SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 206
ANALYZING THE INTERACTION OF ASCENT WITH IEEE 802.11e MAC IN WIRELESS
SENSOR NETWORK
A.Sundar Raj1, S. Kavya2, K.G. Devi Priyanka3
Associate Professor,
E.G.S. Pillay Engineering College, Nagapattinam, India1
drasr1982@gmail.com1
E.G.S. Pillay Engineering College, Nagapattinam, India2,3
kavyasadanandam@gmail.com2, priyankaganesh8383@gmail.com3
-------------------------------------------------------------***----------------------------------------------------------------
Abstract— A wireless sensor network (WSN) consists of a
number of sensors distributed in the sensor field. These
sensors monitor physical or environmental conditions. In
Adaptive Self-Configuring sEnsor Networks Topologies
(ASCENT) the nodes can coordinate to exploit the redundancy
provided by the high density, so as to extend overall system
lifetime. When the nodes detect high message loss, it requests
additional nodes in the region to join the network in order to
relay messages. This reduces nodes duty cycle if it detects
high message losses due to collisions. Due to dense
deployment congestion becomes more common phenomenon
from simple periodic traffic to unpredictable bursts of
messages triggered by external events. Congestion causes
huge packet loss and thus blocks reliable event perception.
Congestion in wireless sensor networks causes packet loss,
and thus also leads to excessive energy consumption. So we
need to control congestion in WSN in order to prolong system
lifetime. In order to reduce the congestion, we have
implemented MAC layer 802.11e instead of CSMA. It is
observed that the proposed scheme performs well in terms of
packet delivery ratio, throughput and energy consumption.
Keywords— Wireless Sensor Networks, ASCENT, Topology,
MAC layer, Lifetime Improvement factor, NS2.
I. INTRODUCTION
Wireless Sensor Network consists of large number of
sensor nodes deployed either uniformly or randomly in the
field. These nodes will always be wasting energy as they
will be in active state. Hence the main goal is to put some of
the sensor nodes in sleep state and some other nodes in
active state. Battery life, sensor update rates, and size are
all major design considerations in wireless sensor networks.
Recent advances have resulted in the ability to integrate
sensors, radio communications, and digital electronics into
a single integrated circuit package, which reduces size and
complexity of the node. This capability is enabling networks
of very low cost sensors that are able to communicate with
each other using low power wireless data routing protocols.
A wireless sensor network consists of a base station that
can communicate with a number of wireless sensors. Data
is collected at the wireless sensor node, transmitted to the
gateway directly or uses other wireless sensor nodes to
forward data to the gateway. The transmitted data is then
given to the system by the gateway connection.
We have carried out an extensive survey on wireless
sensor networks and topology management schemes [2],
[6]. There are many topology management schemes for
sensor network, like ASCENT, SPAN, BEES, STEM and GAF
[1], [3], [9], [12]. They help the network to perform better
by their management of controlling data packets, reducing
energy consumption and so on. We also surveyed many
congestion control schemes [8], [10], [11] to improve the
topologies.
In our work we have taken the ASCENT (Adaptive Self
Configuring sEnsor Network Topologies) topology
management scheme [1], which is an adaptive network
topology for mobile network. It can dynamically choose
ACTIVE nodes to send messages successfully in the network.
In ASCENT the limitation is the packet loss due to
congestion. Hence the energy consumed will be higher and
throughput will be less. To overcome this we use IEEE
802.11e MAC layer and we analysis the performances like
packet delivery ratio, system throughput and energy
consumption and will be comparing ASCENT with CSMA.
The paper is organised as follows, section II discusses the
related work in topology of wireless sensor network,
section III explains ASCENT, section IV explains the
interaction of ASCENT with MAC 802.11e, in section V
results and analysis are discussed and conclusion is given in
the final section.
II. RELATED WORK
C. Wang et al have proposed Upstream Congestion
Control in Wireless Sensor Networks through Cross-Layer
Optimization [10]. In this congestion is classified as node
level congestion and link level congestion. Node level
congestion causes packet loss and queuing delay and this
leads to retransmission, so consumes additional energy.
Link level congestion increases service time which leads to
decrease in both link utilization and overall throughput. In
this Priority-based congestion control protocol (PCCP) is
proposed. This employs packet based computation to
optimize congestion control.
Md. Mamun-Or-Rashid et al have proposed Reliable
Event Detection and Congestion Avoidance in Wireless
Sensor Networks [8]. Here congestion avoidance protocol
[8] includes hierarchical medium access control (HMAC)
and weighted round robin forwarding (WRRF) are
proposed. In HMAC node carrying higher amount of traffic
gets more accesses than others. Therefore, downstream
nodes obtain higher access to the medium than the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 207
upstream nodes. This access pattern is controlled with local
values and is made load adaptive to cope up with various
application scenarios. In WRRF Downstream node allows
all of its upstream nodes to transmit their weighted-share
amount of packets. To avoid congestion, before
transmitting a packet each upstream node must be aware
whether there is sufficient free buffer space at the
downstream node. To implement this notion, they restrict
an upstream node from delivering packets when its
downstream node has not sufficient amount of free buffer
space. This was achieved by their proposed source count
based weighted round robin forwarding (WRRF). The data
transmission in a network is termed as unreliable if the
packet delivery ratio decreases to very low value so that the
event cannot be detected reliably. Thus an efficient way is
proposed to reduce congestion within the sensor network
to ensure good delivery ratio for reliable event detection.
Integrated effort of their proposed source count based
HMAC and WRRF reduces packet drop due to collision and
avoids packet drop due to buffer overflow and finally
achieves more delivery ratio which is good enough for
reliable event perception.
Chen et al have proposed a new technique called Span
which is a topology control protocol that allows nodes that
are not involved in a routing backbone to sleep for
extended periods of time [3]. In this topology, certain nodes
assign themselves the position of “coordinator”. These
coordinator nodes are chosen to form backbone network,
so that the capacity of the backbone approaches the
potential capacity of the complete network. Periodically,
nodes that have not assigned themselves the coordinator
role initiate a procedure to decide if they should become a
coordinator. The criterion for this transition is if the
minimum distance between any two of the node’s
neighbours exceeds three hops.
III. ASCENT
Adaptive Self Configuring sEnsor Network Topology is a
wireless sensor topology management scheme that has four
states of nodes namely ACTIVE, PASSIVE, TEST and SLEEP.
In the active state transceivers will be active all the time
and participates in the communication. An enough number
of active state nodes will be required to transmit the data
successfully to the sink. In passive and test states, the nodes
receiver will be turned on. It will listen for the messages
flooded in the network and these states will seek to change
as active states whenever needed to participate in the
network. Sleep state is the energy saving mode in which
transceivers will be turned off.
When a node detects an event, it will be routed through
active state nodes. In case if a node detects message loss it
will send help messages to the neighbours. Node which is in
passive state receives these messages and checks for the
conditions to become active node if needed.
Figure 1. ASCENT state transition
The state transition in ASCENT is shown in the Figure 1.
Each and every node in ascent first enters in the test state,
then it will check to go weather active or passive state
depends on the conditions. It goes to passive state if the
number of active state nodes is greater than the threshold
value and loss is less than the threshold value. Otherwise it
will go to active state after the time Tt. From passive state it
will go sleep or test state depending upon the following
condition, if the number of active state nodes is less than
the threshold active state nodes and loss is greater than the
threshold loss or loss is less but help message is received
from the neighbour then it will go to test state, otherwise it
will go to sleep state after the time Tp. From sleep state it
will go to passive state after the time Ts. By this way the
required number of active state nodes will be maintained in
the network for the reliable transfer of data.
When a node sends message to the sink, the sink may be
at the border of radio range so message loss will occur. In
this case the sink starts sending help messages to the
neighbours that are in listen-only (passive) mode. When the
node receives help message it may join the network by
becoming active state from the conditions shown in the
Figure 1. When a node decides to join the network, it
signals the existence of a new active neighbour to other
passive neighbours by sending a neighbour announcement
message. After the required number of active state nodes
are obtained the delivery of data from source to sink is now
more reliable.
Notation and definition:
1. Tt – Test timer, time required to check the
condition specified in Figure 1.
2. NT – Number of Neighbour threshold, we assume
this as 4.
3. LT – Maximum amount of data loss it can tolerate
depends on application.
4. Ts – Sleep timer.
5. Tp – Passive timer
For conserving energy the node must remain in sleep
state, but if Ts is large then that node can’t participate in the
network when required. If the node remains in the passive
state it can make transition to active state whenever
required, but if Tp is large energy consumed will be high. So,
there must be a tradeoff between Tp and Ts for proper
network operation.
Neighbors < NT
and
Loss > LT
Loss < LT and help
Neighbors > NT
Loss < LT
After Tp
After Tt
After Ts
Test Active
Passive Sleep
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 208
The probability of nodes in passive or sleep state is given
by
1
)passive(P


 (1)
)passive(P1)sleep(P  (2)
The probability of x nodes in the passive state is given by
1
1
.
1
1
1)x(p
xn









 (3)
Here ‘γ’ is the ratio of passive time Tp to the sleep time Ts
and ‘n’ is number of nodes.
By taking x=1 and x=2 we can find the minimum value of
γ as γ1 and γ2 respectively. The solution is given by
110
)p1log(
n
1
1
t


(4)
110
)p1log(
n1
1
2
t


 (5)
Where pt is minimum probability threshold.
With these values we can set the sleep time (Ts) and
passive time (Tp).
IV.INTERACTION OF ASCENT WITH IEEE 802.11℮
In our proposed work we have analysed the interaction
of ASCENT with IEEE 802.11e MAC layer. This MAC layer is
specially designed to provide quality of service in a network
[5]. To achieve this, a new coordination function is used
namely hybrid coordination function (HCF). The HCF
combines the functions of DCF and PCF with some
enhanced QoS-specific mechanisms and frame subtypes to
allow a uniform set of frame to exchange sequences during
both the contention period (CP) and contention free period
(CFP). The HCF uses both contention-based channel access
methods, called the enhanced distributed channel access
(EDCA) mechanism and controlled channel access, referred
to as the HCF controlled channel access (HCCA) mechanism.
The EDCA mechanism provides differentiated and
distributed access to the wireless medium for QSTAs
(quality of service station) using eight different user
priorities (UP). The EDCA mechanism defines four access
categories that provide support for the delivery of traffic
with UPs at the QSTAs.
Higher priority traffic has a more chance of being sent
than low priority traffic, a station with high priority traffic
waits for less time before it sends its packet, than a station
with low priority traffic which as to wait little more [5].
This is achieved by using a shorter contention window (CW)
and shorter arbitration inter-frame space (AIFS) for higher
priority packets. EDCA also provides contention-free access
to the channel to a period called a Transmit Opportunity
(TXOP). A TXOP is a time interval during which a station
can send many frames without congestion. The frame has to
be fragmented, when the frame size is very large that can’t
be transmitted in a single TXOP.
V. RESULTS AND ANALYSIS
We have implemented ASCENT and then combined
ASCENT with IEEE 802.11e and thereby performance is
analysed by comparing ASCENT with CSMA. The ASCENT
with IEEE 802.11e scheme has better performance in terms
of packet delivery ratio, throughput and energy
conservation when compared to ASCENT with CSMA MAC
layer.
A. Simulation Environment
Simulation is carried out using Network simulator (NS2).
In our simulation we have considered random deployment
of nodes with mobility. We have taken the number of nodes
as 20, 40, 60, 80 and 100 and plotted against various
parameters like packet delivery ratio, throughput and
energy consumption. Their performance evaluation is
discussed below. We have taken initial energy for each
node as 1000 J.
B. Dependency of γ value on Pt
0 10 20 30 40 50 60 70 80 90
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
Number of nodes
Gamma
x=1,Pt=99%
x=1,Pt=95%
x=2,Pt=99%
x=2,Pt=95%
Figure 2. Dependency of γ value on Pt
From Figure 2 it is inferred that for higher value of Pt the
γ value remains high for corresponding node density, for
lower values of Pt the γ value are low. Thus the estimation
of γ value has more dependency on Pt values.
C. Packet delivery ratio
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 209
20 40 60 80 100 120
0
10
20
30
40
50
60
70
80
90
100
Packet Delivery Ratio
Number of nodes
PacketDeliveryratio%
CSMA
IEEE 802.11e
Figure 3. Packet Delivery Ratio
The packet delivery ratio for different number of nodes is
studied and plotted for ASCENT with IEEE 802.11e MAC
and with CSMA MAC as shown in Figure 3. It is observed
that in both the cases the packet delivery ratio drops as the
number of nodes increases. Since the collision is minimised
in ASCENT with IEEE 802.11e, packet delivery ratio
increases substantially.
D. Throughput
20 40 60 80 100 120
0
500
1000
1500
Throughtput of the system
Number of nodes
Throughput(B/s)
CSMA
IEEE 802.11e
Figure 4. Throughput
Throughput of the network is analysed and it is shown in
Figure 4. The throughput of the network is higher in
ASCENT with IEEE 802.11e when compared with ASCENT
with CSMA. From this it is inferred that ASCENT with IEEE
802.11e MAC provides higher system capacity.
E. Energy Consumption
20 40 60 80 100
200
300
400
500
600
700
800
900
1000
Energy consumed
Number of nodesConsumedenergy
CSMA
IEEE 802.11e
Figure 5. Energy consumption.
Figure 5 shows energy consumed by ASCENT with IEEE
802.11e and ASCENT with IEEE CSMA MAC layer. The
energy consumed by ASCENT with IEEE 802.11e is much
lesser than energy consumed by ASCENT with CSMA MAC
layer. From this we can infer that ASCENT with IEEE
802.11e consumes very less energy.
VI.CONCLUSIONS
In this paper we have implemented ASCENT with CSMA.
We have integrated ASCENT with IEEE 802.11e MAC layer.
We analysed the parameters namely packet delivery ratio,
system throughput and energy consumption for both CSMA
and IEEE 802.11e MAC layers. It is inferred that ASCENT
with IEEE 802.11e MAC layer provides higher packet
delivery ratio, increased system throughput and lower
energy consumption when compared to ASCENT with
CSMA MAC layer. Thus ASCENT with IEEE 802.11e
performs better in wireless sensor network.
REFERENCES
[1] Alberto Cerpa and Deborah Esttrin, ‘ASCENT: Adaptive Self-
Configuring sEnsor Networks Topologies’, IEEE Transactions on
mobile computing, Vol.3, July-September 2004.
[2] Akyildiz. I.F, Su. W, Sankarasubramaniam. Y, Cayirci. E, “Wireless
sensor networks: a survey”, 2002 Published by Elsevier Science B.V,
Computer Networks 38 (2002) pp.392-422.
[3] Chen. B, Jamieson. K, Balakrishnan. H, Morris.R (2002), ‘Span: An
Energy-Efficient Coordination Algorithm for Topology Maintenance
in Ad Hoc Wireless Networks’ Springer, 8(5).
[4] Curt Schurgers, Vlasios Tsiatsis, Mani B. Srivastava, “STEM:
Topology Management for Energy Efficient Sensor Networks,”
IEEEAC paper #260, Updated Sept 24, 2001.
[5] IEEE Std 802.11e™-2005
[6] Mo Li, Baijian Yang: ‘A Survey on Topology issues in Wireless Sensor
Network’ In Proceedings of ICWN, Las Vegas, Nevada, USA, June
2006, pp.503 - 509.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 210
[7] Miguel A. Labrador and Pedro M. Wightman, ‘Topology Control in
Wireless Sensor Networks’, Springer April 2009
[8] Mamun-Or-Rashid. Md, Muhammad Mahbub Alam, Abdur Razzaque.
Md, and Choong Seon Hong, ‘Reliable Event Detection and
Congestion Avoidance in Wireless Sensor Networks’,HPCC 2007,
LNCS 4782, pp521-532, 2007.
[9] Rong Yu, Zhi Sun, and Shunliang Mei (2007), ‘Scalable Topology and
Energy Management in Wireless Sensor Networks’, in the
proceedings of the IEEE WNCA.
[10] Wang. C, Li. B, Sohraby. K, Daneshmand. M and Hu. Y, ‘Upstream
Congestion Control in Wireless Sensor Networks Through Cross-
Layer Optimization’, IEEE Journal On Selected Areas In
Communications, Vol. 25, No. 4, May 2007
[11] Xiang-Yang Li, Kousha Moaveni-Nejad, Wen-Zhan Song, Wei-Zhao
Wang, ‘Interference-Aware Topology Control for Wireless Sensor
Networks’, IEEE SECON 2005 proceedings.
[12] Y. Xu, J. Heidemann, D. Estrin, “Geography-informed energy
conservation for ad hoc routing,” MobiCom 2001, Rome, Italy, pp.
70-84, July 2001.

More Related Content

What's hot

Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECYogesh Fulara
 
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star TopologyA Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star TopologyIRJET Journal
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyAli Habeeb
 
Direct_studies_report13
Direct_studies_report13Direct_studies_report13
Direct_studies_report13Farhad Gholami
 
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...IRJET Journal
 
Study of Leach Protocol- A Review
Study of Leach Protocol- A ReviewStudy of Leach Protocol- A Review
Study of Leach Protocol- A ReviewEditor IJMTER
 
Energy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSNEnergy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSNZubin Bhuyan
 
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...IRJET Journal
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...ijsrd.com
 
Improve a Network Life Time by Least Troublesome Topology Repair Algorithm in...
Improve a Network Life Time by Least Troublesome Topology Repair Algorithm in...Improve a Network Life Time by Least Troublesome Topology Repair Algorithm in...
Improve a Network Life Time by Least Troublesome Topology Repair Algorithm in...IJTET Journal
 
A review of routing protocols in wsn
A review of routing protocols in wsnA review of routing protocols in wsn
A review of routing protocols in wsnAyman Adel
 
BeeSensor routing protocol for wireless sensor network
BeeSensor routing protocol for wireless sensor networkBeeSensor routing protocol for wireless sensor network
BeeSensor routing protocol for wireless sensor networkSonam Jain
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsVirendra Thakur
 

What's hot (20)

Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEEC
 
Thesis-Final-slide
Thesis-Final-slideThesis-Final-slide
Thesis-Final-slide
 
Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & Pegasis
 
A04560105
A04560105A04560105
A04560105
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star TopologyA Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
 
wsn routing protocol
 wsn routing protocol wsn routing protocol
wsn routing protocol
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Wsn ppt
Wsn pptWsn ppt
Wsn ppt
 
Direct_studies_report13
Direct_studies_report13Direct_studies_report13
Direct_studies_report13
 
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
Single Sink Repositioning Technique in Wireless Sensor Networks for Network L...
 
Study of Leach Protocol- A Review
Study of Leach Protocol- A ReviewStudy of Leach Protocol- A Review
Study of Leach Protocol- A Review
 
Energy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSNEnergy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSN
 
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
 
Improve a Network Life Time by Least Troublesome Topology Repair Algorithm in...
Improve a Network Life Time by Least Troublesome Topology Repair Algorithm in...Improve a Network Life Time by Least Troublesome Topology Repair Algorithm in...
Improve a Network Life Time by Least Troublesome Topology Repair Algorithm in...
 
A review of routing protocols in wsn
A review of routing protocols in wsnA review of routing protocols in wsn
A review of routing protocols in wsn
 
BeeSensor routing protocol for wireless sensor network
BeeSensor routing protocol for wireless sensor networkBeeSensor routing protocol for wireless sensor network
BeeSensor routing protocol for wireless sensor network
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 

Similar to Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor network

Power control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulatorPower control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulatorIRJET Journal
 
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET Journal
 
Secured Data Aggregation using SRL Protocol for Wireless Sensor Networks
Secured Data Aggregation using SRL Protocol for Wireless Sensor NetworksSecured Data Aggregation using SRL Protocol for Wireless Sensor Networks
Secured Data Aggregation using SRL Protocol for Wireless Sensor NetworksAssociate Professor in VSB Coimbatore
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET Journal
 
Congestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A surveyCongestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A surveyIJERA Editor
 
Comparative Performance Analysis of Teen Sep Leach EAMMH and PEGASIS Routing ...
Comparative Performance Analysis of Teen Sep Leach EAMMH and PEGASIS Routing ...Comparative Performance Analysis of Teen Sep Leach EAMMH and PEGASIS Routing ...
Comparative Performance Analysis of Teen Sep Leach EAMMH and PEGASIS Routing ...IRJET Journal
 
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...IDES Editor
 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...IRJET Journal
 
Performance Analysis of Routing Metrics for Wireless Sensor Networks
Performance Analysis of Routing Metrics for Wireless Sensor NetworksPerformance Analysis of Routing Metrics for Wireless Sensor Networks
Performance Analysis of Routing Metrics for Wireless Sensor NetworksIJMER
 
Bb2641284132
Bb2641284132Bb2641284132
Bb2641284132IJMER
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET Journal
 
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...IRJET Journal
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...journalBEEI
 
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...IRJET Journal
 
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...IRJET Journal
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkAM Publications
 
2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stackSyed Ariful Islam Emon
 

Similar to Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor network (20)

Power control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulatorPower control in mobile ad hoc network using NS2 simulator
Power control in mobile ad hoc network using NS2 simulator
 
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
 
Secured Data Aggregation using SRL Protocol for Wireless Sensor Networks
Secured Data Aggregation using SRL Protocol for Wireless Sensor NetworksSecured Data Aggregation using SRL Protocol for Wireless Sensor Networks
Secured Data Aggregation using SRL Protocol for Wireless Sensor Networks
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
 
Congestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A surveyCongestion Control in Wireless Sensor Networks: A survey
Congestion Control in Wireless Sensor Networks: A survey
 
Comparative Performance Analysis of Teen Sep Leach EAMMH and PEGASIS Routing ...
Comparative Performance Analysis of Teen Sep Leach EAMMH and PEGASIS Routing ...Comparative Performance Analysis of Teen Sep Leach EAMMH and PEGASIS Routing ...
Comparative Performance Analysis of Teen Sep Leach EAMMH and PEGASIS Routing ...
 
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
 
Performance Analysis of Routing Metrics for Wireless Sensor Networks
Performance Analysis of Routing Metrics for Wireless Sensor NetworksPerformance Analysis of Routing Metrics for Wireless Sensor Networks
Performance Analysis of Routing Metrics for Wireless Sensor Networks
 
Bb2641284132
Bb2641284132Bb2641284132
Bb2641284132
 
IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
 
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
 
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
 
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
 
2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack
 
MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...
MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...
MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 

Recently uploaded (20)

(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 

Analyzing the interaction of ascent with ieee 802.11E mac in wireless sensor network

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 206 ANALYZING THE INTERACTION OF ASCENT WITH IEEE 802.11e MAC IN WIRELESS SENSOR NETWORK A.Sundar Raj1, S. Kavya2, K.G. Devi Priyanka3 Associate Professor, E.G.S. Pillay Engineering College, Nagapattinam, India1 drasr1982@gmail.com1 E.G.S. Pillay Engineering College, Nagapattinam, India2,3 kavyasadanandam@gmail.com2, priyankaganesh8383@gmail.com3 -------------------------------------------------------------***---------------------------------------------------------------- Abstract— A wireless sensor network (WSN) consists of a number of sensors distributed in the sensor field. These sensors monitor physical or environmental conditions. In Adaptive Self-Configuring sEnsor Networks Topologies (ASCENT) the nodes can coordinate to exploit the redundancy provided by the high density, so as to extend overall system lifetime. When the nodes detect high message loss, it requests additional nodes in the region to join the network in order to relay messages. This reduces nodes duty cycle if it detects high message losses due to collisions. Due to dense deployment congestion becomes more common phenomenon from simple periodic traffic to unpredictable bursts of messages triggered by external events. Congestion causes huge packet loss and thus blocks reliable event perception. Congestion in wireless sensor networks causes packet loss, and thus also leads to excessive energy consumption. So we need to control congestion in WSN in order to prolong system lifetime. In order to reduce the congestion, we have implemented MAC layer 802.11e instead of CSMA. It is observed that the proposed scheme performs well in terms of packet delivery ratio, throughput and energy consumption. Keywords— Wireless Sensor Networks, ASCENT, Topology, MAC layer, Lifetime Improvement factor, NS2. I. INTRODUCTION Wireless Sensor Network consists of large number of sensor nodes deployed either uniformly or randomly in the field. These nodes will always be wasting energy as they will be in active state. Hence the main goal is to put some of the sensor nodes in sleep state and some other nodes in active state. Battery life, sensor update rates, and size are all major design considerations in wireless sensor networks. Recent advances have resulted in the ability to integrate sensors, radio communications, and digital electronics into a single integrated circuit package, which reduces size and complexity of the node. This capability is enabling networks of very low cost sensors that are able to communicate with each other using low power wireless data routing protocols. A wireless sensor network consists of a base station that can communicate with a number of wireless sensors. Data is collected at the wireless sensor node, transmitted to the gateway directly or uses other wireless sensor nodes to forward data to the gateway. The transmitted data is then given to the system by the gateway connection. We have carried out an extensive survey on wireless sensor networks and topology management schemes [2], [6]. There are many topology management schemes for sensor network, like ASCENT, SPAN, BEES, STEM and GAF [1], [3], [9], [12]. They help the network to perform better by their management of controlling data packets, reducing energy consumption and so on. We also surveyed many congestion control schemes [8], [10], [11] to improve the topologies. In our work we have taken the ASCENT (Adaptive Self Configuring sEnsor Network Topologies) topology management scheme [1], which is an adaptive network topology for mobile network. It can dynamically choose ACTIVE nodes to send messages successfully in the network. In ASCENT the limitation is the packet loss due to congestion. Hence the energy consumed will be higher and throughput will be less. To overcome this we use IEEE 802.11e MAC layer and we analysis the performances like packet delivery ratio, system throughput and energy consumption and will be comparing ASCENT with CSMA. The paper is organised as follows, section II discusses the related work in topology of wireless sensor network, section III explains ASCENT, section IV explains the interaction of ASCENT with MAC 802.11e, in section V results and analysis are discussed and conclusion is given in the final section. II. RELATED WORK C. Wang et al have proposed Upstream Congestion Control in Wireless Sensor Networks through Cross-Layer Optimization [10]. In this congestion is classified as node level congestion and link level congestion. Node level congestion causes packet loss and queuing delay and this leads to retransmission, so consumes additional energy. Link level congestion increases service time which leads to decrease in both link utilization and overall throughput. In this Priority-based congestion control protocol (PCCP) is proposed. This employs packet based computation to optimize congestion control. Md. Mamun-Or-Rashid et al have proposed Reliable Event Detection and Congestion Avoidance in Wireless Sensor Networks [8]. Here congestion avoidance protocol [8] includes hierarchical medium access control (HMAC) and weighted round robin forwarding (WRRF) are proposed. In HMAC node carrying higher amount of traffic gets more accesses than others. Therefore, downstream nodes obtain higher access to the medium than the
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 207 upstream nodes. This access pattern is controlled with local values and is made load adaptive to cope up with various application scenarios. In WRRF Downstream node allows all of its upstream nodes to transmit their weighted-share amount of packets. To avoid congestion, before transmitting a packet each upstream node must be aware whether there is sufficient free buffer space at the downstream node. To implement this notion, they restrict an upstream node from delivering packets when its downstream node has not sufficient amount of free buffer space. This was achieved by their proposed source count based weighted round robin forwarding (WRRF). The data transmission in a network is termed as unreliable if the packet delivery ratio decreases to very low value so that the event cannot be detected reliably. Thus an efficient way is proposed to reduce congestion within the sensor network to ensure good delivery ratio for reliable event detection. Integrated effort of their proposed source count based HMAC and WRRF reduces packet drop due to collision and avoids packet drop due to buffer overflow and finally achieves more delivery ratio which is good enough for reliable event perception. Chen et al have proposed a new technique called Span which is a topology control protocol that allows nodes that are not involved in a routing backbone to sleep for extended periods of time [3]. In this topology, certain nodes assign themselves the position of “coordinator”. These coordinator nodes are chosen to form backbone network, so that the capacity of the backbone approaches the potential capacity of the complete network. Periodically, nodes that have not assigned themselves the coordinator role initiate a procedure to decide if they should become a coordinator. The criterion for this transition is if the minimum distance between any two of the node’s neighbours exceeds three hops. III. ASCENT Adaptive Self Configuring sEnsor Network Topology is a wireless sensor topology management scheme that has four states of nodes namely ACTIVE, PASSIVE, TEST and SLEEP. In the active state transceivers will be active all the time and participates in the communication. An enough number of active state nodes will be required to transmit the data successfully to the sink. In passive and test states, the nodes receiver will be turned on. It will listen for the messages flooded in the network and these states will seek to change as active states whenever needed to participate in the network. Sleep state is the energy saving mode in which transceivers will be turned off. When a node detects an event, it will be routed through active state nodes. In case if a node detects message loss it will send help messages to the neighbours. Node which is in passive state receives these messages and checks for the conditions to become active node if needed. Figure 1. ASCENT state transition The state transition in ASCENT is shown in the Figure 1. Each and every node in ascent first enters in the test state, then it will check to go weather active or passive state depends on the conditions. It goes to passive state if the number of active state nodes is greater than the threshold value and loss is less than the threshold value. Otherwise it will go to active state after the time Tt. From passive state it will go sleep or test state depending upon the following condition, if the number of active state nodes is less than the threshold active state nodes and loss is greater than the threshold loss or loss is less but help message is received from the neighbour then it will go to test state, otherwise it will go to sleep state after the time Tp. From sleep state it will go to passive state after the time Ts. By this way the required number of active state nodes will be maintained in the network for the reliable transfer of data. When a node sends message to the sink, the sink may be at the border of radio range so message loss will occur. In this case the sink starts sending help messages to the neighbours that are in listen-only (passive) mode. When the node receives help message it may join the network by becoming active state from the conditions shown in the Figure 1. When a node decides to join the network, it signals the existence of a new active neighbour to other passive neighbours by sending a neighbour announcement message. After the required number of active state nodes are obtained the delivery of data from source to sink is now more reliable. Notation and definition: 1. Tt – Test timer, time required to check the condition specified in Figure 1. 2. NT – Number of Neighbour threshold, we assume this as 4. 3. LT – Maximum amount of data loss it can tolerate depends on application. 4. Ts – Sleep timer. 5. Tp – Passive timer For conserving energy the node must remain in sleep state, but if Ts is large then that node can’t participate in the network when required. If the node remains in the passive state it can make transition to active state whenever required, but if Tp is large energy consumed will be high. So, there must be a tradeoff between Tp and Ts for proper network operation. Neighbors < NT and Loss > LT Loss < LT and help Neighbors > NT Loss < LT After Tp After Tt After Ts Test Active Passive Sleep
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 208 The probability of nodes in passive or sleep state is given by 1 )passive(P    (1) )passive(P1)sleep(P  (2) The probability of x nodes in the passive state is given by 1 1 . 1 1 1)x(p xn           (3) Here ‘γ’ is the ratio of passive time Tp to the sleep time Ts and ‘n’ is number of nodes. By taking x=1 and x=2 we can find the minimum value of γ as γ1 and γ2 respectively. The solution is given by 110 )p1log( n 1 1 t   (4) 110 )p1log( n1 1 2 t    (5) Where pt is minimum probability threshold. With these values we can set the sleep time (Ts) and passive time (Tp). IV.INTERACTION OF ASCENT WITH IEEE 802.11℮ In our proposed work we have analysed the interaction of ASCENT with IEEE 802.11e MAC layer. This MAC layer is specially designed to provide quality of service in a network [5]. To achieve this, a new coordination function is used namely hybrid coordination function (HCF). The HCF combines the functions of DCF and PCF with some enhanced QoS-specific mechanisms and frame subtypes to allow a uniform set of frame to exchange sequences during both the contention period (CP) and contention free period (CFP). The HCF uses both contention-based channel access methods, called the enhanced distributed channel access (EDCA) mechanism and controlled channel access, referred to as the HCF controlled channel access (HCCA) mechanism. The EDCA mechanism provides differentiated and distributed access to the wireless medium for QSTAs (quality of service station) using eight different user priorities (UP). The EDCA mechanism defines four access categories that provide support for the delivery of traffic with UPs at the QSTAs. Higher priority traffic has a more chance of being sent than low priority traffic, a station with high priority traffic waits for less time before it sends its packet, than a station with low priority traffic which as to wait little more [5]. This is achieved by using a shorter contention window (CW) and shorter arbitration inter-frame space (AIFS) for higher priority packets. EDCA also provides contention-free access to the channel to a period called a Transmit Opportunity (TXOP). A TXOP is a time interval during which a station can send many frames without congestion. The frame has to be fragmented, when the frame size is very large that can’t be transmitted in a single TXOP. V. RESULTS AND ANALYSIS We have implemented ASCENT and then combined ASCENT with IEEE 802.11e and thereby performance is analysed by comparing ASCENT with CSMA. The ASCENT with IEEE 802.11e scheme has better performance in terms of packet delivery ratio, throughput and energy conservation when compared to ASCENT with CSMA MAC layer. A. Simulation Environment Simulation is carried out using Network simulator (NS2). In our simulation we have considered random deployment of nodes with mobility. We have taken the number of nodes as 20, 40, 60, 80 and 100 and plotted against various parameters like packet delivery ratio, throughput and energy consumption. Their performance evaluation is discussed below. We have taken initial energy for each node as 1000 J. B. Dependency of γ value on Pt 0 10 20 30 40 50 60 70 80 90 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 Number of nodes Gamma x=1,Pt=99% x=1,Pt=95% x=2,Pt=99% x=2,Pt=95% Figure 2. Dependency of γ value on Pt From Figure 2 it is inferred that for higher value of Pt the γ value remains high for corresponding node density, for lower values of Pt the γ value are low. Thus the estimation of γ value has more dependency on Pt values. C. Packet delivery ratio
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 209 20 40 60 80 100 120 0 10 20 30 40 50 60 70 80 90 100 Packet Delivery Ratio Number of nodes PacketDeliveryratio% CSMA IEEE 802.11e Figure 3. Packet Delivery Ratio The packet delivery ratio for different number of nodes is studied and plotted for ASCENT with IEEE 802.11e MAC and with CSMA MAC as shown in Figure 3. It is observed that in both the cases the packet delivery ratio drops as the number of nodes increases. Since the collision is minimised in ASCENT with IEEE 802.11e, packet delivery ratio increases substantially. D. Throughput 20 40 60 80 100 120 0 500 1000 1500 Throughtput of the system Number of nodes Throughput(B/s) CSMA IEEE 802.11e Figure 4. Throughput Throughput of the network is analysed and it is shown in Figure 4. The throughput of the network is higher in ASCENT with IEEE 802.11e when compared with ASCENT with CSMA. From this it is inferred that ASCENT with IEEE 802.11e MAC provides higher system capacity. E. Energy Consumption 20 40 60 80 100 200 300 400 500 600 700 800 900 1000 Energy consumed Number of nodesConsumedenergy CSMA IEEE 802.11e Figure 5. Energy consumption. Figure 5 shows energy consumed by ASCENT with IEEE 802.11e and ASCENT with IEEE CSMA MAC layer. The energy consumed by ASCENT with IEEE 802.11e is much lesser than energy consumed by ASCENT with CSMA MAC layer. From this we can infer that ASCENT with IEEE 802.11e consumes very less energy. VI.CONCLUSIONS In this paper we have implemented ASCENT with CSMA. We have integrated ASCENT with IEEE 802.11e MAC layer. We analysed the parameters namely packet delivery ratio, system throughput and energy consumption for both CSMA and IEEE 802.11e MAC layers. It is inferred that ASCENT with IEEE 802.11e MAC layer provides higher packet delivery ratio, increased system throughput and lower energy consumption when compared to ASCENT with CSMA MAC layer. Thus ASCENT with IEEE 802.11e performs better in wireless sensor network. REFERENCES [1] Alberto Cerpa and Deborah Esttrin, ‘ASCENT: Adaptive Self- Configuring sEnsor Networks Topologies’, IEEE Transactions on mobile computing, Vol.3, July-September 2004. [2] Akyildiz. I.F, Su. W, Sankarasubramaniam. Y, Cayirci. E, “Wireless sensor networks: a survey”, 2002 Published by Elsevier Science B.V, Computer Networks 38 (2002) pp.392-422. [3] Chen. B, Jamieson. K, Balakrishnan. H, Morris.R (2002), ‘Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks’ Springer, 8(5). [4] Curt Schurgers, Vlasios Tsiatsis, Mani B. Srivastava, “STEM: Topology Management for Energy Efficient Sensor Networks,” IEEEAC paper #260, Updated Sept 24, 2001. [5] IEEE Std 802.11e™-2005 [6] Mo Li, Baijian Yang: ‘A Survey on Topology issues in Wireless Sensor Network’ In Proceedings of ICWN, Las Vegas, Nevada, USA, June 2006, pp.503 - 509.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 210 [7] Miguel A. Labrador and Pedro M. Wightman, ‘Topology Control in Wireless Sensor Networks’, Springer April 2009 [8] Mamun-Or-Rashid. Md, Muhammad Mahbub Alam, Abdur Razzaque. Md, and Choong Seon Hong, ‘Reliable Event Detection and Congestion Avoidance in Wireless Sensor Networks’,HPCC 2007, LNCS 4782, pp521-532, 2007. [9] Rong Yu, Zhi Sun, and Shunliang Mei (2007), ‘Scalable Topology and Energy Management in Wireless Sensor Networks’, in the proceedings of the IEEE WNCA. [10] Wang. C, Li. B, Sohraby. K, Daneshmand. M and Hu. Y, ‘Upstream Congestion Control in Wireless Sensor Networks Through Cross- Layer Optimization’, IEEE Journal On Selected Areas In Communications, Vol. 25, No. 4, May 2007 [11] Xiang-Yang Li, Kousha Moaveni-Nejad, Wen-Zhan Song, Wei-Zhao Wang, ‘Interference-Aware Topology Control for Wireless Sensor Networks’, IEEE SECON 2005 proceedings. [12] Y. Xu, J. Heidemann, D. Estrin, “Geography-informed energy conservation for ad hoc routing,” MobiCom 2001, Rome, Italy, pp. 70-84, July 2001.