SlideShare a Scribd company logo
Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone -
from a beginner who wants to learn computer basics to a software engineer who wishes to take
a global certification exam.
Ki-Tech Solutions
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND
TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB
PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU.
CELL: +91 888-379-0633 | +91 979-000-9190
Mail to: kitechsolutions.in@gmail.com
ENERGYEFFICIENTCROSS-LAYER NETWORKOPERATION MODEL
FOR IEEE 802.15.4-BASED MOBILE WIRELESS SENSOR NETWORKS
ABSTRACT:
IEEE 802.15.4 mobile wireless sensor networks (MWSNs) have been investigated in
literature. One major finding is that these networks suffer from control packet overhead and
delivery ratio degradation. This increases the network’s energy consumption. This paper
introduces a cross-layer operation model that can improve the energy consumption and system
throughput of IEEE 802.15.4 MWSNs. The proposed model integrates four layers in the network
operation: 1) application (node location); 2) network (routing); 3) medium access control
(MAC); and 4) physical layers. The location of the mobile nodes is embedded in the routing
operation after the route discovery process. The location information is then utilized by the MAC
layer transmission power control to adjust the transmission range of the node. This is used to
minimize the power utilized by the network interface to reduce the energy consumption of the
node(s).
The model employs a mechanism to minimize the neighbor discovery broadcasts to the
active routes only. Reducing control packet broadcasts between the nodes reduces the network’s
consumed energy. It also decreases the occupation period of the wireless channel. The model
operation leads the network to consume less energy while maintaining the network packet
delivery ratio. To the best of our knowledge, the presented operational model with its simplicity
has never been introduced. Through simulation-based evaluations, the proposed model
outperforms the conventional operation of IEEE 802.15.4-based network and the energy efficient
Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone -
from a beginner who wants to learn computer basics to a software engineer who wishes to take
a global certification exam.
Ki-Tech Solutions
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND
TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB
PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU.
CELL: +91 888-379-0633 | +91 979-000-9190
Mail to: kitechsolutions.in@gmail.com
and QoS aware multipath routing protocol in terms of energy consumption by roughly 10%,
twice less control packet overhead, on-par end-to-end delays and comparative packet delivery
ratios.
EXISTING SYSTEM:
 SAMAC is a cross-layer model that combines the slotted operation of the MAC protocol
with the direction of the attached sectored direction antennas.
 The communication interferences between the nodes are lowered because the
communication is between the directional antennas as omni-based antennas can infer
higher interference.
 Transmission power control is utilizes a TDMA-based MAC mechanism with a
clustering routing algorithm.
 The transmission power control is achieved based on the path-loss characteristic of one
hop between connected nodes. If the nodes are mobile, the transmission recalibration
operation of the whole network has to be performed in a frequent manner.
DISADVANTAGES OF EXISTING SYSTEM:
 Existing System suffer from control packet overhead and delivery ratio degradation.
 The mechanism assumes that the cluster heads, when chosen, are to be stationary or
remain in the same cluster the whole operational period. This limits the network’s general
operational flexibility.
Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone -
from a beginner who wants to learn computer basics to a software engineer who wishes to take
a global certification exam.
Ki-Tech Solutions
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND
TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB
PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU.
CELL: +91 888-379-0633 | +91 979-000-9190
Mail to: kitechsolutions.in@gmail.com
PROPOSED SYSTEM:
 In this project, we propose a cross-layer operation model. At network initialization, the
mobile node started to broadcast a neighbor discovery message to initiate neighbor(s)
information collection and store it in a neighbors’ list (NB-List).
 After the initialization process, if a node in the network had data of interest to send,
attached with this data was the location information of the mobile node.
 The location information in the node is provided by either a GPS module attached to the
node or any other methods where the nodes are able to estimate their individual locations.
This node then started sending route request (RREQ) packets to establish a route to the
destination node. Hello packets are broadcast packets; therefore, it was possible to utilize
the neighbor list from the network layer in the data-link layer.
ADVANTAGES OF PROPOSED SYSTEM:
 The proposed cross-layer assumes no clustering mechanism has been implemented. This
makes the network more flexible in terms of new nodes joining the network.
 The proposed system improve the energy consumption and system throughput of IEEE
802.15.4
Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone -
from a beginner who wants to learn computer basics to a software engineer who wishes to take
a global certification exam.
Ki-Tech Solutions
IEEE PROJECTS DEVELOPMENTS
WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND
TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB
PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU.
CELL: +91 888-379-0633 | +91 979-000-9190
Mail to: kitechsolutions.in@gmail.com
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
 Operating system : Windows XP/7/LINUX.
 Implementation : NS2
 NS2 Version : NS2.2.28
 Front End : OTCL (Object Oriented Tool Command
Language)
 Tool : Cygwin (To simulate in Windows OS)

More Related Content

Viewers also liked

Если хочешь быть здоров
Если хочешь быть здоровЕсли хочешь быть здоров
Если хочешь быть здоровhelen_2015
 
Attack_Project_Presentation_ISSC461_Intindolo
Attack_Project_Presentation_ISSC461_IntindoloAttack_Project_Presentation_ISSC461_Intindolo
Attack_Project_Presentation_ISSC461_IntindoloJohn Intindolo
 
NotesfromMLKTownHallMtg2015
NotesfromMLKTownHallMtg2015NotesfromMLKTownHallMtg2015
NotesfromMLKTownHallMtg2015Deborah Speight
 
Organizaciones tradicionales y actuales
Organizaciones tradicionales y actualesOrganizaciones tradicionales y actuales
Organizaciones tradicionales y actualesderly122
 
Mk0015 services marketing and customer relationship management
Mk0015 services marketing and customer relationship managementMk0015 services marketing and customer relationship management
Mk0015 services marketing and customer relationship managementconsult4solutions
 
Ventajas y desventajas de las herramientas Web en la educación
Ventajas y desventajas de las herramientas Web en la educaciónVentajas y desventajas de las herramientas Web en la educación
Ventajas y desventajas de las herramientas Web en la educaciónPamela Castellanos
 
4Virtus Reference projects
4Virtus Reference projects4Virtus Reference projects
4Virtus Reference projectsDražen Koteski
 
TIME TREX- 01 - Computación I
TIME TREX- 01 - Computación I TIME TREX- 01 - Computación I
TIME TREX- 01 - Computación I Clarissa Pérez
 

Viewers also liked (16)

Если хочешь быть здоров
Если хочешь быть здоровЕсли хочешь быть здоров
Если хочешь быть здоров
 
Attack_Project_Presentation_ISSC461_Intindolo
Attack_Project_Presentation_ISSC461_IntindoloAttack_Project_Presentation_ISSC461_Intindolo
Attack_Project_Presentation_ISSC461_Intindolo
 
NotesfromMLKTownHallMtg2015
NotesfromMLKTownHallMtg2015NotesfromMLKTownHallMtg2015
NotesfromMLKTownHallMtg2015
 
Quyet dinh 2968_qd_bct_18072016
Quyet dinh 2968_qd_bct_18072016Quyet dinh 2968_qd_bct_18072016
Quyet dinh 2968_qd_bct_18072016
 
Organizaciones tradicionales y actuales
Organizaciones tradicionales y actualesOrganizaciones tradicionales y actuales
Organizaciones tradicionales y actuales
 
Bouygues Jan 16 good
Bouygues Jan 16 goodBouygues Jan 16 good
Bouygues Jan 16 good
 
Mk0015 services marketing and customer relationship management
Mk0015 services marketing and customer relationship managementMk0015 services marketing and customer relationship management
Mk0015 services marketing and customer relationship management
 
July Newsletter 2015
July Newsletter 2015July Newsletter 2015
July Newsletter 2015
 
Dawood_Ansari
Dawood_AnsariDawood_Ansari
Dawood_Ansari
 
Rockiin uskomme
Rockiin uskommeRockiin uskomme
Rockiin uskomme
 
Ventajas y desventajas de las herramientas Web en la educación
Ventajas y desventajas de las herramientas Web en la educaciónVentajas y desventajas de las herramientas Web en la educación
Ventajas y desventajas de las herramientas Web en la educación
 
4Virtus Reference projects
4Virtus Reference projects4Virtus Reference projects
4Virtus Reference projects
 
Enem 2008
Enem 2008Enem 2008
Enem 2008
 
جيل واعد
جيل واعد  جيل واعد
جيل واعد
 
TIME TREX- 01 - Computación I
TIME TREX- 01 - Computación I TIME TREX- 01 - Computación I
TIME TREX- 01 - Computación I
 
Asignacion n°3
Asignacion n°3Asignacion n°3
Asignacion n°3
 

More from kitechsolutions

Identity based encryption
Identity based encryptionIdentity based encryption
Identity based encryptionkitechsolutions
 
Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (Ia...
Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (Ia...Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (Ia...
Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (Ia...kitechsolutions
 
BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...
BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...
BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...kitechsolutions
 
Privacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storagePrivacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storagekitechsolutions
 
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
  Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation  Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolationkitechsolutions
 
Statistical Dissemination Control in Large Machine-to-Machine Communication N...
Statistical Dissemination Control in Large Machine-to-Machine Communication N...Statistical Dissemination Control in Large Machine-to-Machine Communication N...
Statistical Dissemination Control in Large Machine-to-Machine Communication N...kitechsolutions
 
Toward Transparent Coexistence for Multihop Secondary Cognitive Radio Networks
Toward Transparent Coexistence for Multihop Secondary Cognitive Radio NetworksToward Transparent Coexistence for Multihop Secondary Cognitive Radio Networks
Toward Transparent Coexistence for Multihop Secondary Cognitive Radio Networkskitechsolutions
 
Wormhole attack detection algorithms
Wormhole attack detection algorithmsWormhole attack detection algorithms
Wormhole attack detection algorithmskitechsolutions
 
BDCAM: big data for context-aware Monitoring
BDCAM: big data for context-aware MonitoringBDCAM: big data for context-aware Monitoring
BDCAM: big data for context-aware Monitoringkitechsolutions
 

More from kitechsolutions (9)

Identity based encryption
Identity based encryptionIdentity based encryption
Identity based encryption
 
Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (Ia...
Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (Ia...Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (Ia...
Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (Ia...
 
BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...
BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...
BDCaM: Big Data for Context-aware Monitoring - A Personalized Knowledge Disco...
 
Privacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storagePrivacy preserving public auditing for regenerating code based cloud storage
Privacy preserving public auditing for regenerating code based cloud storage
 
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
  Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation  Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
Space-efficient Verifiable Secret Sharing Using Polynomial Interpolation
 
Statistical Dissemination Control in Large Machine-to-Machine Communication N...
Statistical Dissemination Control in Large Machine-to-Machine Communication N...Statistical Dissemination Control in Large Machine-to-Machine Communication N...
Statistical Dissemination Control in Large Machine-to-Machine Communication N...
 
Toward Transparent Coexistence for Multihop Secondary Cognitive Radio Networks
Toward Transparent Coexistence for Multihop Secondary Cognitive Radio NetworksToward Transparent Coexistence for Multihop Secondary Cognitive Radio Networks
Toward Transparent Coexistence for Multihop Secondary Cognitive Radio Networks
 
Wormhole attack detection algorithms
Wormhole attack detection algorithmsWormhole attack detection algorithms
Wormhole attack detection algorithms
 
BDCAM: big data for context-aware Monitoring
BDCAM: big data for context-aware MonitoringBDCAM: big data for context-aware Monitoring
BDCAM: big data for context-aware Monitoring
 

Recently uploaded

Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxJenilouCasareno
 
Open Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPointOpen Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPointELaRue0
 
How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17Celine George
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfbu07226
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxCapitolTechU
 
The Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryThe Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryEugene Lysak
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxakshayaramakrishnan21
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptxmansk2
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleCeline George
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...Nguyen Thanh Tu Collection
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticspragatimahajan3
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resourcesaileywriter
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptSourabh Kumar
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resourcesdimpy50
 
ppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesashishpaul799
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringDenish Jangid
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaasiemaillard
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
 

Recently uploaded (20)

Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
 
Open Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPointOpen Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPoint
 
How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
 
The Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. HenryThe Last Leaf, a short story by O. Henry
The Last Leaf, a short story by O. Henry
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceutics
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resources
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resources
 
ppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyes
 
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & EngineeringBasic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
Basic Civil Engg Notes_Chapter-6_Environment Pollution & Engineering
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 

An efficient distributed trust model for wireless sensor networks

  • 1. Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone - from a beginner who wants to learn computer basics to a software engineer who wishes to take a global certification exam. Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. CELL: +91 888-379-0633 | +91 979-000-9190 Mail to: kitechsolutions.in@gmail.com ENERGYEFFICIENTCROSS-LAYER NETWORKOPERATION MODEL FOR IEEE 802.15.4-BASED MOBILE WIRELESS SENSOR NETWORKS ABSTRACT: IEEE 802.15.4 mobile wireless sensor networks (MWSNs) have been investigated in literature. One major finding is that these networks suffer from control packet overhead and delivery ratio degradation. This increases the network’s energy consumption. This paper introduces a cross-layer operation model that can improve the energy consumption and system throughput of IEEE 802.15.4 MWSNs. The proposed model integrates four layers in the network operation: 1) application (node location); 2) network (routing); 3) medium access control (MAC); and 4) physical layers. The location of the mobile nodes is embedded in the routing operation after the route discovery process. The location information is then utilized by the MAC layer transmission power control to adjust the transmission range of the node. This is used to minimize the power utilized by the network interface to reduce the energy consumption of the node(s). The model employs a mechanism to minimize the neighbor discovery broadcasts to the active routes only. Reducing control packet broadcasts between the nodes reduces the network’s consumed energy. It also decreases the occupation period of the wireless channel. The model operation leads the network to consume less energy while maintaining the network packet delivery ratio. To the best of our knowledge, the presented operational model with its simplicity has never been introduced. Through simulation-based evaluations, the proposed model outperforms the conventional operation of IEEE 802.15.4-based network and the energy efficient
  • 2. Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone - from a beginner who wants to learn computer basics to a software engineer who wishes to take a global certification exam. Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. CELL: +91 888-379-0633 | +91 979-000-9190 Mail to: kitechsolutions.in@gmail.com and QoS aware multipath routing protocol in terms of energy consumption by roughly 10%, twice less control packet overhead, on-par end-to-end delays and comparative packet delivery ratios. EXISTING SYSTEM:  SAMAC is a cross-layer model that combines the slotted operation of the MAC protocol with the direction of the attached sectored direction antennas.  The communication interferences between the nodes are lowered because the communication is between the directional antennas as omni-based antennas can infer higher interference.  Transmission power control is utilizes a TDMA-based MAC mechanism with a clustering routing algorithm.  The transmission power control is achieved based on the path-loss characteristic of one hop between connected nodes. If the nodes are mobile, the transmission recalibration operation of the whole network has to be performed in a frequent manner. DISADVANTAGES OF EXISTING SYSTEM:  Existing System suffer from control packet overhead and delivery ratio degradation.  The mechanism assumes that the cluster heads, when chosen, are to be stationary or remain in the same cluster the whole operational period. This limits the network’s general operational flexibility.
  • 3. Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone - from a beginner who wants to learn computer basics to a software engineer who wishes to take a global certification exam. Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. CELL: +91 888-379-0633 | +91 979-000-9190 Mail to: kitechsolutions.in@gmail.com PROPOSED SYSTEM:  In this project, we propose a cross-layer operation model. At network initialization, the mobile node started to broadcast a neighbor discovery message to initiate neighbor(s) information collection and store it in a neighbors’ list (NB-List).  After the initialization process, if a node in the network had data of interest to send, attached with this data was the location information of the mobile node.  The location information in the node is provided by either a GPS module attached to the node or any other methods where the nodes are able to estimate their individual locations. This node then started sending route request (RREQ) packets to establish a route to the destination node. Hello packets are broadcast packets; therefore, it was possible to utilize the neighbor list from the network layer in the data-link layer. ADVANTAGES OF PROPOSED SYSTEM:  The proposed cross-layer assumes no clustering mechanism has been implemented. This makes the network more flexible in terms of new nodes joining the network.  The proposed system improve the energy consumption and system throughput of IEEE 802.15.4
  • 4. Ki-Tech Solutions offering IT courses(C, C++, Java, Asp.Net, C# and Android) for everyone - from a beginner who wants to learn computer basics to a software engineer who wishes to take a global certification exam. Ki-Tech Solutions IEEE PROJECTS DEVELOPMENTS WE OFFER IEEE PROJECTS MCA FINAL YEAR STUDENT PROJECTS, ENGINEERING PROJECTS AND TRAINING, PHP PROJECTS, JAVA AND J2EE PROJECTS, ASP.NET PROJECTS, NS2 PROJECTS, MATLAB PROJECTS AND IPT TRAINING IN RAJAPALAYAM, VIRUDHUNAGAR DISTRICTS, AND TAMILNADU. CELL: +91 888-379-0633 | +91 979-000-9190 Mail to: kitechsolutions.in@gmail.com SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7/LINUX.  Implementation : NS2  NS2 Version : NS2.2.28  Front End : OTCL (Object Oriented Tool Command Language)  Tool : Cygwin (To simulate in Windows OS)