SlideShare a Scribd company logo
1 of 10
Download to read offline
http://www.iaeme.com/IJEET/index.asp 61 editor@iaeme.com
International Journal of Electrical Engineering & Technology (IJEET)
Volume 6, Issue 7, Jul-Aug, 2015, pp.61-70, Article ID: 40220150607006
Available online at
http://www.iaeme.com/IJEETissues.asp?JTypeIJEET&VType=6&IType=7
ISSN Print: 0976-6545 and ISSN Online: 0976-6553
© IAEME Publication
___________________________________________________________________________
AN EFFECTIVE RELIABLE BROADCAST
CODE DISSEMINATION IN WIRELESS
SENSOR NETWORKS
S. Syed Abdul Syed
Research Scholar, AMET University
Senthil Kumaran T
ACS College of Engineering, Bangalore
A. Sarfaraz Ahmed
Research Scholar, AMET University
E. Syed Mohamed
Dept of Computer Science Engineering, B.S. Abdur Rahman University
A Manikandan B
Dept of Computer Science Engineering, B. S. Abdur Rahman University
S. Rajesh
Assistant Professor
Dept of Electronics and Communication Engineering
Dept. of Automobile Engineering, Bharath University, Chennai
ABSTRACT
Wireless Sensor Networks (WSNs) comprises of nodes, exchanges
information wirelessly with each other. Important concept used is code
dissemination during which code is wirelessly propagated to all target nodes
in the network. Flooding is leveraged to establish route to destination for
routing. Each node informs other nodes its latest link, flooded across network.
Trickle one of the important network protocols, performs flooding the code, by
a technique known as Code Dissemination. During broadcast, there may be
loss created at each node because of random traffic created between the
nodes. This leads to traffic implosion. This limitation is reduced by using
flooding schemes that achieve high reliability while reducing redundant traffic
by controlling the number of broadcasts.
Index Terms: Wireless Sensor Networks, Code Dissemination, Flooding,
Trickle protocol, Probabilistic and Opportunistic flooding Algorithm
S. Syed Abdul Syed, Senthil Kumaran, A. Sarfaraz Ahmed, E. Syed Mohamed, A
Manikandan B and S. Rajesh
http://www.iaeme.com/IJEET/index.asp 62 editor@iaeme.com
Cite this Article: S. Syed Abdul Syed, Senthil Kumaran, A. Sarfaraz Ahmed,
E. Syed Mohamed, A Manikandan B and S. Rajesh, An Effective Reliable
Broadcast Code Dissemination In Wireless Sensor Networks. International
Journal of Electrical Engineering & Technology, 6(7), 2015, pp. 61-70.
http://www.iaeme.com/IJEET/issues.asp?JTypeIJEET&VType=6&IType=7
1. INTRODUCTION
A Wireless Sensor Network consists of autonomous sensors to monitor physical as
well as environmental conditions to cooperatively pass their data through the network
to a main location. The modern networks are bi-directional, thereby enabling the
control of sensor activity. The development of wireless sensor networks was
motivated by military applications such as battlefield surveillance are used in many
industrial and consumer applications, such as industrial process monitoring, control
and machine health monitoring. There are strong needs to develop wireless sensor
networks algorithms with optimization priorities biased to aspects besides energy
saving. Important concept used in wireless Sensor Networks (WSN) is code
Dissemination during which new code is wirelessly propagated to all target nodes in
the network. Flooding is one of key mechanisms that are widely used in various
wireless networks. It propagates a message throughout a network for various
purposes. Especially, flooding is usually leveraged to establish a route to the
destination for unicast routing. Similarly, when a node should inform other nodes of
its link state, its latest link information is flooded across the network. Due to its
viability, diverse flooding algorithms have been proposed in various wireless
networks including wireless sensor networks (WSN). Since the objective of flooding
is to make it sure that all the nodes in a network receive the same message, flooding is
generally performed by making all the nodes rebroadcast the received message.
However, this becomes inefficient as the node density increases, which is a typical
case in Wireless Sensor Networks (WSN). Another issue is that it is hard to achieve
high reliability because wireless links generally suffer from high error rates. Thus, to
achieve high reliability, retransmissions are often exploited. It is crucial to decide
which node to rebroadcast and how many times to retransmit the message in a
flooding mechanism, since the rebroadcasting of too many nodes and/or redundant
retransmissions may cause traffic implosion, which leads to unreliability and energy
inefficiency.
2. TRICKLE PROTOCOL
Trickle is a transmission scheduling algorithm developed for wireless sensor
networks. The Trickle algorithm determines when a message can be transmitted. In
Trickle, every node broadcasts advertisement messages that contain a metadata that
includes the version number of the code, at most once per period. If a node hears more
than k identical metadata before it transmits its advertisement, it suppresses its
broadcast and doubles the value of up to higher value, which is an upper bound for
trickle. If it hears a different metadata, it sets to lower value, which is a lower bound
for trickle. By increasing the broadcast interval, Trickle sends less number of
advertisement messages, thus saving energy. By decreasing, Trickle can update nodes
more quickly. So, there is a trade-off between the dissemination latency and energy to
be achieved. As in addition to the dissemination latency, increasing the value causes
some other problems such as message communication between two nodes, which
have different code versions. In Trickle, the number of advertisement message
An Effective Reliable Broadcast Code Dissemination In Wireless Sensor Networks
http://www.iaeme.com/IJEET/index.asp 63 editor@iaeme.com
increases linearly as a function of time, as the dissemination is irrespective of the
mission of the Wireless Sensor Networks (WSN) application.
3. TRICKLE ALGORITHM
When a node enters this state, it sets counter, which is a Trickle variable to 0 and sets
to lower bound value. In this state A sends an advertisement message periodically at a
random time between given period, if it has not heard k advertisement messages about
the same version number, that is, if counter < k, otherwise, it doubles to higher bound
value.
 If node A becomes higher bound value, count is incremented by one.
 If a node A receives an advertisement message from a node B, A compares the
received version number with its own. If the version number of B is bigger, then
A requests the code after a randomly chosen time between [0, R] then downloads
the code, and updates from B. If the version number of B is smaller, then A
broadcasts advertisement messages. If the version numbers are equal and if B
does not exist in its neighbourhood table, A adds B in its table, doubles value to
higher bound value and increments counter by one.
 If a node A receives a request message from B, A sends the new code to B.
 If a node A updates its code from B, it first clears its neighbourhood table and
then adds B in its table. It sets counter to 0, sets q to 0 and sets lower value.
 If, during time, A does not send any advertisement message, it doubles up to
higher bound value. If value already equal to higher value, it increments count by
one and sets counter to 0.
4. DATA FORWARDING REQUEST
When a node (Say S) wants to send a message to Node (Say D), then Node S searches
its route table for a route to D. If there is no route then, S Initiates Data forwarding
Request (RREQ) with following steps.
Figure 1 Data Forwarding Request (RREQ)
 IP addresses of S and D, Current sequence number of S and last known sequence
number of D
 A broadcast ID from S. The Broadcast ID is incremented each time S sends Data
Forwarding Request (RREQ).
 The broadcast ID, IP address pair of the source forms unique identifier for the
Data Forwarding Request (RREQ).
 Node P receives request from Node S. P checks whether it has received this
request before. Each node stores (Broadcast ID, IP address) Pair for all the recent
Data Forwarding Request, it has received.
 If node P has seen this Data Forwarding Request (RREQ), P discards this request.
Otherwise P processes this Data Forwarding Request (RREQ).
 P sets up a reverse route entry in its route table for Source S.
S. Syed Abdul Syed, Senthil Kumaran, A. Sarfaraz Ahmed, E. Syed Mohamed, A
Manikandan B and S. Rajesh
http://www.iaeme.com/IJEET/index.asp 64 editor@iaeme.com
 This entry contains internet protocol address and current sequence number of S,
number of hops to S and address of the neighbour from whom P gets Data
Forwarding Request (RREQ).
 P can respond to Forwarding Request (RREQ) from S if D has an unexpired entry
for D in its route table.
 The sequence number from D that P has not is less than the sequence number of
D that was in RREQ from S. This ensures there is no loop in the route.
 If P satisfies both of these requirements, it unicasts response message back to S.
5. DATA REPLY REQUEST
Node D responds with a message to Node S (from figure 1) using following steps.
 P can respond to Forwarding Request (RREQ) from S if D has an unexpired entry
for D in its route table.
 The sequence number from D that P has not is less than the sequence number of
D that was in RREQ from S.
 This ensures there is no loop in the route.
 If P satisfies both of these requirements, it unicasts response message back to S.
 If P cannot reply to RREQ from S, P increments the Hop count of RREQ and
broadcasts to its neighbours.
 Node D always is able to send Data Reply Request (RREQ) to S, since it has the
highest sequence number.
 If RREQ is lost, the source node S can try the route discovery for fixed number of
times.
6. DATA ERROR MESSAGE
The neighbourhood nodes are monitored. When a route that is active is lost, the
neighbourhood nodes are notified by route error message (RERR) on both sides of
link.
7. DATA FLOW DIAGRAMS
7.1. Activity Diagram
An activity diagram is used to model a large activities sequential work flow by
focusing on action sequences and respective action initiating conditions. The state of
an activity relates to the performance of each workflow step. An activity diagram is
represented by shapes that are connected by arrows. Arrows run from activity start to
completion and represent the sequential order of performed activities. Black circles
represent an initial workflow state. A circled black circle indicates an end state.
Rounded rectangles represent performed actions, which are described by text inside
each rectangle. A diamond shape is used to represent a decision, which is a key
activity diagram concept. Upon activity completion, a transition (or set of sequential
activities) must be selected from a set of alternative transitions for all use
cases. Activity diagram for system is represented in Figure 2. The activity starts with
Forwarding Data Request (RREQ). If request is same as previous, destination node
discards it. Otherwise, Destination node processes the current request and
acknowledges with response request.
An Effective Reliable Broadcast Code Dissemination In Wireless Sensor Networks
http://www.iaeme.com/IJEET/index.asp 65 editor@iaeme.com
Figure 2 Activity Diagram
8. OUTPUT SCREENSHOTS
Figure 4 indicates temperature at each node during transmission. It is observed that,
temperature of node decreases during each transmission resulting in Traffic
congestion. Common Point node transmits data during temperature is noted.
Receiving nodes in the subsequent steps are identified and temperature is noted. Drop
in temperature at each node indicates traffic congestion leading to loss of data
information.
Figure 3 Temperature of node in Trickle Protocol
Figure 4 indicates, message transmission process during data is transferred
between the nodes and acknowledgement is made for each unique successful
transmission.
Requests Data
Forward
Is Unique?
Process
Request
Stores
Request
Is Success?
Responds
Request
Responds Error
Message
Discards
Request
Yes
No
Yes
No
S. Syed Abdul Syed, Senthil Kumaran, A. Sarfaraz Ahmed, E. Syed Mohamed, A
Manikandan B and S. Rajesh
http://www.iaeme.com/IJEET/index.asp 66 editor@iaeme.com
Figure 4 Message Transmission and Acknowledgement
Figure 5 indicates, delay/ error message during message transmission.
Figure 5 Output Screen
9. RESULT AND ANALYSIS
9.1 Simulation Setup
Simulation is performed using NS2 simulations. In this simulation, Trickle protocol is
performed to assess: the number of advertisement packets transmitted, the
Acknowledgement for received Packets, Energy for each node, temperature for each
node is generated using carbon Monoxide generator and the completion time or
dissemination latency. Following scenarios were implemented during simulation.
 Periodic Traffic: Each node periodically sends data packet, with the period
randomly selected between [0 . . . 1] min.
 Event-based Traffic: Each node sends only one packet at a randomly selected
time between [λ, λ+1] min, where λ is the time the event occurred.
 Event-based bursty traffic: Each node sends b packets, one packet per second,
after a randomly selected time between [λ,λ+1] min, where λ is the time the event
occurred. Events occur every λ min.
An Effective Reliable Broadcast Code Dissemination In Wireless Sensor Networks
http://www.iaeme.com/IJEET/index.asp 67 editor@iaeme.com
9.2 Metrics
In NS2 simulations, following metrics are used: The number of advertisement packets
transmitted, as the number of transmissions is directly related to energy consumption,
The number of discarded application, Packets as this metric captures the amount of
resources wasted as bandwidth and energy and (iii) completion time (dissemination
latency), which is another important criteria in network reprogramming, to enable the
network to work efficiently.
Figure 6 Comparison of Trickle with other Protocols
9.3 Number of Advertisement Packets
The number of advertisement packets where a node periodically sends one data
packet, with the period randomly chosen between [0 . . . 1] min in the network with
symmetric links. As can be observed, the number of advertisement packets Trickle
sends increases linearly with time, even when there is no new code in the network as
it can be observed in Trickle, the transmission of advertisement packets stop after
some time and never transmitted again, as long as there is no new code in the
network.
9.4 Code Dissemination Latency
Time for dissemination latency is noted from the point when a packet with the new
version is injected to the point when the last node in a network receives that packet,
referred as code dissemination latency. Latency observed under two scenarios:
Periodic traffic, and Bursty traffic. Trickle found to have very low dissemination
latency.
9.5Discussion
In Trickle, sending packets depends on the probability P. The value of P set to 1.
However, if there are many neighbours that are ready to send packets, then there
might be a collision, and it is a waste of resources such as energy and throughput.
Conversely, if P is set to a very small value, then nodes might not send packets and
the asymmetric link problem may not be solved. Thus, the value of P should be set
according to the density of the network. If the network is dense, P could be set to
small value as the number of neighbours of both might be large. And P could be set to
a large number if the network is sparse. In general, if the nodes in the network are
uniformly randomly distributed, then we can approximate the number of neighbouring
nodes of both nodes and can set P to an appropriate number as following. Let q be the
number of neighbours of a node. Let n1 and n2 be neighbours of each other. Then, if
the coverage area of a node is Πr2
, then the intersection of coverage areas of n1 and
n2 is 2Πr2
/3 − r2
√3 nodes in Πr2
, there are around q/3 nodes in 2Πr2
/3−r2
√(3/2) as
S. Syed Abdul Syed, Senthil Kumaran, A. Sarfaraz Ahmed, E. Syed Mohamed, A
Manikandan B and S. Rajesh
http://www.iaeme.com/IJEET/index.asp 68 editor@iaeme.com
shown in figure 5.3. Therefore, if there exists an asymmetric link between n1 and n2,
the neighbours of both should set their P to a number between 1 and 3/q, i.e., 1 ≥ P ≥
3/q. For example, if the number of neighbours of a node is q ≤ 3, then P should be set
to 1. if q = 30, then P ≥ 0.1.
Figure 7 Intersection of Coverage Areas in Trickle Protocol
Figures 8 displays Number of packets with probability 0 and 1. Figure 9 and 10
displays number of packets with low and high probability. Figure 12 displays
transmission graph.
Figure8 Number of Packets
Figure 9 Number of Packets with High varying Probability
Figure 10 Number of Packets with low varying Probability
An Effective Reliable Broadcast Code Dissemination In Wireless Sensor Networks
http://www.iaeme.com/IJEET/index.asp 69 editor@iaeme.com
Figure 11 Transmission Graph
10. CONCLUSIONS AND FUTURE WORK
Flooding in Wireless Sensor Networks (WSN) is leveraged to establish a route to the
destination for effective routing. Each node informs other nodes of link state, its latest
link, flooded across the network. Flooding is performed by making all nodes in
network receive same message. Trickle one of the important network protocols,
performs flooding the code, by a technique known as Code Dissemination. Code
dissemination in networking is the process of broadcasting message to different
nodes. During broadcast, there may be loss created at each node because of random
traffic created between the nodes. This leads to traffic implosion. This limitation is
reduced by using flooding scheme that achieve high reliability while reducing
redundant traffic by controlling the number of broadcasts. Probabilistic and
Opportunistic Flooding Algorithm (POFA) reduces the number of broadcasts while
satisfying the given target reliability. Thus, the sender is aware of Link error rates
between its one-hop neighbours and Link error rates between its one-hop and two-hop
neighbours. Assumption is made such that link error rates can be calculated based on
periodic message exchanges between sensor nodes for neighbour discovery and/or
synchronization. With the stable estimation of link error rate, the exchanges of link
information between neighbour nodes need not to be occurred frequently. This
implies that piggybacked flooding packet or periodic messages are sufficient to
exchange the link state in POFA. Thus, to avoid the cost associated with flooding,
much effort has been focused on opportunistic forwarding, which aims to reduce the
cost of forwarding while retaining high routing performance by forwarding messages
only to nodes that have high delivery probabilities.
REFERENCES
[1] Chi-Tsun Cheng, Tse, C.K., Lau, F.C.M. et al. A Delay-Aware Data Collection
Network Structure for Wireless Sensor Networks, Sensors Journal, IEEE, (11,
(3), pp.699, 710, March 2011.
[2] Yanchao Zhang, Yanchao Zhang et al. LR-Seluge: Loss-Resilient and Secure
Code Dissemination in Wireless Sensor Networks, Distributed Computing
Systems (ICDCS), 2011 31st International Conference, PP.497, 506, 20-24 June
2011.
[3] Abdallah N.O., Jmaiel M., Mosbah M., Zemmari A. et al. Greedy Flooding in
Redoubtable Sensor Networks, Advanced Information Networking and
Applications (AINA), 2014 IEEE 28th International Conference, Volume No.
PP.899, 906, 13-16 May 2014.
S. Syed Abdul Syed, Senthil Kumaran, A. Sarfaraz Ahmed, E. Syed Mohamed, A
Manikandan B and S. Rajesh
http://www.iaeme.com/IJEET/index.asp 70 editor@iaeme.com
[4] Ting Zhu, Ziguo Zhong, Tian He, Zhi-Li Zhang et al. Achieving Efficient
Flooding by Utilizing Link Correlation in Wireless Sensor Networks,
Networking, IEEE/ACM Transactions, 21(1), PP.121, 134, Feb. 2013.
[5] Sain Saginbekov, Arshad Jhumka et al. Efficient code dissemination in wireless
sensor networks, Future Generation Computer Systems, 39, October 2014.
[6] Dukhyun Chang, Kideok Cho, Nakjung Choi, Ted et al. Taekyoung, Kwona,
Yanghee Choi, A probabilistic and opportunistic flooding algorithm in wireless
sensor networks, 35(4), February 2012.
[7] Mrs.R.Rajasree, Dr.G.Kalivarathan. Analysis of Programming Aspects of
Wireless Sensor Networks and Non Uniformity Issues-A Feasible Study,
International journal of Electronics and Communication Engineering
&Technology (IJECET), 3(3), 2012, pp. 219-226.
[8] Kermajani, H., Gomez, C., Arshad M.H. et al. Modeling the Message Count of
the Trickle Algorithm in a Steady-State, Static Wireless Sensor Network,
Communications Letters, IEEE, 16(12), PP.1960, 1963, December 2012.
[9] Sandeep Mehra and Cn Khairnar. Analysis And Design of Ultra Low Power
ADC For Wireless Sensor Networks, International journal of Electronics and
Communication Engineering &Technology (IJECET), 4(1), 2013, pp. 264 - 275.
[10] Cong Liu, Jie Wu et al. On Multicopy Opportunistic Forwarding Protocols in
Nondeterministic Delay Tolerant Networks. Parallel and Distributed Systems,
IEEE Transactions. Parallel and Distributed Systems, IEEE Transactions, 23(6),
pp.1121, 1128, June 2012.
[11] Rohit D. Gawade and Dr. S. L. Nalbalwar. Mac Protocol Based Low Energy
Operations In Wireless Sensor Networks, International journal of Electronics
and Communication Engineering &Technology (IJECET), 5(3), 2014, pp. 79 -
93.
[12] Neeraj Tiwari, Rahul Anshumali and Prabal Pratap Singh. Wireless Sensor
Networks: Limitation, Layerwise Security Threats, Intruder Detection,
International journal of Electronics and Communication Engineering
&Technology (IJECET), 3(2), 2012, pp. 22-31.
[13] Wei Wang, Dongming Peng, Honggang Wang, Sharif H., Hsiao-Hwa Chen, et al.
Cross-layer multirate interaction with Distributed Source Coding in Wireless
Sensor Networks, Wireless Communications, IEEE Transactions, 8(2),
PP.787,795, Feb. 2009.

More Related Content

What's hot

Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...IJSRD
 
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...ijtsrd
 
Sender Authentication with Transmission Power Adjustment Method Using RSSI in...
Sender Authentication with Transmission Power Adjustment Method Using RSSI in...Sender Authentication with Transmission Power Adjustment Method Using RSSI in...
Sender Authentication with Transmission Power Adjustment Method Using RSSI in...IJMER
 
Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...ijmnct
 
Trust Based Routing In wireless sensor Network
  Trust Based  Routing In wireless sensor Network  Trust Based  Routing In wireless sensor Network
Trust Based Routing In wireless sensor NetworkAnjan Mondal
 
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc NetworkReview of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Networkijsrd.com
 
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...ieijjournal
 
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkMalicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkCSCJournals
 
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor NetworksA New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor Networksidescitation
 
H030102052055
H030102052055H030102052055
H030102052055theijes
 
Security Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETsSecurity Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETsIJTET Journal
 
Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...
Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...
Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...IRJET Journal
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET Journal
 
Highly reliable multi service provisioning using sequential prediction of zon...
Highly reliable multi service provisioning using sequential prediction of zon...Highly reliable multi service provisioning using sequential prediction of zon...
Highly reliable multi service provisioning using sequential prediction of zon...ijwmn
 

What's hot (18)

Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
Cluster Head and RREQ based Detection and Prevention of Gray hole and Denial ...
 
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
 
Sender Authentication with Transmission Power Adjustment Method Using RSSI in...
Sender Authentication with Transmission Power Adjustment Method Using RSSI in...Sender Authentication with Transmission Power Adjustment Method Using RSSI in...
Sender Authentication with Transmission Power Adjustment Method Using RSSI in...
 
Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...Optimized rationalize security and efficient data gathering in wireless senso...
Optimized rationalize security and efficient data gathering in wireless senso...
 
1410
14101410
1410
 
Trust Based Routing In wireless sensor Network
  Trust Based  Routing In wireless sensor Network  Trust Based  Routing In wireless sensor Network
Trust Based Routing In wireless sensor Network
 
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc NetworkReview of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
AN ENHANCED DETECTION AND ENERGYEFFICIENT EN-ROUTE FILTERING SCHEME IN WIRELE...
 
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc NetworkMalicious Node Detection Mechanism for Wireless Ad Hoc Network
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
 
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor NetworksA New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
 
H030102052055
H030102052055H030102052055
H030102052055
 
Security Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETsSecurity Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETs
 
Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...
Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...
Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...
 
[IJET-V1I3P15] Authors :Deeksha S.
[IJET-V1I3P15] Authors :Deeksha S.[IJET-V1I3P15] Authors :Deeksha S.
[IJET-V1I3P15] Authors :Deeksha S.
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
 
Highly reliable multi service provisioning using sequential prediction of zon...
Highly reliable multi service provisioning using sequential prediction of zon...Highly reliable multi service provisioning using sequential prediction of zon...
Highly reliable multi service provisioning using sequential prediction of zon...
 
50120140507006
5012014050700650120140507006
50120140507006
 

Viewers also liked

whassan-head-board
whassan-head-boardwhassan-head-board
whassan-head-boardDavid Harper
 
Plasma Etch / RIE AW-901eR AW-903eR
Plasma Etch / RIE AW-901eR AW-903eRPlasma Etch / RIE AW-901eR AW-903eR
Plasma Etch / RIE AW-901eR AW-903eRPeter Chen
 
Outreach 2016 pp
Outreach 2016 ppOutreach 2016 pp
Outreach 2016 ppjjasper88
 
CANDANCE RESUME generic
CANDANCE RESUME genericCANDANCE RESUME generic
CANDANCE RESUME genericCANDANCE TROUT
 
Atividades tutoria albertina e allan erdy (3
Atividades tutoria albertina e allan erdy (3Atividades tutoria albertina e allan erdy (3
Atividades tutoria albertina e allan erdy (3UNIRIO
 
Making the Journey to Customer Marketing 3_BIO
Making the Journey to Customer Marketing 3_BIOMaking the Journey to Customer Marketing 3_BIO
Making the Journey to Customer Marketing 3_BIOPatrick Spencer
 

Viewers also liked (12)

whassan-head-board
whassan-head-boardwhassan-head-board
whassan-head-board
 
Delight in-light 8
Delight in-light 8Delight in-light 8
Delight in-light 8
 
Plasma Etch / RIE AW-901eR AW-903eR
Plasma Etch / RIE AW-901eR AW-903eRPlasma Etch / RIE AW-901eR AW-903eR
Plasma Etch / RIE AW-901eR AW-903eR
 
Resume
ResumeResume
Resume
 
Resume for the Vacant Job Position
Resume for the Vacant Job PositionResume for the Vacant Job Position
Resume for the Vacant Job Position
 
JUNE NEWSLETTER
JUNE NEWSLETTER JUNE NEWSLETTER
JUNE NEWSLETTER
 
Brittany bellgam
Brittany bellgamBrittany bellgam
Brittany bellgam
 
Outreach 2016 pp
Outreach 2016 ppOutreach 2016 pp
Outreach 2016 pp
 
CANDANCE RESUME generic
CANDANCE RESUME genericCANDANCE RESUME generic
CANDANCE RESUME generic
 
Capital budgeting
Capital budgetingCapital budgeting
Capital budgeting
 
Atividades tutoria albertina e allan erdy (3
Atividades tutoria albertina e allan erdy (3Atividades tutoria albertina e allan erdy (3
Atividades tutoria albertina e allan erdy (3
 
Making the Journey to Customer Marketing 3_BIO
Making the Journey to Customer Marketing 3_BIOMaking the Journey to Customer Marketing 3_BIO
Making the Journey to Customer Marketing 3_BIO
 

Similar to An effective reliable broadcast code dissemination in wireless sensor networks

Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...ijtsrd
 
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...IRJET Journal
 
FAULTY NODE RECOVERY AND REPLACEMENT ALGORITHM FOR WIRELESS SENSOR NETWORKF
FAULTY NODE RECOVERY AND REPLACEMENT ALGORITHM FOR WIRELESS SENSOR NETWORKFFAULTY NODE RECOVERY AND REPLACEMENT ALGORITHM FOR WIRELESS SENSOR NETWORKF
FAULTY NODE RECOVERY AND REPLACEMENT ALGORITHM FOR WIRELESS SENSOR NETWORKFprj_publication
 
Faulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor networkFaulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor networkprjpublications
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...journalBEEI
 
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...Editor IJMTER
 
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...AM Publications
 
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETPerformance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETijsrd.com
 
AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...IJERA Editor
 
An Efficient Secured And Inspection of Malicious Node Using Double Encryption...
An Efficient Secured And Inspection of Malicious Node Using Double Encryption...An Efficient Secured And Inspection of Malicious Node Using Double Encryption...
An Efficient Secured And Inspection of Malicious Node Using Double Encryption...IRJET Journal
 
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...iosrjce
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksresearcherchennai
 
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star TopologyA Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star TopologyIRJET Journal
 
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2IAEME Publication
 

Similar to An effective reliable broadcast code dissemination in wireless sensor networks (20)

Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
 
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
Distributed Routing Protocol for Different Packet Size Data Transfer over Wir...
 
FAULTY NODE RECOVERY AND REPLACEMENT ALGORITHM FOR WIRELESS SENSOR NETWORKF
FAULTY NODE RECOVERY AND REPLACEMENT ALGORITHM FOR WIRELESS SENSOR NETWORKFFAULTY NODE RECOVERY AND REPLACEMENT ALGORITHM FOR WIRELESS SENSOR NETWORKF
FAULTY NODE RECOVERY AND REPLACEMENT ALGORITHM FOR WIRELESS SENSOR NETWORKF
 
Faulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor networkFaulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor network
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
 
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
A Secure Payment Scheme with Low Communication and Processing Overhead for Mu...
 
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
 
50120140504021
5012014050402150120140504021
50120140504021
 
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETPerformance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
 
AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...AODV Improvement by Modification at Source Node and Securing It from Black Ho...
AODV Improvement by Modification at Source Node and Securing It from Black Ho...
 
An Efficient Secured And Inspection of Malicious Node Using Double Encryption...
An Efficient Secured And Inspection of Malicious Node Using Double Encryption...An Efficient Secured And Inspection of Malicious Node Using Double Encryption...
An Efficient Secured And Inspection of Malicious Node Using Double Encryption...
 
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
 
M017358794
M017358794M017358794
M017358794
 
398 .docx
398                                                             .docx398                                                             .docx
398 .docx
 
i2ct_submission_105
i2ct_submission_105i2ct_submission_105
i2ct_submission_105
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star TopologyA Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
 
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2
 
Cisco Activity
Cisco ActivityCisco Activity
Cisco Activity
 
Ijnsa050209
Ijnsa050209Ijnsa050209
Ijnsa050209
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 

Recently uploaded (20)

Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 

An effective reliable broadcast code dissemination in wireless sensor networks

  • 1. http://www.iaeme.com/IJEET/index.asp 61 editor@iaeme.com International Journal of Electrical Engineering & Technology (IJEET) Volume 6, Issue 7, Jul-Aug, 2015, pp.61-70, Article ID: 40220150607006 Available online at http://www.iaeme.com/IJEETissues.asp?JTypeIJEET&VType=6&IType=7 ISSN Print: 0976-6545 and ISSN Online: 0976-6553 © IAEME Publication ___________________________________________________________________________ AN EFFECTIVE RELIABLE BROADCAST CODE DISSEMINATION IN WIRELESS SENSOR NETWORKS S. Syed Abdul Syed Research Scholar, AMET University Senthil Kumaran T ACS College of Engineering, Bangalore A. Sarfaraz Ahmed Research Scholar, AMET University E. Syed Mohamed Dept of Computer Science Engineering, B.S. Abdur Rahman University A Manikandan B Dept of Computer Science Engineering, B. S. Abdur Rahman University S. Rajesh Assistant Professor Dept of Electronics and Communication Engineering Dept. of Automobile Engineering, Bharath University, Chennai ABSTRACT Wireless Sensor Networks (WSNs) comprises of nodes, exchanges information wirelessly with each other. Important concept used is code dissemination during which code is wirelessly propagated to all target nodes in the network. Flooding is leveraged to establish route to destination for routing. Each node informs other nodes its latest link, flooded across network. Trickle one of the important network protocols, performs flooding the code, by a technique known as Code Dissemination. During broadcast, there may be loss created at each node because of random traffic created between the nodes. This leads to traffic implosion. This limitation is reduced by using flooding schemes that achieve high reliability while reducing redundant traffic by controlling the number of broadcasts. Index Terms: Wireless Sensor Networks, Code Dissemination, Flooding, Trickle protocol, Probabilistic and Opportunistic flooding Algorithm
  • 2. S. Syed Abdul Syed, Senthil Kumaran, A. Sarfaraz Ahmed, E. Syed Mohamed, A Manikandan B and S. Rajesh http://www.iaeme.com/IJEET/index.asp 62 editor@iaeme.com Cite this Article: S. Syed Abdul Syed, Senthil Kumaran, A. Sarfaraz Ahmed, E. Syed Mohamed, A Manikandan B and S. Rajesh, An Effective Reliable Broadcast Code Dissemination In Wireless Sensor Networks. International Journal of Electrical Engineering & Technology, 6(7), 2015, pp. 61-70. http://www.iaeme.com/IJEET/issues.asp?JTypeIJEET&VType=6&IType=7 1. INTRODUCTION A Wireless Sensor Network consists of autonomous sensors to monitor physical as well as environmental conditions to cooperatively pass their data through the network to a main location. The modern networks are bi-directional, thereby enabling the control of sensor activity. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance are used in many industrial and consumer applications, such as industrial process monitoring, control and machine health monitoring. There are strong needs to develop wireless sensor networks algorithms with optimization priorities biased to aspects besides energy saving. Important concept used in wireless Sensor Networks (WSN) is code Dissemination during which new code is wirelessly propagated to all target nodes in the network. Flooding is one of key mechanisms that are widely used in various wireless networks. It propagates a message throughout a network for various purposes. Especially, flooding is usually leveraged to establish a route to the destination for unicast routing. Similarly, when a node should inform other nodes of its link state, its latest link information is flooded across the network. Due to its viability, diverse flooding algorithms have been proposed in various wireless networks including wireless sensor networks (WSN). Since the objective of flooding is to make it sure that all the nodes in a network receive the same message, flooding is generally performed by making all the nodes rebroadcast the received message. However, this becomes inefficient as the node density increases, which is a typical case in Wireless Sensor Networks (WSN). Another issue is that it is hard to achieve high reliability because wireless links generally suffer from high error rates. Thus, to achieve high reliability, retransmissions are often exploited. It is crucial to decide which node to rebroadcast and how many times to retransmit the message in a flooding mechanism, since the rebroadcasting of too many nodes and/or redundant retransmissions may cause traffic implosion, which leads to unreliability and energy inefficiency. 2. TRICKLE PROTOCOL Trickle is a transmission scheduling algorithm developed for wireless sensor networks. The Trickle algorithm determines when a message can be transmitted. In Trickle, every node broadcasts advertisement messages that contain a metadata that includes the version number of the code, at most once per period. If a node hears more than k identical metadata before it transmits its advertisement, it suppresses its broadcast and doubles the value of up to higher value, which is an upper bound for trickle. If it hears a different metadata, it sets to lower value, which is a lower bound for trickle. By increasing the broadcast interval, Trickle sends less number of advertisement messages, thus saving energy. By decreasing, Trickle can update nodes more quickly. So, there is a trade-off between the dissemination latency and energy to be achieved. As in addition to the dissemination latency, increasing the value causes some other problems such as message communication between two nodes, which have different code versions. In Trickle, the number of advertisement message
  • 3. An Effective Reliable Broadcast Code Dissemination In Wireless Sensor Networks http://www.iaeme.com/IJEET/index.asp 63 editor@iaeme.com increases linearly as a function of time, as the dissemination is irrespective of the mission of the Wireless Sensor Networks (WSN) application. 3. TRICKLE ALGORITHM When a node enters this state, it sets counter, which is a Trickle variable to 0 and sets to lower bound value. In this state A sends an advertisement message periodically at a random time between given period, if it has not heard k advertisement messages about the same version number, that is, if counter < k, otherwise, it doubles to higher bound value.  If node A becomes higher bound value, count is incremented by one.  If a node A receives an advertisement message from a node B, A compares the received version number with its own. If the version number of B is bigger, then A requests the code after a randomly chosen time between [0, R] then downloads the code, and updates from B. If the version number of B is smaller, then A broadcasts advertisement messages. If the version numbers are equal and if B does not exist in its neighbourhood table, A adds B in its table, doubles value to higher bound value and increments counter by one.  If a node A receives a request message from B, A sends the new code to B.  If a node A updates its code from B, it first clears its neighbourhood table and then adds B in its table. It sets counter to 0, sets q to 0 and sets lower value.  If, during time, A does not send any advertisement message, it doubles up to higher bound value. If value already equal to higher value, it increments count by one and sets counter to 0. 4. DATA FORWARDING REQUEST When a node (Say S) wants to send a message to Node (Say D), then Node S searches its route table for a route to D. If there is no route then, S Initiates Data forwarding Request (RREQ) with following steps. Figure 1 Data Forwarding Request (RREQ)  IP addresses of S and D, Current sequence number of S and last known sequence number of D  A broadcast ID from S. The Broadcast ID is incremented each time S sends Data Forwarding Request (RREQ).  The broadcast ID, IP address pair of the source forms unique identifier for the Data Forwarding Request (RREQ).  Node P receives request from Node S. P checks whether it has received this request before. Each node stores (Broadcast ID, IP address) Pair for all the recent Data Forwarding Request, it has received.  If node P has seen this Data Forwarding Request (RREQ), P discards this request. Otherwise P processes this Data Forwarding Request (RREQ).  P sets up a reverse route entry in its route table for Source S.
  • 4. S. Syed Abdul Syed, Senthil Kumaran, A. Sarfaraz Ahmed, E. Syed Mohamed, A Manikandan B and S. Rajesh http://www.iaeme.com/IJEET/index.asp 64 editor@iaeme.com  This entry contains internet protocol address and current sequence number of S, number of hops to S and address of the neighbour from whom P gets Data Forwarding Request (RREQ).  P can respond to Forwarding Request (RREQ) from S if D has an unexpired entry for D in its route table.  The sequence number from D that P has not is less than the sequence number of D that was in RREQ from S. This ensures there is no loop in the route.  If P satisfies both of these requirements, it unicasts response message back to S. 5. DATA REPLY REQUEST Node D responds with a message to Node S (from figure 1) using following steps.  P can respond to Forwarding Request (RREQ) from S if D has an unexpired entry for D in its route table.  The sequence number from D that P has not is less than the sequence number of D that was in RREQ from S.  This ensures there is no loop in the route.  If P satisfies both of these requirements, it unicasts response message back to S.  If P cannot reply to RREQ from S, P increments the Hop count of RREQ and broadcasts to its neighbours.  Node D always is able to send Data Reply Request (RREQ) to S, since it has the highest sequence number.  If RREQ is lost, the source node S can try the route discovery for fixed number of times. 6. DATA ERROR MESSAGE The neighbourhood nodes are monitored. When a route that is active is lost, the neighbourhood nodes are notified by route error message (RERR) on both sides of link. 7. DATA FLOW DIAGRAMS 7.1. Activity Diagram An activity diagram is used to model a large activities sequential work flow by focusing on action sequences and respective action initiating conditions. The state of an activity relates to the performance of each workflow step. An activity diagram is represented by shapes that are connected by arrows. Arrows run from activity start to completion and represent the sequential order of performed activities. Black circles represent an initial workflow state. A circled black circle indicates an end state. Rounded rectangles represent performed actions, which are described by text inside each rectangle. A diamond shape is used to represent a decision, which is a key activity diagram concept. Upon activity completion, a transition (or set of sequential activities) must be selected from a set of alternative transitions for all use cases. Activity diagram for system is represented in Figure 2. The activity starts with Forwarding Data Request (RREQ). If request is same as previous, destination node discards it. Otherwise, Destination node processes the current request and acknowledges with response request.
  • 5. An Effective Reliable Broadcast Code Dissemination In Wireless Sensor Networks http://www.iaeme.com/IJEET/index.asp 65 editor@iaeme.com Figure 2 Activity Diagram 8. OUTPUT SCREENSHOTS Figure 4 indicates temperature at each node during transmission. It is observed that, temperature of node decreases during each transmission resulting in Traffic congestion. Common Point node transmits data during temperature is noted. Receiving nodes in the subsequent steps are identified and temperature is noted. Drop in temperature at each node indicates traffic congestion leading to loss of data information. Figure 3 Temperature of node in Trickle Protocol Figure 4 indicates, message transmission process during data is transferred between the nodes and acknowledgement is made for each unique successful transmission. Requests Data Forward Is Unique? Process Request Stores Request Is Success? Responds Request Responds Error Message Discards Request Yes No Yes No
  • 6. S. Syed Abdul Syed, Senthil Kumaran, A. Sarfaraz Ahmed, E. Syed Mohamed, A Manikandan B and S. Rajesh http://www.iaeme.com/IJEET/index.asp 66 editor@iaeme.com Figure 4 Message Transmission and Acknowledgement Figure 5 indicates, delay/ error message during message transmission. Figure 5 Output Screen 9. RESULT AND ANALYSIS 9.1 Simulation Setup Simulation is performed using NS2 simulations. In this simulation, Trickle protocol is performed to assess: the number of advertisement packets transmitted, the Acknowledgement for received Packets, Energy for each node, temperature for each node is generated using carbon Monoxide generator and the completion time or dissemination latency. Following scenarios were implemented during simulation.  Periodic Traffic: Each node periodically sends data packet, with the period randomly selected between [0 . . . 1] min.  Event-based Traffic: Each node sends only one packet at a randomly selected time between [λ, λ+1] min, where λ is the time the event occurred.  Event-based bursty traffic: Each node sends b packets, one packet per second, after a randomly selected time between [λ,λ+1] min, where λ is the time the event occurred. Events occur every λ min.
  • 7. An Effective Reliable Broadcast Code Dissemination In Wireless Sensor Networks http://www.iaeme.com/IJEET/index.asp 67 editor@iaeme.com 9.2 Metrics In NS2 simulations, following metrics are used: The number of advertisement packets transmitted, as the number of transmissions is directly related to energy consumption, The number of discarded application, Packets as this metric captures the amount of resources wasted as bandwidth and energy and (iii) completion time (dissemination latency), which is another important criteria in network reprogramming, to enable the network to work efficiently. Figure 6 Comparison of Trickle with other Protocols 9.3 Number of Advertisement Packets The number of advertisement packets where a node periodically sends one data packet, with the period randomly chosen between [0 . . . 1] min in the network with symmetric links. As can be observed, the number of advertisement packets Trickle sends increases linearly with time, even when there is no new code in the network as it can be observed in Trickle, the transmission of advertisement packets stop after some time and never transmitted again, as long as there is no new code in the network. 9.4 Code Dissemination Latency Time for dissemination latency is noted from the point when a packet with the new version is injected to the point when the last node in a network receives that packet, referred as code dissemination latency. Latency observed under two scenarios: Periodic traffic, and Bursty traffic. Trickle found to have very low dissemination latency. 9.5Discussion In Trickle, sending packets depends on the probability P. The value of P set to 1. However, if there are many neighbours that are ready to send packets, then there might be a collision, and it is a waste of resources such as energy and throughput. Conversely, if P is set to a very small value, then nodes might not send packets and the asymmetric link problem may not be solved. Thus, the value of P should be set according to the density of the network. If the network is dense, P could be set to small value as the number of neighbours of both might be large. And P could be set to a large number if the network is sparse. In general, if the nodes in the network are uniformly randomly distributed, then we can approximate the number of neighbouring nodes of both nodes and can set P to an appropriate number as following. Let q be the number of neighbours of a node. Let n1 and n2 be neighbours of each other. Then, if the coverage area of a node is Πr2 , then the intersection of coverage areas of n1 and n2 is 2Πr2 /3 − r2 √3 nodes in Πr2 , there are around q/3 nodes in 2Πr2 /3−r2 √(3/2) as
  • 8. S. Syed Abdul Syed, Senthil Kumaran, A. Sarfaraz Ahmed, E. Syed Mohamed, A Manikandan B and S. Rajesh http://www.iaeme.com/IJEET/index.asp 68 editor@iaeme.com shown in figure 5.3. Therefore, if there exists an asymmetric link between n1 and n2, the neighbours of both should set their P to a number between 1 and 3/q, i.e., 1 ≥ P ≥ 3/q. For example, if the number of neighbours of a node is q ≤ 3, then P should be set to 1. if q = 30, then P ≥ 0.1. Figure 7 Intersection of Coverage Areas in Trickle Protocol Figures 8 displays Number of packets with probability 0 and 1. Figure 9 and 10 displays number of packets with low and high probability. Figure 12 displays transmission graph. Figure8 Number of Packets Figure 9 Number of Packets with High varying Probability Figure 10 Number of Packets with low varying Probability
  • 9. An Effective Reliable Broadcast Code Dissemination In Wireless Sensor Networks http://www.iaeme.com/IJEET/index.asp 69 editor@iaeme.com Figure 11 Transmission Graph 10. CONCLUSIONS AND FUTURE WORK Flooding in Wireless Sensor Networks (WSN) is leveraged to establish a route to the destination for effective routing. Each node informs other nodes of link state, its latest link, flooded across the network. Flooding is performed by making all nodes in network receive same message. Trickle one of the important network protocols, performs flooding the code, by a technique known as Code Dissemination. Code dissemination in networking is the process of broadcasting message to different nodes. During broadcast, there may be loss created at each node because of random traffic created between the nodes. This leads to traffic implosion. This limitation is reduced by using flooding scheme that achieve high reliability while reducing redundant traffic by controlling the number of broadcasts. Probabilistic and Opportunistic Flooding Algorithm (POFA) reduces the number of broadcasts while satisfying the given target reliability. Thus, the sender is aware of Link error rates between its one-hop neighbours and Link error rates between its one-hop and two-hop neighbours. Assumption is made such that link error rates can be calculated based on periodic message exchanges between sensor nodes for neighbour discovery and/or synchronization. With the stable estimation of link error rate, the exchanges of link information between neighbour nodes need not to be occurred frequently. This implies that piggybacked flooding packet or periodic messages are sufficient to exchange the link state in POFA. Thus, to avoid the cost associated with flooding, much effort has been focused on opportunistic forwarding, which aims to reduce the cost of forwarding while retaining high routing performance by forwarding messages only to nodes that have high delivery probabilities. REFERENCES [1] Chi-Tsun Cheng, Tse, C.K., Lau, F.C.M. et al. A Delay-Aware Data Collection Network Structure for Wireless Sensor Networks, Sensors Journal, IEEE, (11, (3), pp.699, 710, March 2011. [2] Yanchao Zhang, Yanchao Zhang et al. LR-Seluge: Loss-Resilient and Secure Code Dissemination in Wireless Sensor Networks, Distributed Computing Systems (ICDCS), 2011 31st International Conference, PP.497, 506, 20-24 June 2011. [3] Abdallah N.O., Jmaiel M., Mosbah M., Zemmari A. et al. Greedy Flooding in Redoubtable Sensor Networks, Advanced Information Networking and Applications (AINA), 2014 IEEE 28th International Conference, Volume No. PP.899, 906, 13-16 May 2014.
  • 10. S. Syed Abdul Syed, Senthil Kumaran, A. Sarfaraz Ahmed, E. Syed Mohamed, A Manikandan B and S. Rajesh http://www.iaeme.com/IJEET/index.asp 70 editor@iaeme.com [4] Ting Zhu, Ziguo Zhong, Tian He, Zhi-Li Zhang et al. Achieving Efficient Flooding by Utilizing Link Correlation in Wireless Sensor Networks, Networking, IEEE/ACM Transactions, 21(1), PP.121, 134, Feb. 2013. [5] Sain Saginbekov, Arshad Jhumka et al. Efficient code dissemination in wireless sensor networks, Future Generation Computer Systems, 39, October 2014. [6] Dukhyun Chang, Kideok Cho, Nakjung Choi, Ted et al. Taekyoung, Kwona, Yanghee Choi, A probabilistic and opportunistic flooding algorithm in wireless sensor networks, 35(4), February 2012. [7] Mrs.R.Rajasree, Dr.G.Kalivarathan. Analysis of Programming Aspects of Wireless Sensor Networks and Non Uniformity Issues-A Feasible Study, International journal of Electronics and Communication Engineering &Technology (IJECET), 3(3), 2012, pp. 219-226. [8] Kermajani, H., Gomez, C., Arshad M.H. et al. Modeling the Message Count of the Trickle Algorithm in a Steady-State, Static Wireless Sensor Network, Communications Letters, IEEE, 16(12), PP.1960, 1963, December 2012. [9] Sandeep Mehra and Cn Khairnar. Analysis And Design of Ultra Low Power ADC For Wireless Sensor Networks, International journal of Electronics and Communication Engineering &Technology (IJECET), 4(1), 2013, pp. 264 - 275. [10] Cong Liu, Jie Wu et al. On Multicopy Opportunistic Forwarding Protocols in Nondeterministic Delay Tolerant Networks. Parallel and Distributed Systems, IEEE Transactions. Parallel and Distributed Systems, IEEE Transactions, 23(6), pp.1121, 1128, June 2012. [11] Rohit D. Gawade and Dr. S. L. Nalbalwar. Mac Protocol Based Low Energy Operations In Wireless Sensor Networks, International journal of Electronics and Communication Engineering &Technology (IJECET), 5(3), 2014, pp. 79 - 93. [12] Neeraj Tiwari, Rahul Anshumali and Prabal Pratap Singh. Wireless Sensor Networks: Limitation, Layerwise Security Threats, Intruder Detection, International journal of Electronics and Communication Engineering &Technology (IJECET), 3(2), 2012, pp. 22-31. [13] Wei Wang, Dongming Peng, Honggang Wang, Sharif H., Hsiao-Hwa Chen, et al. Cross-layer multirate interaction with Distributed Source Coding in Wireless Sensor Networks, Wireless Communications, IEEE Transactions, 8(2), PP.787,795, Feb. 2009.