. Nodes
mobility is also introduced to check the performance of the
network.Forthisimplementation,network parameters,such
as Dimension, Number of nodes, traffic, transmission rate,
Routing protocol, transmission range, sensitivity,
transmission power etc., are used. Transmission range is
specified as 300m. Movement model is used as random
waypoint. Simulation durationissetas90s.Traffic typeisset
as constant bit rate. Radio range is set as 250m. Data pay
load is set as 512 bytes. The NAM is used for animation in
implementation. Tcl script language with Object-oriented
extensions.
Figure 2 shows the throughput analysis of the proposed
system. The throughput is improvedduetodynamicchannel
allocation.
Figure: 2 Throughput Analysis
The congestion aims to drop the data packets or to hold the
resources such that the communication is affected. The
packets forwarding capacity of scheme is increased with
period of time. As compared to all the reported related
works the proposed work has the minimum packets drop
ratio.
Table 1: Duty cycle
Our Method IQueue CoSens
17.16% 17.930% 27.472%
Table 1 shows the average dutycycleofnodesinexperiment.
As seen from the table our method has efficientperformance
in peak traffic time. The proposed method achieves 0.77%
and 9.872% decrease in duty cycle as compare to iQueue
method and CoSens methods, respectively. Also it takes
around 5 ms of less time for data communication in the
network. Due to small duty cycle, energy consumption of
nodes decreases which, in turn, increases the lifetime of the
network. Further, if we already know the traffic situation in
the network we can decrease the power consumption of the
network. In our work, we have checked the traffic situation
using queue length status of the node. We also checked the
packet dropped of the node so the system will discard the
route information from the route status of the node. In the
simulation, it was observed that the dynamic channel
allocation method allocates better channel for data
communication and thus improve the lifetime of the
network.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1326
5. CONCLUSIONS
A wireless sensor network encompasses of several lesser
sized sensor nodes that have low working out power.
WSNs have been the favorite choice for the succeeding
generation monitoring and control systems. Wirelesssensor
networks have recently received increased attention for a
broad array of applications such as surveillance,
environment monitoring,medical diagnostics,andindustrial
control. The greatest noteworthy advantage of sensor
networks is that they increased the computation ability to
physical atmosphere where human beings cannot reach.
How to provide high throughput and short delay, while still
keeping low power consumption is still a research challenge
in current WSNs MAC protocols. Low cycle duty cycle is
always used to improve the network lifetime in WSN. Its
disadvantage is long delay and low throughput if traffic is
more. If the channel utilization is more than throughput of
the wireless sensor network reduces. We proposed an
algorithm which improves the duty cycle and lifetime of the
wireless sensor network. The experimental outcomes
represented the throughput of the system and end to end
data transmission improved. The traffic of the wireless
sensor network reduced due to dynamic channel allocation
and overall system performance increased.
REFERENCES
[1] Q. Cao, T. Abdelzaher, J. Stankovic, K. Whitehouse,andL.
Luo, “Declarative tracepoints: A programmable and
application independent debugging system for wireless
sensor networks,” in Proc. ACM SenSys, Raleigh, NC,
USA, 2008, pp. 85–98.
[2] W. Dong, Y. Liu, Y. He, T. Zhu, and C.Chen,“Measurement
and analysis on the packet delivery performance in a
large-scale sensor network,” IEEE/ACM Trans. Netw.,
vol. 22, no. 6, pp. 1952–1963, Dec. 2014.
[3] L. Girod et al., “EmStar: A software environment for
developing and deploying wireless sensor networks,”in
Proc. USENIX Annu. Tech. Conf., Boston, MA, USA, 2004,
p. 24.
[4] N. Leone et al., “The DLV system for knowledge
representation and reasoning,” ACM Trans. Comput.
Logic, vol. 7, no. 3, pp. 499–562,Jul. 2006.
[5] X. Li, Q. Ma, Z. Cao, K. Liu, and Y. Liu, “Enhancing
visibility of network performance in large-scale sensor
networks,” in Proc. IEEE ICDCS, Madrid, Spain,2014,pp.
409–418.
[6] Z. Li, Y. Liu, M. Li, J. Wang, and Z. Cao, “Exploiting
ubiquitous data collection for mobile users in wireless
sensor networks,” IEEE Trans. Parallel Distrib.Syst.,vol.
24, no. 2, pp. 312–326, Feb. 2013.
[7] Y. Liu et al. Does wireless sensor network scale? A
measurement study on greenorbs,” in Proc. IEEE
INFOCOM, Shanghai, China, 2011, pp. 873–881.
[8] Y. Liu, K. Liu, and M. Li, “Passive diagnosis for wireless
sensor networks,” IEEE/ACM Trans.Netw.,vol.18,no.4,
pp. 1132–1144, Aug. 2010.
[9] Shuguo Zhuo, Zhi Wang, Ye-Qiong Song, Zhibo Wang,
and Luis Almeida, “A Traffic Adaptive Multi-Channel
MAC Protocol with Dynamic Slot Allocation for WSNs,”
IEEE Transactions On Mobile Computing, Vol. 15, No. 7,
July 2016, pp-1600-1613
[10]A. El-Hoiydi and J.-D. Decotignie, “Low power downlink
MAC protocols for infrastructure wireless sensor
networks,” Mobile Netw. Appl., vol. 10, no. 5, pp. 675–
690, 2005.
[11]Y. Sun, O. Gurewitz, and D. B. Johnson, “RI-MAC: A
receiver-initiated asynchronous duty cycle MAC
protocol for dynamic traffic loads in wireless sensor
networks,” in Proc. ACM 6thACMConf.EmbeddedNetw.
Sens. Syst., 2008, pp. 1–14.
[12]F. € Osterlind, L. Mottola, T. Voigt, N. Tsiftes, and A.
Dunkels, “Strawman: Resolving collisions inburstylow-
power wireless networks,” in Proc. ACM/IEEE 11th Int.
Conf. Inf. Process. Sens. Netw., 2012, pp. 161–172.
[13]B. Nefzi and Y.-Q. Song, “QoS for wireless sensor
networks: Enabling service differentiation at the MAC
sub-layer using CoSenS,” Adv. Ad Hoc Netw., vol. 10, no.
4, pp. 680–695, 2012.
[14]A. Dunkels, “The ContikiMAC radio duty cycling
protocol,” Tech. Rep. T2011:13, Swedish Institute of
Computer Science, 2011.
[15]Industrial Communication Networks–Wireless
Communication Network and Communication Profiles-
Wireless HART, IEC Standard 62591:2010, 2010.
[16]O. D. Incel, L. van Hoesel, P. Jansen, and P. Havinga, “MC-
LMAC: A multi-channel MAC protocol for wireless
sensor networks,” AdHoc Netw., vol. 9, no. 1, pp. 73–94,
2011.
[17]L. Tang, Y. Sun, O. Gurewitz, andD.B.Johnson,“EM-MAC:
A dynamic multichannel energy-efficient MAC protocol
for wireless sensor networks,” in Proc. ACM 12th ACM
Int. Symp. Mobile Ad Hoc Netw. Comput., 2011, pp.
23:1–23:11.

More Related Content

What's hot

Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...IJECEIAES
 
Qualitative Analysis of Routing Protocols in WSN
Qualitative Analysis of Routing Protocols in WSNQualitative Analysis of Routing Protocols in WSN
Qualitative Analysis of Routing Protocols in WSNEswar Publications
 
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...IRJET Journal
 
Sensors 19-03789-v2
Sensors 19-03789-v2Sensors 19-03789-v2
Sensors 19-03789-v2Nitin k
 
rupali published paper
rupali published paperrupali published paper
rupali published paperRoopali Singh
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET Journal
 
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...IOSR Journals
 
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor Network
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor NetworkEnergy Efficient PEGASIS Routing Protocol in Wireless Sensor Network
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor NetworkIRJET Journal
 
Performance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksPerformance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksDarpan Dekivadiya
 
A Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health MonitoringA Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health MonitoringIJEEE
 
Routing Optimization with Load Balancing: an Energy Efficient Approach
Routing Optimization with Load Balancing: an Energy Efficient ApproachRouting Optimization with Load Balancing: an Energy Efficient Approach
Routing Optimization with Load Balancing: an Energy Efficient ApproachEswar Publications
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...IRJET Journal
 
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking network
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking networkQuality of Service in bandwidth adapted hybrid UMTS/WLAN interworking network
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking networkTELKOMNIKA JOURNAL
 

What's hot (16)

Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...
 
Qualitative Analysis of Routing Protocols in WSN
Qualitative Analysis of Routing Protocols in WSNQualitative Analysis of Routing Protocols in WSN
Qualitative Analysis of Routing Protocols in WSN
 
Ly3421472152
Ly3421472152Ly3421472152
Ly3421472152
 
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
 
Sensors 19-03789-v2
Sensors 19-03789-v2Sensors 19-03789-v2
Sensors 19-03789-v2
 
Bf33335340
Bf33335340Bf33335340
Bf33335340
 
rupali published paper
rupali published paperrupali published paper
rupali published paper
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
 
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
 
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor Network
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor NetworkEnergy Efficient PEGASIS Routing Protocol in Wireless Sensor Network
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor Network
 
R33092099
R33092099R33092099
R33092099
 
Performance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksPerformance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor Networks
 
A Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health MonitoringA Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health Monitoring
 
Routing Optimization with Load Balancing: an Energy Efficient Approach
Routing Optimization with Load Balancing: an Energy Efficient ApproachRouting Optimization with Load Balancing: an Energy Efficient Approach
Routing Optimization with Load Balancing: an Energy Efficient Approach
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
 
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking network
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking networkQuality of Service in bandwidth adapted hybrid UMTS/WLAN interworking network
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking network
 

Similar to Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor Network

A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...IRJET Journal
 
Study Of Coded Based Mechanism In WSN System
Study Of Coded Based Mechanism In WSN SystemStudy Of Coded Based Mechanism In WSN System
Study Of Coded Based Mechanism In WSN SystemIJERA Editor
 
Computational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkComputational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkIRJET Journal
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksMohammad Siraj
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Reviewtheijes
 
J031101064069
J031101064069J031101064069
J031101064069theijes
 
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...cscpconf
 
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...IJEEE
 
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...IJCNCJournal
 
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...IJCNCJournal
 
Efficient energy, cost reduction, and QoS based routing protocol for wireless...
Efficient energy, cost reduction, and QoS based routing protocol for wireless...Efficient energy, cost reduction, and QoS based routing protocol for wireless...
Efficient energy, cost reduction, and QoS based routing protocol for wireless...IJECEIAES
 
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...cscpconf
 
IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...
IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...
IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...IRJET Journal
 
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...IRJET Journal
 

Similar to Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor Network (20)

A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
 
Study Of Coded Based Mechanism In WSN System
Study Of Coded Based Mechanism In WSN SystemStudy Of Coded Based Mechanism In WSN System
Study Of Coded Based Mechanism In WSN System
 
Computational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkComputational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor Network
 
Bf33335340
Bf33335340Bf33335340
Bf33335340
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networks
 
B0470208027
B0470208027B0470208027
B0470208027
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
 
J031101064069
J031101064069J031101064069
J031101064069
 
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
Ly3421472152
Ly3421472152Ly3421472152
Ly3421472152
 
Ly3421472152
Ly3421472152Ly3421472152
Ly3421472152
 
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
 
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
 
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
 
Efficient energy, cost reduction, and QoS based routing protocol for wireless...
Efficient energy, cost reduction, and QoS based routing protocol for wireless...Efficient energy, cost reduction, and QoS based routing protocol for wireless...
Efficient energy, cost reduction, and QoS based routing protocol for wireless...
 
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
 
Ttacca
TtaccaTtacca
Ttacca
 
IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...
IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...
IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...
 
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 

Recently uploaded (20)

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 

Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor Network

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1322 Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor Network Arti Kamal1, Dr. Prabhat Patel2 1Research Scholar, Department of Electronics and Communication Engineering ,Jabalpur ,Madhya Pradesh, India 2Professor, Department of Electronics and Communication Engineering, Jabalpur, Madhya Pradesh, India ----------------------------------------------------------------------***-------------------------------------------------------------------- Abstract -Wireless sensor networks have recently received increased attention for a broad array of applications such as surveillance, environment monitoring, medical diagnostics, and industrial control. A wireless sensor network (WSN) contains numerous small sized sensor nodes that have computation power. In WSNs serious incident data collected by the sensor nodes are to be reliably delivered to the sink for successful monitoring of an environment. The battery is the main energy source in the wireless sensor network. For better performance battery power should be sufficient. More energy consumption reduces the lifetime of the wireless sensor network. Also, if the channel utilization is more than throughput of the wireless sensor network reduces. Thus, wireless sensor networks medium access control (MAC) protocols for energy efficiency comes at the cost of extra packet delay and limited throughput, since a senderisallowed to transmit in the short active periods, only. However, typical applications, in addition to low rate periodic traffic, also present burst traffic triggered upon event detections. Therefore, there is an emerging need for a MAC protocol that adapts its offered bandwidth to a dynamic traffic load, i.e., maintain low duty-cycle in light traffic conditionandschedule more transmission opportunitieswhentraffic increasessothat the energy is only used for carrying the application traffic whenever needed. In this paper we propose a scheme which reduces the traffic in the network using dynamic channel allocation. The duty cycle of the network is also improved. Key Words: Wireless Sensor Network, dynamic slot allocation, MAC, CSMA, TDMA, Queue length. 1.INTRODUCTION A wireless sensor network (WSN) [1] encompasses of several lesser sized sensor nodes that have low working out power. It also have communication ability and sensing functionalities. Wireless sensornetworksestablisha specific type of wireless data communicationnetworks.Everysensor node can sense physical characteristics. WSNshavebeenthe favorite choiceforthesucceedinggenerationmonitoring and control systems. It can sense temperature, light, vibration, humidity, electromagnetic strength or any other physical characteristic, and communicate the sensed information [2] to the other node through a series of numerous in-between nodes that assist in forwarding the data. The design challenges of WSN are limited energy capacity, sensor locations [3], random and massive node disposition, inadequate hardware devices, network system features and data aggregation, unreliable environment, scalability, and assorted recognizingapplicationnecessities.In WSNs,severe happening data composed by the sensor nodes is to be consistently distributed to the sink for efficacious observing of an environment. The various applications of wireless sensor network are smart grids and energy control systems, industrial applications, transportations and logistics, smart building for example indoor climate control, health care for example medical health diagnostics and health monitoring, precision agriculture,animal tracking,urbanterraintracking and civil structure monitoring, entertainment, security and surveillance. The communication of WSN is not only effected by antenna angle but also by weather conditions, obstacles etc. Further, it is also depends on interference. Nodes in WSNs are disposed to letdown due to hardware letdown, energy reduction, communication link faults, mischievous attack, and so on. Nodes in sensor networks have very limited energy. The main WSN objectives are less power consumption, better channel utilization, less node cost, small node size, scalability, security, fault tolerance, adaptability, QoS [4] support and self configurability. Routing rules of wireless sensor network naturally adjustthemselveswiththecurrent environments which may vary with high mobility to low mobility in extremes along with high bandwidth. Routing in wireless network is different from simple adhoc network. Wireless sensor network is infrastructure less. Wireless links are not reliable. All the routing protocols of wireless sensor network require good energy. Wireless sensor node may fail because of infrastructure. The wireless sensor network protocols are location based protocols, hierarchical protocols, data centric protocols, multipath based protocols, QoS based protocols, mobility based protocols, and heterogeneity basedprotocol.Afewprotocols reported in literature are as follows: Location based - GAF, TBF, SMECH, GeRaF, MECN [5], GEAR, Span, BVGF; Hierarchical Protocols - APTEEN, LEACH, HEED, PEGASIS, TEEN; Data-centric Protocols - Rumor Routing, ACQUIRE, Quorum-Based Information Dissemination, SPIN, EAD, Information-Directed Routing, HABID, GBR, EAR, IDR, COUGAR, DD; Heterogeneity-based Protocols - CHR, CADR, IDSQ; Multipath-based Protocols - Braided Multipath, Sensor-Disjoint Multipath , N-to-1 Multipath Discovery;
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1323 Mobility-based Protocols - TTDD, SEAD [6], Dynamic Proxy Tree-Base Data Dissemination, Joint Mobility and Routing, Data MULES; and finally QoS-based protocols - SPEED, Energy-aware routing, SAR. The battery condition of WSN node is very important factor for better communication.Thehardwareingoodconditionis very necessary for WSN communication. To maintain a sensor network running in a normal condition, many applications such as time synchronization, reprogramming, protocol update, etc are necessaryinflooding[8]manner.To achieve availability, integrity and reliability routing rules should be robust against malevolent attacks. In this paper, we propose an algorithm which improves the duty cycle, the network lifetime and reduces energy consumption. The experimental outcomes depict the improvement in the throughputofthesystemand endtoend data transmission, reduction in the traffic of the wireless sensor network due to dynamic channel allocation thereby improving the overall system performance. The rest of the paper is organized as follows. Section 2 provides a brief literature survey related to wireless sensor network, and the routing protocols used in wireless sensor network. Section 3 concentrates on the proposed work, algorithm of the proposed work. Section 4 provides the implementation and result analysis. Finally, Section 5 provides concluding remarks, limitation discussion. 2. LITERATURE SURVEY Wireless sensor networks (WSNs) have been widely used in many application areas such as infrastructure protection, environment monitoring and habitat tracing. Because of more energy consumption, the lifetime of the wireless sensor network reduces. Also, if the channel utilization is more than throughput of the wireless sensor network reduces. Thus, wireless sensor networks medium access control (MAC) protocols for energy efficiency comes at the cost of extra packet delay and limited throughput, since a sender is allowed to transmit in the short active periods, only. Hence, to provide high throughput and short delay, while still keeping low power consumption is still a research challenge in current WSNs MAC protocols. However, typical applications, in addition to low rate periodic traffic, also present burst traffic triggered upon event detections. Therefore, there is an emerging need fora MACprotocol that adapts its offered bandwidth to a dynamic traffic load, i.e., maintain low duty-cycle in light traffic condition and schedule more transmission opportunities when traffic increases so that the energy is only used for carrying the application traffic whenever needed. When the load increases, the number of collisions and retransmissions strongly degrade their bandwidth efficiency and generate long delays. Low duty-cycle is always used to improve the network lifetime in WSN. However, its disadvantage is long delayand low throughput if traffic is more. Authors in [9] proposed hybrid CSMA/TDMA MAC protocol called iQueue-MAC for dynamic and busy traffic. In this method if the traffic in a system is low then the protocol uses a contention-based CSMA mechanism that provides low delay with scattered transmissions and if traffic is more and dynamic then it uses a contention-free TDMA mechanism allocatingtransmission slots. iQueue-MAC mitigates packet buffering and reduces packet delay, combining the best of TDMA and CSMA. This system can be used in both multi-channel andsinglechannel mode. iQueue-MAC is able to effectively use multiple channels, duplicating its throughput when compared to single channel operation. Authors also proposed a distributed sub-channel selectionalgorithmtoassignunique sub-channels to routers to arrange theslottedtransmissions in parallel. For continuous transmission Wise-MAC [10] a contention- based protocols, uses a ”more-bit” information in the data packet header of data packets.RIMAC[11]Receiver-initiated MAC uses beacon as the ACK transmission and next forwarding for continuous transmission. RI-MAC and Wise- MAC have low throughput at heavy load because of collision between receiver and senders. Z-MAC uses hybrid CSMA/TDMA procedure for static slot allocation and reduces traffic overhead. In this mechanism vacant slot can be used by others. Duetostaticslotallocation the bandwidth is reduced. Strawman MAC [12] reduces the contention by using extra Collision packets. The sender who has sent the longest Collision packet wins the channel. But the Collision packets introduce a considerable amount of overheads to the system. RCMAC [13] improves RI-MAC, that designates the nextsenderthroughACKpiggybackingto reduce collision. However,howtoallocatebandwidthamong senders is not specified. CoSenS [14], a collecting then sending burst protocol was proposed to provide traffic adaptation. It dynamically adjusts the duration of its data collectingperiodaccordingto the estimated traffic load. The traffic estimation algorithmis based on the weighted exponential average (similar to that used for RTT estimation in TCP protocol). ContikiMAC [15] efficiently integrates several unique techniques of other WSNs MACs, such as burst forwarding, phase-lock, and data packet strobe. However, ContikiMAC is mostly designed to handle low rate packets, it has no specific mechanism to handle burst traffic loads. WirelessHart [16], ISA100 and the new IEEE802.15.4e standard are currently the most popular wireless solutions for industrial applications. These standards utilize Time Slotted Channel Hopping (TSCH) technique to provide deterministic transmissions and robustness. However, currently, they lack link scheduling algorithms which are crucial for assigning slots/frequency resources in WSNs.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1324 Compared to existing solutions, iQueue-MAC mitigates contention and retransmission by shifting intensivesenders into the TDMA slots period. The senders’ queue-length information is piggybacked on data packet, so that the time slots are assigned right upon queuing detection. The crux of iQueue-MAC is an efficient closed loop control mechanism that uses nodes’ queue-length as the measured output and uses adaptive time slots assignment as the control input to mitigate packets queuing. In fact, prior to iQueue-MAC, the similar idea emerged in the FTT (Flexible Time-Triggered) paradigm which is originallyproposedforCAN andEthernet, however, iQueue-MAC makes it more suitable for WSNs. The different methods provided for dynamic slot allocation [17] comes at the cost of limited throughput, and additional packet delay. The sender is allowed to transmit in the short active periods, only with less energy efficiency. Thus, under high traffic load, the absence of collisions makes them very efficient supporting high throughput.However,iftheoffered bandwidth does not match exactly the communication requirements, either bandwidth will bewastedifnodeshave nothing to transmit or queues will build up if nodes have more to transmit than what fits in the allocatedslots,leading to long delays. How to make available short delay, high throughputandless power consumption is main problemand researchchallenge in existing WSNs protocols. The different low duty-cycle protocols deliver low energy effectiveness under the assumption that the system has long-standing low rate intervallic traffic. Nevertheless, typical applications, in addition to low rate interrupted traffic, also require contemporary burst traffic generated upon occurrence detections, e.g., target detection. Consequently, there is a developing need for a protocol that get usedtoitsobtainable bandwidth to a dynamic data traffic load, i.e., conserve little duty-cycle in low traffic condition and provide more transmission prospects when data traffic increases,andthat the energy is only applied for carrying the network traffic on every occasion needed. The methods may have more traffic overhead and more energy consumption. 3. PROPOSED ALGORITHM Keeping in view the above we propose an algorithm which caters for the requirements to improve the WSNs lifetime and throughput. The steps in the proposed algorithm are as follows: Step1. Network initialization stage: Node chooses neighbors unique ID and broadcasts beacons for network establishment. Any node receiving beacons from different coordinators at the same moment will be tagged as the alternative gateway node, and the one with the nearest neighbor will be considered as the gateway by coordinators. All coordinators determine the position of their own and neighbors using gateway. Step2. Nodes access stage: After nodesaccesstothenetwork, they apply for the allocation time according to the step 3. Step3. Nodes mobility tracking and prediction: When the position information indicates that the node has already moved to another network, the current associated network will inform the target node to reserve time slots for the coming node. Step4. Nodes mobility support:Ifthereare bufferedpacketsin the former associated network when nodes enter intoa new network, the former coordinator would forward those packets to the new one. Proposed Algorithm 1) Initialization step: minq=0.20 * queue size Maxq=0.80 * queue size, Warn=queue size/2 Threshold value setup 2) Each node checks its congestion statues by using average queue length, channel utilization ration and residual energy. Compute average queue length. The frequency of data packet is decided according to congestion status If frequency is high then Ok incoming traffic is low, no action is taken Else if frequency is medium, congested and neighboring nodes perform data transmission then Traffic is medium, low amount of data can be transmitted Else if frequency is low, high congestion in network then Traffic is high, alternate best path is dynamically established and data can be transmitted End if 3) Test data packet distribution ratio of the system If data packet distribution ratio drop to the given threshold then Starting source node arbitrarily pick the supportive address of any one node neighbor Send request to the nod If anyone node reply from other path except neighbor node then take the reverse locating program and direct check data packets Else Goto End End if End The first step is initialization step. In this step, all the initialization parameters are set. The minimum queue is set to 20% of queue size. Maximum queue issetto80%ofqueue size. Warning value is set to half of the queue size. Threshold value is set to .75.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1325 In next step, each node checksitscongestionstatuesbyusing average queue length, channel utilizationrationandresidual energy. It also compute the average queue length. The frequency of data packet is decided according to congestion status. If frequency is high then congestion is up to the mark i.e. incoming traffic is low, no action is taken. Otherwise if frequency is medium, congested and neighboring nodes perform data transmission then traffic is medium, low amount of data can be transmitted. Else if frequency is low, high congestion in network then traffic ishigh,alternatebest bath is dynamically established and data can betransmitted. The next step is to test data packet distribution ratio of the system If data packet distribution ratio drop to the given threshold then starting source node arbitrarily pick the supportive address of any one node neighbor. Send request to the node If anyone node reply from other path except neighbor node then take the reverse locating program and direct check data packets otherwise data canbetransmitted. 4. IMPLEMENTATION AND RESULT ANALYSIS We used Network Simulator 2 simulator software for implementation of proposed algorithm. We also usedC/C++ and TCL language for implementation. We performed our experiment in Intel i3 4.0 GHz machine with 2GB RAM. Figure 1: Channel searching at 72.9 second Figure 1 represents the channel searching at 72.9 second. The different nodes aresearchingpathfordata transmission. We used 50 nodes for simulation of algorithm. Nodes mobility is also introduced to check the performance of the network.Forthisimplementation,network parameters,such as Dimension, Number of nodes, traffic, transmission rate, Routing protocol, transmission range, sensitivity, transmission power etc., are used. Transmission range is specified as 300m. Movement model is used as random waypoint. Simulation durationissetas90s.Traffic typeisset as constant bit rate. Radio range is set as 250m. Data pay load is set as 512 bytes. The NAM is used for animation in implementation. Tcl script language with Object-oriented extensions. Figure 2 shows the throughput analysis of the proposed system. The throughput is improvedduetodynamicchannel allocation. Figure: 2 Throughput Analysis The congestion aims to drop the data packets or to hold the resources such that the communication is affected. The packets forwarding capacity of scheme is increased with period of time. As compared to all the reported related works the proposed work has the minimum packets drop ratio. Table 1: Duty cycle Our Method IQueue CoSens 17.16% 17.930% 27.472% Table 1 shows the average dutycycleofnodesinexperiment. As seen from the table our method has efficientperformance in peak traffic time. The proposed method achieves 0.77% and 9.872% decrease in duty cycle as compare to iQueue method and CoSens methods, respectively. Also it takes around 5 ms of less time for data communication in the network. Due to small duty cycle, energy consumption of nodes decreases which, in turn, increases the lifetime of the network. Further, if we already know the traffic situation in the network we can decrease the power consumption of the network. In our work, we have checked the traffic situation using queue length status of the node. We also checked the packet dropped of the node so the system will discard the route information from the route status of the node. In the simulation, it was observed that the dynamic channel allocation method allocates better channel for data communication and thus improve the lifetime of the network.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1326 5. CONCLUSIONS A wireless sensor network encompasses of several lesser sized sensor nodes that have low working out power. WSNs have been the favorite choice for the succeeding generation monitoring and control systems. Wirelesssensor networks have recently received increased attention for a broad array of applications such as surveillance, environment monitoring,medical diagnostics,andindustrial control. The greatest noteworthy advantage of sensor networks is that they increased the computation ability to physical atmosphere where human beings cannot reach. How to provide high throughput and short delay, while still keeping low power consumption is still a research challenge in current WSNs MAC protocols. Low cycle duty cycle is always used to improve the network lifetime in WSN. Its disadvantage is long delay and low throughput if traffic is more. If the channel utilization is more than throughput of the wireless sensor network reduces. We proposed an algorithm which improves the duty cycle and lifetime of the wireless sensor network. The experimental outcomes represented the throughput of the system and end to end data transmission improved. The traffic of the wireless sensor network reduced due to dynamic channel allocation and overall system performance increased. REFERENCES [1] Q. Cao, T. Abdelzaher, J. Stankovic, K. Whitehouse,andL. Luo, “Declarative tracepoints: A programmable and application independent debugging system for wireless sensor networks,” in Proc. ACM SenSys, Raleigh, NC, USA, 2008, pp. 85–98. [2] W. Dong, Y. Liu, Y. He, T. Zhu, and C.Chen,“Measurement and analysis on the packet delivery performance in a large-scale sensor network,” IEEE/ACM Trans. Netw., vol. 22, no. 6, pp. 1952–1963, Dec. 2014. [3] L. Girod et al., “EmStar: A software environment for developing and deploying wireless sensor networks,”in Proc. USENIX Annu. Tech. Conf., Boston, MA, USA, 2004, p. 24. [4] N. Leone et al., “The DLV system for knowledge representation and reasoning,” ACM Trans. Comput. Logic, vol. 7, no. 3, pp. 499–562,Jul. 2006. [5] X. Li, Q. Ma, Z. Cao, K. Liu, and Y. Liu, “Enhancing visibility of network performance in large-scale sensor networks,” in Proc. IEEE ICDCS, Madrid, Spain,2014,pp. 409–418. [6] Z. Li, Y. Liu, M. Li, J. Wang, and Z. Cao, “Exploiting ubiquitous data collection for mobile users in wireless sensor networks,” IEEE Trans. Parallel Distrib.Syst.,vol. 24, no. 2, pp. 312–326, Feb. 2013. [7] Y. Liu et al. Does wireless sensor network scale? A measurement study on greenorbs,” in Proc. IEEE INFOCOM, Shanghai, China, 2011, pp. 873–881. [8] Y. Liu, K. Liu, and M. Li, “Passive diagnosis for wireless sensor networks,” IEEE/ACM Trans.Netw.,vol.18,no.4, pp. 1132–1144, Aug. 2010. [9] Shuguo Zhuo, Zhi Wang, Ye-Qiong Song, Zhibo Wang, and Luis Almeida, “A Traffic Adaptive Multi-Channel MAC Protocol with Dynamic Slot Allocation for WSNs,” IEEE Transactions On Mobile Computing, Vol. 15, No. 7, July 2016, pp-1600-1613 [10]A. El-Hoiydi and J.-D. Decotignie, “Low power downlink MAC protocols for infrastructure wireless sensor networks,” Mobile Netw. Appl., vol. 10, no. 5, pp. 675– 690, 2005. [11]Y. Sun, O. Gurewitz, and D. B. Johnson, “RI-MAC: A receiver-initiated asynchronous duty cycle MAC protocol for dynamic traffic loads in wireless sensor networks,” in Proc. ACM 6thACMConf.EmbeddedNetw. Sens. Syst., 2008, pp. 1–14. [12]F. € Osterlind, L. Mottola, T. Voigt, N. Tsiftes, and A. Dunkels, “Strawman: Resolving collisions inburstylow- power wireless networks,” in Proc. ACM/IEEE 11th Int. Conf. Inf. Process. Sens. Netw., 2012, pp. 161–172. [13]B. Nefzi and Y.-Q. Song, “QoS for wireless sensor networks: Enabling service differentiation at the MAC sub-layer using CoSenS,” Adv. Ad Hoc Netw., vol. 10, no. 4, pp. 680–695, 2012. [14]A. Dunkels, “The ContikiMAC radio duty cycling protocol,” Tech. Rep. T2011:13, Swedish Institute of Computer Science, 2011. [15]Industrial Communication Networks–Wireless Communication Network and Communication Profiles- Wireless HART, IEC Standard 62591:2010, 2010. [16]O. D. Incel, L. van Hoesel, P. Jansen, and P. Havinga, “MC- LMAC: A multi-channel MAC protocol for wireless sensor networks,” AdHoc Netw., vol. 9, no. 1, pp. 73–94, 2011. [17]L. Tang, Y. Sun, O. Gurewitz, andD.B.Johnson,“EM-MAC: A dynamic multichannel energy-efficient MAC protocol for wireless sensor networks,” in Proc. ACM 12th ACM Int. Symp. Mobile Ad Hoc Netw. Comput., 2011, pp. 23:1–23:11.