SlideShare a Scribd company logo
1 of 4
Download to read offline
ISSN: 2277 – 9043
                               International Journal of Advanced Research in Computer Science and Electronics Engineering
                                                                                              Volume 1, Issue 5, July 2012

      An Evaluation of Ad-hoc Routing Protocols for
               Wireless Sensor Networks
                                            Tanuja Khurana, Sukhvir Singh, Nitin Goyal


                                                                             The major impacts the mobility makes in WSN are in the
        Abstract— Wireless mobile ad-hoc networks are                      area of Topology management and Energy management.
     characterized as network of nodes without any physical                When nodes keep moving its position, topology management
     connections. In these types of networks there is no fixed             is responsible for the node connectivity and routing of nodes
     topology due to the mobility of nodes, interference,                  to the sink. The energy management on the other hand deals
     multipath propagation, environmental conditions and
                                                                           with the management of limited energy resource.
     path loss. The purpose of this master thesis is to study,
     understand, analyze and discuss three mobile ad-hoc                   This project is mainly concerned with routing in mobile
     routing protocols DSDV, AODV and DSR out of which the                 wireless sensor networks. The limited processing power,
     first one is proactive protocols, which depends on the                battery life and loss of packets of the motes present many
     routing tables which are maintained at each node. The                 challenges when it comes to routing in these networks. This
     other two are reactive protocols, which find a route to a             work will look at several routing protocols to assess their
     destination on demand, whenever communication is                      suitability for use in mobile wireless sensor networks
     needed. Considering the same parameters the DSR
     protocol transfers more data than both AODV and DSDV                                II. PROBLEM DISCRIPTION
     protocols, but due to the fact that changes in paths are
     avoided the losses in AODV is less as compared to DSR                      The aims and objectives of this project are as follows:
     protocol. This work is to analyze the routing protocols for           Learn about the technologies and applications of wireless
     wireless networks based on their performance. This is                 sensor network. Understanding limitations of sensor network
     done theoretically as well as through simulation. Basically           in view of mobility & to evaluate protocols based on these
     what is to be done, to identify suitable routing protocols            limitations. Learn about the mobility impacts on routing.
     for use with WSN based on the limitations of the
                                                                           Analyze the routing protocols for wireless networks based on
     technology and propose an enhanced protocol for WSN.
                                                                           performance. This is done theoretically and through
        Index Terms— proactive protocols, reactive protocols.
                                                                           simulation. The thesis also includes the goal to generate a
                                                                           simulation environment that could be used as a platform for
                                                                           further studies within the area of wireless networks. This
                         I. INTRODUCTION                                   simulation environment is based on Network simulator 2.35.
                                                                           Identify suitable routing protocols for use with WSN based
   Wireless sensor networks [1] [2] are promising                          on the limitations of the technology.
unprecedented levels of access to information about the
physical world, in real time. Many areas of human activity
are starting to see the benefits of utilizing sensor networks. In                  III. WHY THIS PROBLEM IS CHOOSEN
almost all such cases, sensor networks are statically
                                                                              Networking, in particular wireless networking has an
deployed.
                                                                           interest of me. Due to this interest wireless networking was
One of the reasons for the sensors to be taken as stationary is            chosen as the base theme for the dissertation. Several
that because the assumption facilitates the simplification of              variations of this general theme were developed and
the clustering protocols, making them have a very low                      presented as possible projects. Two main themes are
overhead. It also avoids having to manage the mobility                     considered are routing and cluster head election in wireless
patterns of the sensors and allows saving more energy, since               networks. Both of them were considered in view of mobility,
the localization information that the network has to manage is             since mobility is one of the key challenging areas in WSN.
non-existent.                                                              After considering both these themes it was decided to look at
The evolutionary step for sensor networks is to handle                     routing. Mobile wireless sensor networks were eventually
mobility in all its forms. Mobility in wireless sensor networks            chosen as they have only been developed recently and the
has attracted a lot of attention in the recent years and has               protocols for these networks have not yet been standardized.
introduced unique challenges in aspects like resource                         Wireless computing is a rapidly emerging technology
management, coverage, routing protocols, security, etc.                    providing users with network connectivity without being
                                                                           gathered off of a wired network.

   Manuscript received July 20, 2012.
   Tanuja Khurana, Computer Science & Engineering Deptt.,N. C. College        IV. ANALYZING ROUTING PROTOCOL PERFORMANCE
of     Engineering,    Israna      (e-mail:tanujakhurana20@gamil.com).     Our focus is given to study whether mobility affects protocol
Panipat,India,
   Sukhvir Singh, Computer Science & Engineering Deptt.,N. C. College of
                                                                           performance or not. We have evaluated the performance of
Engineering,Israna.Panipat,India (e-mail: boora_s@yahoomail.com).          DSR, AODV and DSDV across deferent set of mobility
   Nitin Goyal, Computer Science & Engineering Deptt.,N. C. College of     models and observed that the mobility models may
Engineering,Israna.Panipat,India (e-mail: er.nitin29@gmail.com).

                                                                                                                                     27
                                                   All Rights Reserved © 2012 IJARCSEE
ISSN: 2277 – 9043
                          International Journal of Advanced Research in Computer Science and Electronics Engineering
                                                                                         Volume 1, Issue 5, July 2012

drastically affect protocol performance. We have taken two               In particular, a successful mobile sensor networks
scenarios to compare the performance of protocols. In the       will open new and intriguing venues for research in diverse
first scenario we taken an area of a size 900m over 900m and    topics such as:
runs a single TCP connection over 4 nodes network. The                Scalable dynamic systems
second scenario runs a single TCP connection over a 10-node           Routing
network over an area of a size 900m over 900m.When the                Fault-Tolerance
sensor nodes are stationary, we compare the performance of            Data Management
protocols by taking 4 nodes and 10 nodes network and the              Efficiency, accuracy and precision
result shows the performance degradation as the number of             Software support
nodes increases.                                                But as it comes to the mobility most of the current routing
                                                                algorithms are facing performance degradation. But the
                                                                AODV has the less performance degradation and also the
                                                                number of packets loss is less.


                                                                                      VI. RESULTS
                                                                We have compared the performance of AODV, DSDV, DSR
                                                                routing protocols in which the performance of AODV is best
                                                                suited. We have shown the performance of AODV routing
                                                                Protocol with the help of X-Graph (The graph obtained by
                                                                using NS-2 simulator) as below.



Fig. 1. TCP in a four node scenario with AODV routing
                        protocol




                                                                Fig 3. TCP packet received vs packet loss in a four node
                                                                scenario with AODV routing protocol




 Fig. 2. TCP in a ten node scenario with AODV routing
                        protocol


            V. CHALLENGES DUE TO MOBILITY

The introduction of mobility in sensor networks introduces
certain additional challenges. Some of them are detailed
below.
Space and time are receiving renewed emphasis as defining
parameters in the data collection scheme. The timely
dissemination and processing of collected information
becomes much more complex than a network resource
optimization problem, as it has to take into account user and
phenomenon mobility. On demand network reconfiguration
                                                                Fig. 4. TCP packet received vs packet loss in a ten node
now has to consider sensor repositioning over time, to best
                                                                         scenario with AODV routing protocol.
monitor an evolving event. There exists the expectation of
higher levels of modeling within the network, so that it can
respond in a timely manner to emerging situations and
reconfiguring itself to meet the corresponding demands.
Accordingly, efficient and versatile techniques to model
spatiotemporal information are a necessity.

                                                                                                                        28
                                           All Rights Reserved © 2012 IJARCSEE
ISSN: 2277 – 9043
                           International Journal of Advanced Research in Computer Science and Electronics Engineering
                                                                                          Volume 1, Issue 5, July 2012

                     VII. CONCLUSION                                       LEACH-ME suggests an improvement to the
                                                                   LEACH-M, which is suitable for mobile wireless sensor
    In this work an extensive literature survey about the issues   networks. The basic idea of LEACH-Mobile-Enhanced
associated with mobility in wireless sensor network were           (LEACH-ME) is to make sure as much as possible that the
conducted. The emphasis is given to routing issues, since it       cluster heads are from the group of mobile nodes having
makes predominant impact in view of mobility. The entire           minimum node mobility or they are in group motion with the
work was done in two phases.                                       other cluster members (RPGM model [11]). By doing the
   In the first phase, the performance evaluations of various      modified election process to cluster head or modified rotation
routing protocols in mobile wireless sensor networks were          of duty of cluster head, the model make sure that the clusters
done. The routing protocol considered were AODV, DSDV              are disturbed minimally in view of movement of cluster head
and DSR from MANET routing protocol category. All theses           .
protocols were simulated and results were summarized and           Mobility factor through the Concept of Remoteness
concluded with the help of xgraph that AODV having lowest                  Let n i (t), i = 0,1,2,3, .......... N - 1, represents the
packet losses in comparison to other protocols.                            location vector of node i at time
In the second phase, enhanced the cluster based energy                     t and di j(t) =| nj(t) - ni(t) |, the distance from node i to j
efficient protocol for handling mobility. The protocols                    at time t. Then the remoteness from node i to node j
considered for this work were LEACH and LEACH-Mobile.                      at time t is
                                                                   R i j (t) = F (d i j (t)) , Where F is the function of remoteness.
                 VIII. PROPOSED WORK                                        For a simple choice take F as identity function, then
LEACH protocol is an elegant solution to power constrain           the remoteness is just the distance between the nodes.
problem, by forming enough number of clusters in a                          As node moves relative to the other nodes
self-organized manner. LEACH basically rotate the cluster          remoteness remains the proportionate of its previous. But as
heads and achieves energy efficiency by a factor of 8.             it moves on a manner, in which its speed and angular
Although LEACH protocol has such advantages, it basically          deviation from the current state are not predictable, remoteness
assumes that the nodes are fixed. As LEACH protocol does           changes in time. Thus the definition of relative mobility
not consider the mobility of sensor nodes after the “Set-up        measure of a node in terms of time with respect to its
Phase” of clusters within a round, LEACH protocol performs         immediate neighbors
                                                                                                   1 N 1
                                                                                                         d i j (t )
poorly with serious data loss in the environment of node
mobility.                                                                              M (t ) 
                                                                                                  N  1 J 0
                                                                             To reduce energy consumption during the other time
LEACH-M is an enhancement to LEACH to support mobility
                                                                   slots that is not intended for a node, the node is put it in sleep
is introduced as LEACH-Mobile in short form named as
                                                                   mode. Therefore even though a node is in the radio range of
“LEACH-M”. The basic idea in LEACH-Mobile is to
                                                                   its neighboring nodes, it can’t hear the information send by
confirm whether a mobile sensor node is able to
                                                                   its immediate neighbors.
communicate with a specific cluster head, as it transmits a
                                                                   In order to hear simultaneously, the cluster head gives an
message, which requests for data transmission back to mobile
                                                                   extra time slot as shown in fig. 5.
sensor node from cluster head within a time slot allocated in
TDMA schedule of a wireless sensor cluster. If the mobile
sensor node does not receive the data transmission from            Slo Slo Slo ……………. Slo Activ
cluster head within an allocated time slot according to            t      t    t    .              t   e
TDMA schedule, it sending join-request message at next             0      1    2                   N-1
TDMA time slot allocated. Then it decides the cluster to             Fig. 5.TDMA time slot for LEACH-Mobile-Enhanced
which it will belong for this moment by receiving cluster
join-ack messages back from specific cluster heads. The
LEACH-M protocol achieves definite improvement in data                                   IX. FUTURE WORK
transfer success rate as mobile nodes increase compared to         In future, this LEACH-ME can be simulated and the work
the non-mobility centric LEACH protocol.                           can be extended to develop a non-cluster based routing
          LEACH-M handles the node mobility well if the            protocol to handle mobility in WSN.
cluster heads are more of less stationary. But it is not true in
all the cases as the cluster head election happens from the
same set of mobile nodes. Also the cluster head rotation is                                ACKNOWLEDGMENT
purely on random manner plus the number of times the node
was a cluster head in earlier rounds of TDMA, which is                “We present a great thanks to.” N. C. College of
exactly the same way as in basic LEACH protocol. But as the        Engineering, Israna, Panipat for the Sponsor and
cluster head keeps moving before the rotation comes, cluster       financial support.
itself get disturbed and the enormous amount of packet loss
will occur until the next new cluster formation under a new                                    REFERENCES
head.
                                                                   [1]     F Akylidiz, W. Su, Y Sankarasubramanyam, and E. Cayirci,
                                                                         “Wireles Sensor Network: a survey”, Computer Networks, Vol. 38 N0.

                                                                                                                                        29
                                             All Rights Reserved © 2012 IJARCSEE
ISSN: 2277 – 9043
                                International Journal of Advanced Research in Computer Science and Electronics Engineering
                                                                                               Volume 1, Issue 5, July 2012

     4, 2002, pp. 393-422
[2]     Carlos de Morrais Codeiro, Dhrarma Prakash Agarwal “AD-HOC
     AND SENSOR NETWORKS Theory and Applications” Ist Edition,                 Mr. Nitin Goyal obtained the B.Tech degree in Computer Science and
     World Scientific Publishing Co. Pvt. Ltd., Singapore 2006, pp. 19-79      Engineering from Kurukshetra University, Kurukshetra, India in 2007 and
[3]     Labrinidis A., Stefanidis A., “Panel on Mobility in Sensor                                  M.Tech degree from the same university in 2009. He is
     Networks”, In 6th International Conference on Mobile Data                                      presently working as Lecturer in Department of
     Management (MDM’05), pages 333-334. Ayia Napa,Cyprus, May                                      Computer Science and Engineering at N. C. College of
     2005.                                                                                          Engineering, Israna, Panipat with more than 3 years
[4]     A. Howard, M. Mataric, and G. Sukhatme. From Mobile Robot                                   experience of academic and administrative affairs in
     Teams to Sensor/Actuator Networks:The Promise and Perils of                                    the institute. He is presently pursuing his PhD from
     Mobility. In Online Proceedings of the First Workshop in                                       NIT Kurukshetra, INDIA in the Department of
     GeoSensorNetworks,             2003.         Downloadable         from    Computer Engineering. He has published approximately 9 research papers in
     http://www.spatial.main.edu/gsn03/program.html.                           various International / National Conferences as author/co-author. He has
[5]     T. Liu, C. M. Sadler, P. Zhang, and M. Martonosi. Implementing         coordinated several projects and training programmes for students and
     software on resource-constrained mobile sensors: experiences with         faculty. He has guided several B.Tech projects. His research interests include
     Impala and ZebraNet. In MobiSYS ’04: Proceedings of the 2nd               Mobile Adhoc Networks and Wireless Sensor Networks, QoS in Mobile
     international conference on Mobile systems, applications, and services,   Networks.
     pages 256–269. ACM Press,2004.
[6]     C. Jaynes. Acquisition of a Predictive Markov Model using Object
     Tracking and Correspondences in geospatial Video Surveillance
     Networks. In Stefanidis and Nittel [12], pages 149–166.
[7]     Amr El Abbadi, Department of Computer Science, University of
     California, Santa Barbara, CA 93106, “Position Statement on Mobile
     Sensor Networks”
[8]     P. Johansson, T. Larsson, N. Hedman, B. Mielczarek, M.
    Degermark, Scenario-based performance analysis of routing protocols
    for mobile ad-hoc networks, in: International Conference on Mobile
    Computing and Networking (MobiCom_99), 1999, pp. 195–206. 402 F.
    Bai et al. / AdHoc Networks 1 (2003) 383–403
[9]     F. Bai, N.Sadagopan, and A. Helmy, “IMPORTANT: A framework
     to systematically analyze the impact of mobility on performance of
     routing protocols for adhoc networks,” in Proc. of IEEE INFOCOM, Apr.
     2003
[10] J. Broch, D.A. Maltz, D.B. Johnson, Y.-C. Hu, J. Jetcheva, A
     performance comparison of multi-hop wireless ad hoc network routing
     protocols, in: Proceedings of the Fourth Annual ACM/IEEE
     International Conference on Mobile Computing and Networking,
     ACM, October 1998.
[11] Xiaoyan Hong, Mario Gerla, Guangyu Pei and Ching- Chuan Chiang.
     A Group Mobility Model for Ad Hoc Wireless Networks. ACM
     International Workshop on Modeling and Simulation of Wireless and
     Mobile Systems (MSWiM). August 1999.
[12] Depanshu Shukla, Sridhar Iyer, “Mobility Models In Ad - hoc
     Networks”, KRESIT, IIT Bombay, Nov 2001.
[13] User Manual for IMPORTANT Mobility Tool Generator in NS-2
     Simulator. http://nile.usc.edu/important/software.htm, Release Date
     February 2004
[14] T. Camp, J. Boleng, and V. Davies, “A Survey of Mobility Models for
     AdHoc Network Research,” Wireless Communications Mobile
     Computing (WCMC): Special Issues on Mobile Ad Hoc Networking:
     Research, Trends, and Applications, vol. 2, no. 5, pp. 483–502, 2002.
[15] C. Perkins, P. Bhagwat,, “ Destination Sequenced Distance Vector
     (DSDV)”, Internet Draft, IETF MANET Working Group, November
     2001.

Ms. Tanuja Khurana obtained the B.Tech degree in Computer Science and
                    Engineering from Kurukshetra University, Kurukshetra,
                    India in 2009. She is presently working as Lecturer in
                    Department of Computer Science and Engineering at N.
                    C. College of Engineering, Israna, Panipat. She is
                    presently pursuing her M.Tech from the same institute.
                    She has guided several B.Tech projects. Her research
                    interests include Mobile Adhoc Networks and Wireless
Sensor Networks.
Mr. Sukhvir Singh completed M.Tech(Integrated) in Software Engineering
                    and System Analysis in 1996. . He is presently pursuing
                    his PhD from M.D.University, Rohtak. He has Received
                    Grant of Rs. 4 Lac from AICTE for the project of
                    MODROBS for Advance Computer Network Lab. He has
                    worked at P.D.M Polytechnic, Sarai Aurangabad,
                    Bahadurgarh. and P.D.M College of Engineering,
Bahadurgarh. . He is presently Heading Department of Computer Science
and Engineering at N. C. College of Engineering, Israna, Panipat with more
than 10 years experience of academic and administrative affairs in the
institute. He is also member of Computer Society of India and Life Time
Member of ISTE.



                                                                                                                                                         30
                                                      All Rights Reserved © 2012 IJARCSEE

More Related Content

Viewers also liked (9)

52 57
52 5752 57
52 57
 
73 77
73 7773 77
73 77
 
121 124
121 124121 124
121 124
 
93 99
93 9993 99
93 99
 
93 98
93 9893 98
93 98
 
65 72
65 7265 72
65 72
 
82 87
82 8782 87
82 87
 
78 81
78 8178 81
78 81
 
88 92
88 9288 92
88 92
 

Similar to 27 30

Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
 
Survey on routing techniques for manets and wireless sensor networks
Survey on routing techniques for manets and wireless sensor networksSurvey on routing techniques for manets and wireless sensor networks
Survey on routing techniques for manets and wireless sensor networksIAEME Publication
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...IRJET Journal
 
A Survey On Software-Defined Wireless Sensor Networks Challenges And Design ...
A Survey On Software-Defined Wireless Sensor Networks  Challenges And Design ...A Survey On Software-Defined Wireless Sensor Networks  Challenges And Design ...
A Survey On Software-Defined Wireless Sensor Networks Challenges And Design ...Angela Tyger
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkijwmn
 
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationPerformance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationIDES Editor
 
DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...
DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...
DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...IJNSA Journal
 
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...cscpconf
 
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKSDYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKSpharmaindexing
 
A Novel Weighted Clustering Based Approach for Improving the Wireless Sensor ...
A Novel Weighted Clustering Based Approach for Improving the Wireless Sensor ...A Novel Weighted Clustering Based Approach for Improving the Wireless Sensor ...
A Novel Weighted Clustering Based Approach for Improving the Wireless Sensor ...IJERA Editor
 
Challenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksChallenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksAuwal Amshi
 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksIRJET Journal
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNIAEME Publication
 
Review of Wireless Sensor Networks
Review of Wireless Sensor NetworksReview of Wireless Sensor Networks
Review of Wireless Sensor NetworksDr. Amarjeet Singh
 
IJSRED-V1I2P12
IJSRED-V1I2P12IJSRED-V1I2P12
IJSRED-V1I2P12IJSRED
 
Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...
Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...
Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...IDES Editor
 

Similar to 27 30 (20)

Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
 
Survey on routing techniques for manets and wireless sensor networks
Survey on routing techniques for manets and wireless sensor networksSurvey on routing techniques for manets and wireless sensor networks
Survey on routing techniques for manets and wireless sensor networks
 
B0470208027
B0470208027B0470208027
B0470208027
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
 
A Survey On Software-Defined Wireless Sensor Networks Challenges And Design ...
A Survey On Software-Defined Wireless Sensor Networks  Challenges And Design ...A Survey On Software-Defined Wireless Sensor Networks  Challenges And Design ...
A Survey On Software-Defined Wireless Sensor Networks Challenges And Design ...
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
 
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationPerformance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
 
DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...
DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...
DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...
 
Localization
LocalizationLocalization
Localization
 
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
 
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKSDYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
 
A Novel Weighted Clustering Based Approach for Improving the Wireless Sensor ...
A Novel Weighted Clustering Based Approach for Improving the Wireless Sensor ...A Novel Weighted Clustering Based Approach for Improving the Wireless Sensor ...
A Novel Weighted Clustering Based Approach for Improving the Wireless Sensor ...
 
Challenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksChallenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networks
 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
 
Review of Wireless Sensor Networks
Review of Wireless Sensor NetworksReview of Wireless Sensor Networks
Review of Wireless Sensor Networks
 
IJSRED-V1I2P12
IJSRED-V1I2P12IJSRED-V1I2P12
IJSRED-V1I2P12
 
Ijnsa050204
Ijnsa050204Ijnsa050204
Ijnsa050204
 
Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...
Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...
Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...
 
Ns2 x graphs
Ns2 x graphsNs2 x graphs
Ns2 x graphs
 

More from Ijarcsee Journal (20)

130 133
130 133130 133
130 133
 
122 129
122 129122 129
122 129
 
116 121
116 121116 121
116 121
 
109 115
109 115109 115
109 115
 
104 108
104 108104 108
104 108
 
99 103
99 10399 103
99 103
 
88 92
88 9288 92
88 92
 
58 64
58 6458 64
58 64
 
46 51
46 5146 51
46 51
 
41 45
41 4541 45
41 45
 
36 40
36 4036 40
36 40
 
28 35
28 3528 35
28 35
 
24 27
24 2724 27
24 27
 
19 23
19 2319 23
19 23
 
16 18
16 1816 18
16 18
 
12 15
12 1512 15
12 15
 
6 11
6 116 11
6 11
 
1 5
1 51 5
1 5
 
134 138
134 138134 138
134 138
 
125 131
125 131125 131
125 131
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

27 30

  • 1. ISSN: 2277 – 9043 International Journal of Advanced Research in Computer Science and Electronics Engineering Volume 1, Issue 5, July 2012 An Evaluation of Ad-hoc Routing Protocols for Wireless Sensor Networks Tanuja Khurana, Sukhvir Singh, Nitin Goyal  The major impacts the mobility makes in WSN are in the Abstract— Wireless mobile ad-hoc networks are area of Topology management and Energy management. characterized as network of nodes without any physical When nodes keep moving its position, topology management connections. In these types of networks there is no fixed is responsible for the node connectivity and routing of nodes topology due to the mobility of nodes, interference, to the sink. The energy management on the other hand deals multipath propagation, environmental conditions and with the management of limited energy resource. path loss. The purpose of this master thesis is to study, understand, analyze and discuss three mobile ad-hoc This project is mainly concerned with routing in mobile routing protocols DSDV, AODV and DSR out of which the wireless sensor networks. The limited processing power, first one is proactive protocols, which depends on the battery life and loss of packets of the motes present many routing tables which are maintained at each node. The challenges when it comes to routing in these networks. This other two are reactive protocols, which find a route to a work will look at several routing protocols to assess their destination on demand, whenever communication is suitability for use in mobile wireless sensor networks needed. Considering the same parameters the DSR protocol transfers more data than both AODV and DSDV II. PROBLEM DISCRIPTION protocols, but due to the fact that changes in paths are avoided the losses in AODV is less as compared to DSR The aims and objectives of this project are as follows: protocol. This work is to analyze the routing protocols for Learn about the technologies and applications of wireless wireless networks based on their performance. This is sensor network. Understanding limitations of sensor network done theoretically as well as through simulation. Basically in view of mobility & to evaluate protocols based on these what is to be done, to identify suitable routing protocols limitations. Learn about the mobility impacts on routing. for use with WSN based on the limitations of the Analyze the routing protocols for wireless networks based on technology and propose an enhanced protocol for WSN. performance. This is done theoretically and through Index Terms— proactive protocols, reactive protocols. simulation. The thesis also includes the goal to generate a simulation environment that could be used as a platform for further studies within the area of wireless networks. This I. INTRODUCTION simulation environment is based on Network simulator 2.35. Identify suitable routing protocols for use with WSN based Wireless sensor networks [1] [2] are promising on the limitations of the technology. unprecedented levels of access to information about the physical world, in real time. Many areas of human activity are starting to see the benefits of utilizing sensor networks. In III. WHY THIS PROBLEM IS CHOOSEN almost all such cases, sensor networks are statically Networking, in particular wireless networking has an deployed. interest of me. Due to this interest wireless networking was One of the reasons for the sensors to be taken as stationary is chosen as the base theme for the dissertation. Several that because the assumption facilitates the simplification of variations of this general theme were developed and the clustering protocols, making them have a very low presented as possible projects. Two main themes are overhead. It also avoids having to manage the mobility considered are routing and cluster head election in wireless patterns of the sensors and allows saving more energy, since networks. Both of them were considered in view of mobility, the localization information that the network has to manage is since mobility is one of the key challenging areas in WSN. non-existent. After considering both these themes it was decided to look at The evolutionary step for sensor networks is to handle routing. Mobile wireless sensor networks were eventually mobility in all its forms. Mobility in wireless sensor networks chosen as they have only been developed recently and the has attracted a lot of attention in the recent years and has protocols for these networks have not yet been standardized. introduced unique challenges in aspects like resource Wireless computing is a rapidly emerging technology management, coverage, routing protocols, security, etc. providing users with network connectivity without being gathered off of a wired network. Manuscript received July 20, 2012. Tanuja Khurana, Computer Science & Engineering Deptt.,N. C. College IV. ANALYZING ROUTING PROTOCOL PERFORMANCE of Engineering, Israna (e-mail:tanujakhurana20@gamil.com). Our focus is given to study whether mobility affects protocol Panipat,India, Sukhvir Singh, Computer Science & Engineering Deptt.,N. C. College of performance or not. We have evaluated the performance of Engineering,Israna.Panipat,India (e-mail: boora_s@yahoomail.com). DSR, AODV and DSDV across deferent set of mobility Nitin Goyal, Computer Science & Engineering Deptt.,N. C. College of models and observed that the mobility models may Engineering,Israna.Panipat,India (e-mail: er.nitin29@gmail.com). 27 All Rights Reserved © 2012 IJARCSEE
  • 2. ISSN: 2277 – 9043 International Journal of Advanced Research in Computer Science and Electronics Engineering Volume 1, Issue 5, July 2012 drastically affect protocol performance. We have taken two In particular, a successful mobile sensor networks scenarios to compare the performance of protocols. In the will open new and intriguing venues for research in diverse first scenario we taken an area of a size 900m over 900m and topics such as: runs a single TCP connection over 4 nodes network. The  Scalable dynamic systems second scenario runs a single TCP connection over a 10-node  Routing network over an area of a size 900m over 900m.When the  Fault-Tolerance sensor nodes are stationary, we compare the performance of  Data Management protocols by taking 4 nodes and 10 nodes network and the  Efficiency, accuracy and precision result shows the performance degradation as the number of  Software support nodes increases. But as it comes to the mobility most of the current routing algorithms are facing performance degradation. But the AODV has the less performance degradation and also the number of packets loss is less. VI. RESULTS We have compared the performance of AODV, DSDV, DSR routing protocols in which the performance of AODV is best suited. We have shown the performance of AODV routing Protocol with the help of X-Graph (The graph obtained by using NS-2 simulator) as below. Fig. 1. TCP in a four node scenario with AODV routing protocol Fig 3. TCP packet received vs packet loss in a four node scenario with AODV routing protocol Fig. 2. TCP in a ten node scenario with AODV routing protocol V. CHALLENGES DUE TO MOBILITY The introduction of mobility in sensor networks introduces certain additional challenges. Some of them are detailed below. Space and time are receiving renewed emphasis as defining parameters in the data collection scheme. The timely dissemination and processing of collected information becomes much more complex than a network resource optimization problem, as it has to take into account user and phenomenon mobility. On demand network reconfiguration Fig. 4. TCP packet received vs packet loss in a ten node now has to consider sensor repositioning over time, to best scenario with AODV routing protocol. monitor an evolving event. There exists the expectation of higher levels of modeling within the network, so that it can respond in a timely manner to emerging situations and reconfiguring itself to meet the corresponding demands. Accordingly, efficient and versatile techniques to model spatiotemporal information are a necessity. 28 All Rights Reserved © 2012 IJARCSEE
  • 3. ISSN: 2277 – 9043 International Journal of Advanced Research in Computer Science and Electronics Engineering Volume 1, Issue 5, July 2012 VII. CONCLUSION LEACH-ME suggests an improvement to the LEACH-M, which is suitable for mobile wireless sensor In this work an extensive literature survey about the issues networks. The basic idea of LEACH-Mobile-Enhanced associated with mobility in wireless sensor network were (LEACH-ME) is to make sure as much as possible that the conducted. The emphasis is given to routing issues, since it cluster heads are from the group of mobile nodes having makes predominant impact in view of mobility. The entire minimum node mobility or they are in group motion with the work was done in two phases. other cluster members (RPGM model [11]). By doing the In the first phase, the performance evaluations of various modified election process to cluster head or modified rotation routing protocols in mobile wireless sensor networks were of duty of cluster head, the model make sure that the clusters done. The routing protocol considered were AODV, DSDV are disturbed minimally in view of movement of cluster head and DSR from MANET routing protocol category. All theses . protocols were simulated and results were summarized and Mobility factor through the Concept of Remoteness concluded with the help of xgraph that AODV having lowest Let n i (t), i = 0,1,2,3, .......... N - 1, represents the packet losses in comparison to other protocols. location vector of node i at time In the second phase, enhanced the cluster based energy t and di j(t) =| nj(t) - ni(t) |, the distance from node i to j efficient protocol for handling mobility. The protocols at time t. Then the remoteness from node i to node j considered for this work were LEACH and LEACH-Mobile. at time t is R i j (t) = F (d i j (t)) , Where F is the function of remoteness. VIII. PROPOSED WORK For a simple choice take F as identity function, then LEACH protocol is an elegant solution to power constrain the remoteness is just the distance between the nodes. problem, by forming enough number of clusters in a As node moves relative to the other nodes self-organized manner. LEACH basically rotate the cluster remoteness remains the proportionate of its previous. But as heads and achieves energy efficiency by a factor of 8. it moves on a manner, in which its speed and angular Although LEACH protocol has such advantages, it basically deviation from the current state are not predictable, remoteness assumes that the nodes are fixed. As LEACH protocol does changes in time. Thus the definition of relative mobility not consider the mobility of sensor nodes after the “Set-up measure of a node in terms of time with respect to its Phase” of clusters within a round, LEACH protocol performs immediate neighbors 1 N 1  d i j (t ) poorly with serious data loss in the environment of node mobility. M (t )  N  1 J 0 To reduce energy consumption during the other time LEACH-M is an enhancement to LEACH to support mobility slots that is not intended for a node, the node is put it in sleep is introduced as LEACH-Mobile in short form named as mode. Therefore even though a node is in the radio range of “LEACH-M”. The basic idea in LEACH-Mobile is to its neighboring nodes, it can’t hear the information send by confirm whether a mobile sensor node is able to its immediate neighbors. communicate with a specific cluster head, as it transmits a In order to hear simultaneously, the cluster head gives an message, which requests for data transmission back to mobile extra time slot as shown in fig. 5. sensor node from cluster head within a time slot allocated in TDMA schedule of a wireless sensor cluster. If the mobile sensor node does not receive the data transmission from Slo Slo Slo ……………. Slo Activ cluster head within an allocated time slot according to t t t . t e TDMA schedule, it sending join-request message at next 0 1 2 N-1 TDMA time slot allocated. Then it decides the cluster to Fig. 5.TDMA time slot for LEACH-Mobile-Enhanced which it will belong for this moment by receiving cluster join-ack messages back from specific cluster heads. The LEACH-M protocol achieves definite improvement in data IX. FUTURE WORK transfer success rate as mobile nodes increase compared to In future, this LEACH-ME can be simulated and the work the non-mobility centric LEACH protocol. can be extended to develop a non-cluster based routing LEACH-M handles the node mobility well if the protocol to handle mobility in WSN. cluster heads are more of less stationary. But it is not true in all the cases as the cluster head election happens from the same set of mobile nodes. Also the cluster head rotation is ACKNOWLEDGMENT purely on random manner plus the number of times the node was a cluster head in earlier rounds of TDMA, which is “We present a great thanks to.” N. C. College of exactly the same way as in basic LEACH protocol. But as the Engineering, Israna, Panipat for the Sponsor and cluster head keeps moving before the rotation comes, cluster financial support. itself get disturbed and the enormous amount of packet loss will occur until the next new cluster formation under a new REFERENCES head. [1] F Akylidiz, W. Su, Y Sankarasubramanyam, and E. Cayirci, “Wireles Sensor Network: a survey”, Computer Networks, Vol. 38 N0. 29 All Rights Reserved © 2012 IJARCSEE
  • 4. ISSN: 2277 – 9043 International Journal of Advanced Research in Computer Science and Electronics Engineering Volume 1, Issue 5, July 2012 4, 2002, pp. 393-422 [2] Carlos de Morrais Codeiro, Dhrarma Prakash Agarwal “AD-HOC AND SENSOR NETWORKS Theory and Applications” Ist Edition, Mr. Nitin Goyal obtained the B.Tech degree in Computer Science and World Scientific Publishing Co. Pvt. Ltd., Singapore 2006, pp. 19-79 Engineering from Kurukshetra University, Kurukshetra, India in 2007 and [3] Labrinidis A., Stefanidis A., “Panel on Mobility in Sensor M.Tech degree from the same university in 2009. He is Networks”, In 6th International Conference on Mobile Data presently working as Lecturer in Department of Management (MDM’05), pages 333-334. Ayia Napa,Cyprus, May Computer Science and Engineering at N. C. College of 2005. Engineering, Israna, Panipat with more than 3 years [4] A. Howard, M. Mataric, and G. Sukhatme. From Mobile Robot experience of academic and administrative affairs in Teams to Sensor/Actuator Networks:The Promise and Perils of the institute. He is presently pursuing his PhD from Mobility. In Online Proceedings of the First Workshop in NIT Kurukshetra, INDIA in the Department of GeoSensorNetworks, 2003. Downloadable from Computer Engineering. He has published approximately 9 research papers in http://www.spatial.main.edu/gsn03/program.html. various International / National Conferences as author/co-author. He has [5] T. Liu, C. M. Sadler, P. Zhang, and M. Martonosi. Implementing coordinated several projects and training programmes for students and software on resource-constrained mobile sensors: experiences with faculty. He has guided several B.Tech projects. His research interests include Impala and ZebraNet. In MobiSYS ’04: Proceedings of the 2nd Mobile Adhoc Networks and Wireless Sensor Networks, QoS in Mobile international conference on Mobile systems, applications, and services, Networks. pages 256–269. ACM Press,2004. [6] C. Jaynes. Acquisition of a Predictive Markov Model using Object Tracking and Correspondences in geospatial Video Surveillance Networks. In Stefanidis and Nittel [12], pages 149–166. [7] Amr El Abbadi, Department of Computer Science, University of California, Santa Barbara, CA 93106, “Position Statement on Mobile Sensor Networks” [8] P. Johansson, T. Larsson, N. Hedman, B. Mielczarek, M. Degermark, Scenario-based performance analysis of routing protocols for mobile ad-hoc networks, in: International Conference on Mobile Computing and Networking (MobiCom_99), 1999, pp. 195–206. 402 F. Bai et al. / AdHoc Networks 1 (2003) 383–403 [9] F. Bai, N.Sadagopan, and A. Helmy, “IMPORTANT: A framework to systematically analyze the impact of mobility on performance of routing protocols for adhoc networks,” in Proc. of IEEE INFOCOM, Apr. 2003 [10] J. Broch, D.A. Maltz, D.B. Johnson, Y.-C. Hu, J. Jetcheva, A performance comparison of multi-hop wireless ad hoc network routing protocols, in: Proceedings of the Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking, ACM, October 1998. [11] Xiaoyan Hong, Mario Gerla, Guangyu Pei and Ching- Chuan Chiang. A Group Mobility Model for Ad Hoc Wireless Networks. ACM International Workshop on Modeling and Simulation of Wireless and Mobile Systems (MSWiM). August 1999. [12] Depanshu Shukla, Sridhar Iyer, “Mobility Models In Ad - hoc Networks”, KRESIT, IIT Bombay, Nov 2001. [13] User Manual for IMPORTANT Mobility Tool Generator in NS-2 Simulator. http://nile.usc.edu/important/software.htm, Release Date February 2004 [14] T. Camp, J. Boleng, and V. Davies, “A Survey of Mobility Models for AdHoc Network Research,” Wireless Communications Mobile Computing (WCMC): Special Issues on Mobile Ad Hoc Networking: Research, Trends, and Applications, vol. 2, no. 5, pp. 483–502, 2002. [15] C. Perkins, P. Bhagwat,, “ Destination Sequenced Distance Vector (DSDV)”, Internet Draft, IETF MANET Working Group, November 2001. Ms. Tanuja Khurana obtained the B.Tech degree in Computer Science and Engineering from Kurukshetra University, Kurukshetra, India in 2009. She is presently working as Lecturer in Department of Computer Science and Engineering at N. C. College of Engineering, Israna, Panipat. She is presently pursuing her M.Tech from the same institute. She has guided several B.Tech projects. Her research interests include Mobile Adhoc Networks and Wireless Sensor Networks. Mr. Sukhvir Singh completed M.Tech(Integrated) in Software Engineering and System Analysis in 1996. . He is presently pursuing his PhD from M.D.University, Rohtak. He has Received Grant of Rs. 4 Lac from AICTE for the project of MODROBS for Advance Computer Network Lab. He has worked at P.D.M Polytechnic, Sarai Aurangabad, Bahadurgarh. and P.D.M College of Engineering, Bahadurgarh. . He is presently Heading Department of Computer Science and Engineering at N. C. College of Engineering, Israna, Panipat with more than 10 years experience of academic and administrative affairs in the institute. He is also member of Computer Society of India and Life Time Member of ISTE. 30 All Rights Reserved © 2012 IJARCSEE