This document summarizes and compares various routing metrics that have been proposed for wireless sensor networks. It categorizes the routing metrics into five groups: topology based, signal strength based, active probing based, mobility aware, and energy aware. Topology based metrics like hop count consider only connectivity information without additional measurements. Signal strength and active probing based metrics directly measure link quality through signal strength or probe packets. The document provides detailed descriptions of several popular routing metrics, such as expected transmission time (ETT), medium time metric (MTM), round-trip time (RTT), and packet pair delay. It analyzes the characteristics of different routing metrics and compares their performance.
Energy efficient routing in wireless sensor networksSpandan Spandy
The document summarizes several energy efficient multicast routing protocols for wireless sensor networks. It begins with an introduction to wireless sensor networks and routing challenges. It then summarizes the following protocols: MAODV, TEEN, APTEEN, SPEED, MMSPEED, RPAR, and LEACH. For each protocol, it provides a brief overview of the protocol's design, objectives, components, and how it aims to improve energy efficiency in wireless sensor network routing. The document concludes that providing energy-efficient multicast routing is important for wireless sensor network applications and that the protocols presented aim to achieve lower energy requirements through approaches like clustering, adaptive thresholding, and congestion control.
This document discusses wireless sensor networks and routing protocols for wireless sensor networks. It defines what a wireless sensor network is and its key characteristics. It then discusses objectives like understanding ad hoc network basics and various routing protocols. It covers topics like the differences between WSNs and ad hoc networks, what a network simulator is and reasons for using NS2, various routing techniques like flooding, gossiping, and hierarchical routing. It also discusses routing challenges, wireless nodes, packet transmission, applications and the future scope of WSNs.
The document presents an overview of QoS aware routing protocols for wireless sensor networks. It discusses the EQRS protocol which uses a link cost function and path discovery phase to establish multiple paths between nodes while considering energy efficiency and QoS metrics. It also briefly describes the SAR and DAST protocols, with SAR using a table-driven approach to create multiple paths from sensors to a sink node based on energy resources and packet priority, and DAST utilizing location information and remaining energy to select paths.
Routing protocol on wireless sensor networkshashankcsnits
The document summarizes routing protocols for wireless sensor networks. It first defines wireless sensor networks and describes their key characteristics. It then surveys traditional routing techniques like flooding and gossiping, as well as current techniques including flat routing protocols like SPIN and directed diffusion, hierarchical routing protocols like LEACH and PEGASIS, and location-based routing protocols like GEAR. For each protocol, it provides a brief overview of how it works and compares their advantages and disadvantages. In conclusion, it states that hierarchical routing protocols generally outperform flat routing protocols, and references several papers on sensor network routing.
BeeSensor routing protocol for wireless sensor networkSonam Jain
This document describes a seminar submitted by Sonam Jain for their Master's degree. The seminar focuses on BeeSensor, a routing protocol for wireless sensor networks inspired by bee communication behaviors. It discusses how bees communicate through dances to share information, and how this inspired the design of BeeSensor. The document outlines the key components of BeeSensor, including the different agent roles, protocol phases, and how it evaluates performance metrics like energy efficiency and packet delivery when compared to other routing protocols like AODV.
This document summarizes and compares three clustering algorithms for wireless sensor networks: LEACH, HEED, and PEGASIS. LEACH is the first protocol to use hierarchical routing to increase network lifetime. It forms clusters with local heads that collect data from members and transmit to the base station. HEED uses residual energy and network topology features to select distributed cluster heads. PEGASIS forms chains between sensors so each transmits to a close neighbor, avoiding hotspots. The document analyzes these algorithms and compares their effects on network lifetime.
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyAli Habeeb
This document summarizes several data-centric routing protocols for wireless sensor networks. It begins by outlining the challenges of routing in WSNs, including energy consumption, scalability, addressing, robustness, topology, and application-specific needs. It then describes several data-centric routing protocols, including flooding, directed flooding, constrained flooding, gossiping, fuzzy gossiping, location-based gossiping, and others. It notes advantages and disadvantages of these protocols for efficiently routing data in wireless sensor networks while minimizing energy consumption.
Energy efficient routing in wireless sensor networksSpandan Spandy
The document summarizes several energy efficient multicast routing protocols for wireless sensor networks. It begins with an introduction to wireless sensor networks and routing challenges. It then summarizes the following protocols: MAODV, TEEN, APTEEN, SPEED, MMSPEED, RPAR, and LEACH. For each protocol, it provides a brief overview of the protocol's design, objectives, components, and how it aims to improve energy efficiency in wireless sensor network routing. The document concludes that providing energy-efficient multicast routing is important for wireless sensor network applications and that the protocols presented aim to achieve lower energy requirements through approaches like clustering, adaptive thresholding, and congestion control.
This document discusses wireless sensor networks and routing protocols for wireless sensor networks. It defines what a wireless sensor network is and its key characteristics. It then discusses objectives like understanding ad hoc network basics and various routing protocols. It covers topics like the differences between WSNs and ad hoc networks, what a network simulator is and reasons for using NS2, various routing techniques like flooding, gossiping, and hierarchical routing. It also discusses routing challenges, wireless nodes, packet transmission, applications and the future scope of WSNs.
The document presents an overview of QoS aware routing protocols for wireless sensor networks. It discusses the EQRS protocol which uses a link cost function and path discovery phase to establish multiple paths between nodes while considering energy efficiency and QoS metrics. It also briefly describes the SAR and DAST protocols, with SAR using a table-driven approach to create multiple paths from sensors to a sink node based on energy resources and packet priority, and DAST utilizing location information and remaining energy to select paths.
Routing protocol on wireless sensor networkshashankcsnits
The document summarizes routing protocols for wireless sensor networks. It first defines wireless sensor networks and describes their key characteristics. It then surveys traditional routing techniques like flooding and gossiping, as well as current techniques including flat routing protocols like SPIN and directed diffusion, hierarchical routing protocols like LEACH and PEGASIS, and location-based routing protocols like GEAR. For each protocol, it provides a brief overview of how it works and compares their advantages and disadvantages. In conclusion, it states that hierarchical routing protocols generally outperform flat routing protocols, and references several papers on sensor network routing.
BeeSensor routing protocol for wireless sensor networkSonam Jain
This document describes a seminar submitted by Sonam Jain for their Master's degree. The seminar focuses on BeeSensor, a routing protocol for wireless sensor networks inspired by bee communication behaviors. It discusses how bees communicate through dances to share information, and how this inspired the design of BeeSensor. The document outlines the key components of BeeSensor, including the different agent roles, protocol phases, and how it evaluates performance metrics like energy efficiency and packet delivery when compared to other routing protocols like AODV.
This document summarizes and compares three clustering algorithms for wireless sensor networks: LEACH, HEED, and PEGASIS. LEACH is the first protocol to use hierarchical routing to increase network lifetime. It forms clusters with local heads that collect data from members and transmit to the base station. HEED uses residual energy and network topology features to select distributed cluster heads. PEGASIS forms chains between sensors so each transmits to a close neighbor, avoiding hotspots. The document analyzes these algorithms and compares their effects on network lifetime.
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyAli Habeeb
This document summarizes several data-centric routing protocols for wireless sensor networks. It begins by outlining the challenges of routing in WSNs, including energy consumption, scalability, addressing, robustness, topology, and application-specific needs. It then describes several data-centric routing protocols, including flooding, directed flooding, constrained flooding, gossiping, fuzzy gossiping, location-based gossiping, and others. It notes advantages and disadvantages of these protocols for efficiently routing data in wireless sensor networks while minimizing energy consumption.
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN Sathish Silence
GSTEB is a self-organized tree-based energy-balance routing protocol for wireless sensor networks. It aims to prolong network lifetime by balancing energy consumption across nodes. In GSTEB, the base station selects a root node and broadcasts its ID. Then each node selects its parent in a way that minimizes its distance to the root while balancing energy levels. The network operates in rounds, where a routing tree is constructed and nodes transmit sensed data to the base station along the tree. GSTEB dynamically changes the root node between rounds to further balance energy usage among all nodes. Simulation results show GSTEB outperforms other protocols in balancing energy consumption and extending network lifetime.
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...ijsrd.com
Wireless Sensor Networks (WSNs) is a networks of thousands of inexpensive miniature devices capable of computation, communication and sensing. WSN is being been attracting increasing interest for supporting a new generation of ubiquitous computing systems with great potential for many applications such as surveillance, environmental monitoring, health care monitoring or home automation. In the near future, wireless sensor network is expected to consists of thousand of inexpensive nodes, each having sensing capability with limited computational and communication power which enables to deploy large scale sensor networks. Large scale WSN is usually implemented as a cluster network. Clustering sensors into groups, so that sensors communicate information only to cluster-heads and then the cluster-heads communicate the aggregated information to the base station, saves energy and thus prolongs network lifetime. LEACH (Low Energy Adaptive Clustering Hierarchy) protocol is one of the clustering routing protocols in wireless sensor networks. The advantage of LEACH is that each node has the equal probability to be a cluster head, which makes the energy dissipation of each node be relatively balanced. In LEACH protocol, time is divided into many rounds, in each round, all the nodes contend to be cluster head according to a predefined criterion. This paper focuses on how to set the time length of each round, how to adjust threshold based on the residual energy, and the measurement of energy required for transmission, based on the distance of cluster head from the base station, to prolong the lifetime of the network and increase throughput, which is denoted as the amount of data packs sent to the sink node. The functions of residual energy and required energy, and the time length of each round are deduced, thereby modifying the threshold value calculation. These functions can be used to enhance the performance of cluster-based wireless sensor networks in terms of lifetime and throughput.
The document discusses routing protocols in wireless sensor networks. It outlines several key challenges for routing protocols including node deployment, network dynamics, energy conservation, fault tolerance, scalability, and hardware constraints. It then describes several common routing techniques used in wireless sensor networks, including proactive, reactive, and hybrid path establishment approaches, as well as flat, hierarchical, and location-based network structures. Finally, it discusses different protocol operations such as multipath routing, query-based routing, negotiation-based routing, and supporting quality of service metrics.
This document discusses power aware routing protocols for wireless sensor networks. It begins by describing wireless sensor networks and how they are used to monitor environmental conditions. It then classifies routing protocols for sensor networks based on their functioning, node participation style, and network structure. Specific examples are provided for different types of routing protocols, including LEACH, TEEN, APTEEN, SPIN, Rumor Routing, and PEGASIS. Chain-based and clustering routing protocols are also summarized.
This document presents an energy aware QoS routing protocol for wireless sensor networks. It finds the least-cost path that meets end-to-end delay requirements for real-time data using a queuing model. The protocol calculates link costs and uses a k-least cost path algorithm to find candidate routes. It then determines the optimal path's r-value, which represents the ratio of real-time to non-real-time bandwidth on each link. Simulation results show the protocol can improve QoS metrics like end-to-end delay while increasing network lifetime.
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...IOSR Journals
The document summarizes a proposed spatial correlation-based medium access control protocol for wireless sensor networks that aims to improve energy efficiency. It discusses how sensor nodes are spatially distributed and correlated in detecting events. An iterative node selection algorithm is used to select a minimum set of representative sensor nodes based on a distortion constraint, in order to reduce redundant transmissions. The protocol uses vector quantization to calculate distances between nodes and a mobile element. It then evaluates the performance of using the DSR and AODV routing protocols with this spatial correlation-based MAC protocol in terms of energy consumption and packet drop ratio through simulations. The simulation results show that the protocol with AODV routing performs better than with DSR routing.
The document provides an overview of routing protocols in wireless sensor networks. It discusses several categories of routing protocols including data-centric, hierarchical, and location-based. For hierarchical routing protocols, it summarizes LEACH, PEGASIS, HEED, P-LEACH, H-LEACH, and other variants that aim to improve energy efficiency. It provides brief descriptions of how each protocol operates and highlights drawbacks. The document also summarizes several data-centric routing protocols including Directed Diffusion, Rumor Routing, and their limitations.
This document provides an overview and critical review of routing protocols in wireless sensor networks. It begins with an introduction to wireless sensor networks and their applications. It then discusses several related works on routing protocols. The main body discusses different types of routing protocols, including location-based protocols like MECN and GEAR, hierarchical protocols like LEACH and PEGASIS, and data-centric protocols like SPIN and Directed Diffusion. It provides examples of each type and evaluates them based on factors like energy efficiency, scalability, reliability and more. Finally, it lists references for further reading on routing protocols in wireless sensor networks.
EDEEC and LEACH are clustering protocols for wireless sensor networks. EDEEC is for heterogeneous networks where nodes have different energy levels, while LEACH is for homogeneous networks. The document compares the performance of EDEEC and LEACH in terms of network lifetime, energy consumption, and total data transmission. Simulation results show that EDEEC outperforms LEACH by prolonging network lifetime, reducing energy consumption rate over time, and increasing total data transmitted to the base station.
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor NetworkIRJET Journal
This document discusses the PEGASIS routing protocol for wireless sensor networks. It begins with an abstract that introduces PEGASIS as an energy-efficient chain-based hierarchical protocol. It then provides background on wireless sensor networks and discusses challenges like energy efficiency and network lifetime. It explains how PEGASIS forms chains between sensor nodes so that each node only communicates with nearby neighbors, extending network lifetime. The document compares PEGASIS to LEACH, finding that PEGASIS provides more balanced energy distribution and longer network lifetime. It then outlines the PEGASIS algorithm and discusses potential improvements like minimizing delay. Simulation results show PEGASIS increases network efficiency and lifespan over LEACH. The conclusion is that
Routing protocols in wireless sensor networks face several unique challenges compared to other wireless networks. The document discusses these challenges and provides an overview of common routing protocol approaches in WSNs, including flat routing protocols like SPIN and Directed Diffusion, hierarchical routing protocols like LEACH, and location-based routing protocols. It also covers routing design issues specific to WSNs such as energy efficiency, data delivery models, fault tolerance, and quality of service.
Performance Analysis of Routing Protocols of Wireless Sensor NetworksDarpan Dekivadiya
The document summarizes different types of routing protocols that can be used in wireless sensor networks. It categorizes the protocols based on their mode of functioning, participation style of nodes, and network structure. Some key routing protocols discussed include LEACH, which is a proactive clustering protocol, SPIN that uses direct communication, and TEEN which is a reactive clustering protocol. The document also discusses challenges in routing for wireless sensor networks given the constraints of sensor nodes.
The document discusses wireless sensor networks and energy-efficient routing. It introduces WSNs and outlines their typical energy consumption from transmission, reception, and sensing. It describes deterministic and random deployment strategies and their impact on energy use. The document then examines WSN routing protocols and strategies, including flooding, interest-based, and location-based. It analyzes hierarchical protocols like LEACH and DECSA, noting how DECSA improves on LEACH by considering distance and residual energy to better balance energy consumption and prolong network lifetime.
Routing protocols for wireless sensor networks face several unique challenges compared to other wireless networks. This document discusses routing challenges in wireless sensor networks and provides an overview of different routing protocol approaches, including flat routing, hierarchical routing, location-based routing, and QoS-based routing. It specifically describes two flat routing protocols: directed diffusion, which uses data negotiation and aggregation to reduce energy costs, and SPIN, which employs data description messages to avoid redundant transmissions through negotiation between sensor nodes.
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star TopologyIRJET Journal
This document presents a fault tolerant approach to increase the lifetime of wireless sensor networks using a star topology. It proposes using a gradient diffusion algorithm and fault node recovery algorithm to minimize packet loss and broadcast delay. The fault node recovery algorithm identifies non-functioning sensor nodes using a genetic algorithm and replaces them to extend the network lifetime. Simulation results show the approach increases active nodes by 8-10 times, reduces data loss by 98%, and decreases energy consumption by 27-32% compared to other algorithms. This is achieved by reusing sensor nodes and routing paths to prolong the usability of the wireless sensor network.
A survey of real-time routing protocols For wireless sensor networksijcses
This document summarizes a survey of real-time routing protocols for wireless sensor networks. It discusses several existing real-time routing protocols, including AODV, DSR, RAP, SPEED, and MMSPEED. For each protocol, it describes the key mechanisms, advantages, and disadvantages. It focuses on factors like end-to-end delay, energy consumption, mobility, scalability, and challenges for future research in real-time routing protocols for wireless sensor networks. The document provides a comparative analysis of the protocols to highlight their strengths and weaknesses in meeting the demands of real-time applications.
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkAM Publications
This paper gives performance of LEACH protocol. LEACH is the first network protocol that uses hierarchical
routing for wireless sensor networks to increase the life time of network. All the nodes in a network organize themselves into
local clusters, with one node acting as the cluster-head. All non-cluster-head nodes transmit their data to the cluster-head,
while the cluster-head node receive data from all the cluster members, perform signal processing functions on the data (e.g.,
data aggregation), and transmit data to the remote base station. Therefore, being a cluster-head node is much more energyintensive
than being a non-cluster-head node. Thus, when a cluster-head node dies all the nodes that belong to the cluster lose
communication ability. This paper gives performance of LEACH protocol considering parameters i) Packet Delivery Ratio ii)
Throughput iii) Delay iv) lifetime.
Energy efficient routing_in_wireless_sensor_networksGr Patel
This document summarizes two energy efficient routing protocols for wireless sensor networks: MAODV and TEEN.
MAODV is an on-demand multicast routing protocol that maintains routing entries only for destinations currently in use. It uses route requests and replies to establish paths within a multicast group. TEEN is a hierarchical protocol that uses hard and soft thresholds to reduce transmissions. Cluster heads broadcast the thresholds and nodes transmit data only when the sensed value exceeds the thresholds. Both protocols aim to reduce energy use through techniques like on-demand routing and limiting unnecessary transmissions.
Directed diffusion for wireless sensor networkingHabibur Rahman
This document summarizes the key ideas of the "Directed Diffusion for Wireless Sensor Networking" paper. It introduces directed diffusion as a data-centric paradigm for wireless sensor networks that is designed for robustness, scalability, and energy efficiency. The core concepts of directed diffusion are interests, data, gradients, and reinforcement, which work together to efficiently route queries to sensor data in the network. Through localized interactions and data aggregation, directed diffusion is shown to significantly reduce energy consumption compared to flooding-based approaches in wireless sensor networks.
Crack in component if undetected may lead to catastrophic failure of the component. The
cracked rotor problem received the first attention in 1970 and after that the interest among the
researchers started. The vibration behavior of cracked structures, in particular cracked rotors, is
important to study as the introduction of the crack alters the vibration characteristics of the structure.
The problem of damage and crack detection in structural components has acquired important role in past
few years. However, cracked rotor studies are mainly deals with single crack. For multiple cracked
structures the problem of crack sizing and location becomes more complex. Only few authors have
pointed out the multiple crack assessment in the rotor. The proposed work is on vibration analysis of
multiple cracked shaft beam. An Euler Bernoulli beam fixed at one end with two transverse cracks is
considered. The vibration characteristics of the shaft are studied using Experimental Modal Analysis and
Finite Element Analysis. The mode shapes and natural frequencies of the beams are studied and their
variation with change in position and depth of the crack is also studied. The study shows good agreement
of the results obtained using Finite Element Analysis and Experimental Modal Analysis.
Michael and his angels fought against Satan and his angels in heaven, casting Satan and his followers out of heaven down to earth. Satan had been in a high position in heaven as a cherub that covered God's throne room, but was found to be in sin. His sin involved peddling some kind of "merchandise" that filled heaven with violence. This caused a war in heaven where Michael and his angels defeated Satan and his followers, casting them out. Approximately one-third of the angels in heaven followed Satan.
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN Sathish Silence
GSTEB is a self-organized tree-based energy-balance routing protocol for wireless sensor networks. It aims to prolong network lifetime by balancing energy consumption across nodes. In GSTEB, the base station selects a root node and broadcasts its ID. Then each node selects its parent in a way that minimizes its distance to the root while balancing energy levels. The network operates in rounds, where a routing tree is constructed and nodes transmit sensed data to the base station along the tree. GSTEB dynamically changes the root node between rounds to further balance energy usage among all nodes. Simulation results show GSTEB outperforms other protocols in balancing energy consumption and extending network lifetime.
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...ijsrd.com
Wireless Sensor Networks (WSNs) is a networks of thousands of inexpensive miniature devices capable of computation, communication and sensing. WSN is being been attracting increasing interest for supporting a new generation of ubiquitous computing systems with great potential for many applications such as surveillance, environmental monitoring, health care monitoring or home automation. In the near future, wireless sensor network is expected to consists of thousand of inexpensive nodes, each having sensing capability with limited computational and communication power which enables to deploy large scale sensor networks. Large scale WSN is usually implemented as a cluster network. Clustering sensors into groups, so that sensors communicate information only to cluster-heads and then the cluster-heads communicate the aggregated information to the base station, saves energy and thus prolongs network lifetime. LEACH (Low Energy Adaptive Clustering Hierarchy) protocol is one of the clustering routing protocols in wireless sensor networks. The advantage of LEACH is that each node has the equal probability to be a cluster head, which makes the energy dissipation of each node be relatively balanced. In LEACH protocol, time is divided into many rounds, in each round, all the nodes contend to be cluster head according to a predefined criterion. This paper focuses on how to set the time length of each round, how to adjust threshold based on the residual energy, and the measurement of energy required for transmission, based on the distance of cluster head from the base station, to prolong the lifetime of the network and increase throughput, which is denoted as the amount of data packs sent to the sink node. The functions of residual energy and required energy, and the time length of each round are deduced, thereby modifying the threshold value calculation. These functions can be used to enhance the performance of cluster-based wireless sensor networks in terms of lifetime and throughput.
The document discusses routing protocols in wireless sensor networks. It outlines several key challenges for routing protocols including node deployment, network dynamics, energy conservation, fault tolerance, scalability, and hardware constraints. It then describes several common routing techniques used in wireless sensor networks, including proactive, reactive, and hybrid path establishment approaches, as well as flat, hierarchical, and location-based network structures. Finally, it discusses different protocol operations such as multipath routing, query-based routing, negotiation-based routing, and supporting quality of service metrics.
This document discusses power aware routing protocols for wireless sensor networks. It begins by describing wireless sensor networks and how they are used to monitor environmental conditions. It then classifies routing protocols for sensor networks based on their functioning, node participation style, and network structure. Specific examples are provided for different types of routing protocols, including LEACH, TEEN, APTEEN, SPIN, Rumor Routing, and PEGASIS. Chain-based and clustering routing protocols are also summarized.
This document presents an energy aware QoS routing protocol for wireless sensor networks. It finds the least-cost path that meets end-to-end delay requirements for real-time data using a queuing model. The protocol calculates link costs and uses a k-least cost path algorithm to find candidate routes. It then determines the optimal path's r-value, which represents the ratio of real-time to non-real-time bandwidth on each link. Simulation results show the protocol can improve QoS metrics like end-to-end delay while increasing network lifetime.
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...IOSR Journals
The document summarizes a proposed spatial correlation-based medium access control protocol for wireless sensor networks that aims to improve energy efficiency. It discusses how sensor nodes are spatially distributed and correlated in detecting events. An iterative node selection algorithm is used to select a minimum set of representative sensor nodes based on a distortion constraint, in order to reduce redundant transmissions. The protocol uses vector quantization to calculate distances between nodes and a mobile element. It then evaluates the performance of using the DSR and AODV routing protocols with this spatial correlation-based MAC protocol in terms of energy consumption and packet drop ratio through simulations. The simulation results show that the protocol with AODV routing performs better than with DSR routing.
The document provides an overview of routing protocols in wireless sensor networks. It discusses several categories of routing protocols including data-centric, hierarchical, and location-based. For hierarchical routing protocols, it summarizes LEACH, PEGASIS, HEED, P-LEACH, H-LEACH, and other variants that aim to improve energy efficiency. It provides brief descriptions of how each protocol operates and highlights drawbacks. The document also summarizes several data-centric routing protocols including Directed Diffusion, Rumor Routing, and their limitations.
This document provides an overview and critical review of routing protocols in wireless sensor networks. It begins with an introduction to wireless sensor networks and their applications. It then discusses several related works on routing protocols. The main body discusses different types of routing protocols, including location-based protocols like MECN and GEAR, hierarchical protocols like LEACH and PEGASIS, and data-centric protocols like SPIN and Directed Diffusion. It provides examples of each type and evaluates them based on factors like energy efficiency, scalability, reliability and more. Finally, it lists references for further reading on routing protocols in wireless sensor networks.
EDEEC and LEACH are clustering protocols for wireless sensor networks. EDEEC is for heterogeneous networks where nodes have different energy levels, while LEACH is for homogeneous networks. The document compares the performance of EDEEC and LEACH in terms of network lifetime, energy consumption, and total data transmission. Simulation results show that EDEEC outperforms LEACH by prolonging network lifetime, reducing energy consumption rate over time, and increasing total data transmitted to the base station.
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor NetworkIRJET Journal
This document discusses the PEGASIS routing protocol for wireless sensor networks. It begins with an abstract that introduces PEGASIS as an energy-efficient chain-based hierarchical protocol. It then provides background on wireless sensor networks and discusses challenges like energy efficiency and network lifetime. It explains how PEGASIS forms chains between sensor nodes so that each node only communicates with nearby neighbors, extending network lifetime. The document compares PEGASIS to LEACH, finding that PEGASIS provides more balanced energy distribution and longer network lifetime. It then outlines the PEGASIS algorithm and discusses potential improvements like minimizing delay. Simulation results show PEGASIS increases network efficiency and lifespan over LEACH. The conclusion is that
Routing protocols in wireless sensor networks face several unique challenges compared to other wireless networks. The document discusses these challenges and provides an overview of common routing protocol approaches in WSNs, including flat routing protocols like SPIN and Directed Diffusion, hierarchical routing protocols like LEACH, and location-based routing protocols. It also covers routing design issues specific to WSNs such as energy efficiency, data delivery models, fault tolerance, and quality of service.
Performance Analysis of Routing Protocols of Wireless Sensor NetworksDarpan Dekivadiya
The document summarizes different types of routing protocols that can be used in wireless sensor networks. It categorizes the protocols based on their mode of functioning, participation style of nodes, and network structure. Some key routing protocols discussed include LEACH, which is a proactive clustering protocol, SPIN that uses direct communication, and TEEN which is a reactive clustering protocol. The document also discusses challenges in routing for wireless sensor networks given the constraints of sensor nodes.
The document discusses wireless sensor networks and energy-efficient routing. It introduces WSNs and outlines their typical energy consumption from transmission, reception, and sensing. It describes deterministic and random deployment strategies and their impact on energy use. The document then examines WSN routing protocols and strategies, including flooding, interest-based, and location-based. It analyzes hierarchical protocols like LEACH and DECSA, noting how DECSA improves on LEACH by considering distance and residual energy to better balance energy consumption and prolong network lifetime.
Routing protocols for wireless sensor networks face several unique challenges compared to other wireless networks. This document discusses routing challenges in wireless sensor networks and provides an overview of different routing protocol approaches, including flat routing, hierarchical routing, location-based routing, and QoS-based routing. It specifically describes two flat routing protocols: directed diffusion, which uses data negotiation and aggregation to reduce energy costs, and SPIN, which employs data description messages to avoid redundant transmissions through negotiation between sensor nodes.
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star TopologyIRJET Journal
This document presents a fault tolerant approach to increase the lifetime of wireless sensor networks using a star topology. It proposes using a gradient diffusion algorithm and fault node recovery algorithm to minimize packet loss and broadcast delay. The fault node recovery algorithm identifies non-functioning sensor nodes using a genetic algorithm and replaces them to extend the network lifetime. Simulation results show the approach increases active nodes by 8-10 times, reduces data loss by 98%, and decreases energy consumption by 27-32% compared to other algorithms. This is achieved by reusing sensor nodes and routing paths to prolong the usability of the wireless sensor network.
A survey of real-time routing protocols For wireless sensor networksijcses
This document summarizes a survey of real-time routing protocols for wireless sensor networks. It discusses several existing real-time routing protocols, including AODV, DSR, RAP, SPEED, and MMSPEED. For each protocol, it describes the key mechanisms, advantages, and disadvantages. It focuses on factors like end-to-end delay, energy consumption, mobility, scalability, and challenges for future research in real-time routing protocols for wireless sensor networks. The document provides a comparative analysis of the protocols to highlight their strengths and weaknesses in meeting the demands of real-time applications.
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkAM Publications
This paper gives performance of LEACH protocol. LEACH is the first network protocol that uses hierarchical
routing for wireless sensor networks to increase the life time of network. All the nodes in a network organize themselves into
local clusters, with one node acting as the cluster-head. All non-cluster-head nodes transmit their data to the cluster-head,
while the cluster-head node receive data from all the cluster members, perform signal processing functions on the data (e.g.,
data aggregation), and transmit data to the remote base station. Therefore, being a cluster-head node is much more energyintensive
than being a non-cluster-head node. Thus, when a cluster-head node dies all the nodes that belong to the cluster lose
communication ability. This paper gives performance of LEACH protocol considering parameters i) Packet Delivery Ratio ii)
Throughput iii) Delay iv) lifetime.
Energy efficient routing_in_wireless_sensor_networksGr Patel
This document summarizes two energy efficient routing protocols for wireless sensor networks: MAODV and TEEN.
MAODV is an on-demand multicast routing protocol that maintains routing entries only for destinations currently in use. It uses route requests and replies to establish paths within a multicast group. TEEN is a hierarchical protocol that uses hard and soft thresholds to reduce transmissions. Cluster heads broadcast the thresholds and nodes transmit data only when the sensed value exceeds the thresholds. Both protocols aim to reduce energy use through techniques like on-demand routing and limiting unnecessary transmissions.
Directed diffusion for wireless sensor networkingHabibur Rahman
This document summarizes the key ideas of the "Directed Diffusion for Wireless Sensor Networking" paper. It introduces directed diffusion as a data-centric paradigm for wireless sensor networks that is designed for robustness, scalability, and energy efficiency. The core concepts of directed diffusion are interests, data, gradients, and reinforcement, which work together to efficiently route queries to sensor data in the network. Through localized interactions and data aggregation, directed diffusion is shown to significantly reduce energy consumption compared to flooding-based approaches in wireless sensor networks.
Crack in component if undetected may lead to catastrophic failure of the component. The
cracked rotor problem received the first attention in 1970 and after that the interest among the
researchers started. The vibration behavior of cracked structures, in particular cracked rotors, is
important to study as the introduction of the crack alters the vibration characteristics of the structure.
The problem of damage and crack detection in structural components has acquired important role in past
few years. However, cracked rotor studies are mainly deals with single crack. For multiple cracked
structures the problem of crack sizing and location becomes more complex. Only few authors have
pointed out the multiple crack assessment in the rotor. The proposed work is on vibration analysis of
multiple cracked shaft beam. An Euler Bernoulli beam fixed at one end with two transverse cracks is
considered. The vibration characteristics of the shaft are studied using Experimental Modal Analysis and
Finite Element Analysis. The mode shapes and natural frequencies of the beams are studied and their
variation with change in position and depth of the crack is also studied. The study shows good agreement
of the results obtained using Finite Element Analysis and Experimental Modal Analysis.
Michael and his angels fought against Satan and his angels in heaven, casting Satan and his followers out of heaven down to earth. Satan had been in a high position in heaven as a cherub that covered God's throne room, but was found to be in sin. His sin involved peddling some kind of "merchandise" that filled heaven with violence. This caused a war in heaven where Michael and his angels defeated Satan and his followers, casting them out. Approximately one-third of the angels in heaven followed Satan.
Exploring the Potentials of blacksmithing for Rural Industrialization in Bau...IJMER
Nigeria like any other developing country is being faced by a number of developmental
challenges, such as social, economic and technological. The country is blessed with numerous resource
potentials one of which is the human resource, where in 1996 it was estimated to have a population of
nearly 170 million people. This abundant human resource could effectively be harnessed for the
technological advancement of the country through the utilization of indigenous technologies for the
adaptation and imitation of technologies of advanced countries. This paper presents the status of
indigenous technology and the role of blacksmithing on technological development in Bauchi State. The
paper explores the available skills of the existing blacksmiths of Bauchi State for rural
industrialization. Results show that production of agricultural tools is more prominent in the Northern
zone of the state, while the Southern zone specializes in the production of industrial tools. It is
recommended that if the enabling environment is provided this human resource potential could be
adopted for rural industrialization through the establishment of specialized small scale industries for
the production of high quality tools and products for use in various sectors of the economy. This will
provide employment opportunities for the people of the state as well as contributing to industrial
development of Nigeria.
An Eavesdropping Model for Securing Communications over Wireless Broadcast Ne...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
This document discusses innovative techniques for teaching English in the digital age. It covers several techniques including blogs, social networking, wikis, massively multiplayer online games, and mobile phone assisted language learning. The key techniques allow for collaboration outside the classroom, interaction and communication in English, project-based learning, and accessibility of language lessons through mobile devices. Overall, the document advocates for English teachers to adopt these new digital techniques to engage students and meet the demands of a changing era.
Analysis and Performance evaluation of Traditional and Hierarchal Sensor NetworkIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
The document discusses deconstructing a scene from the television show Hollyoaks to better understand the storylines of the show. Deconstructing the scene allowed the person to analyze how the scene contributed to ongoing plots and character development in a more detailed manner than just watching.
Detection of Duplicate Address in Mobile Adhoc Networks for On Demand Routing...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Effect of Molybdenum Disulphide on Physical Properties of Neodymium-Iron-Boro...IJMER
The present paper reports the effect of molybdenum disulfide (MoS2) on magnetic and
mechanical properties of neodymium iron boron (NdFeB) bonded magnet. Powder metallurgy process
has been used to prepare the test samples containing 0.0, 0.5, 1, 1.5 and 2 percentage of MoS2. Compact
and hardness tests have been performed to measure the physical properties of samples. Saturation
magnetization, remanence and intrinsic coercivity have been checked using vibrating sample
measurement (VSM) test
Impact of the Hydrographic Changing in the Open Drains Cross Sections on the ...IJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
The document summarizes key points from Daniel 8 regarding a vision about a ram and goat and the meaning of the 2300 day prophecy. It notes that:
1) The vision deals with four great world powers across many years, not days.
2) The 2300 days represents 2300 years, pointing to the time of Jesus' return for the cleansing of the heavenly sanctuary.
3) The abomination of desolation refers to the establishment of the papal system taking away the continual intercessory work of Jesus, which would continue until the cleansing of the sanctuary at Jesus' return.
Simcoe website presentation version 2 dec 16Miles McDonald
Simcoe Renewable Energy is a Canadian company that secures investment for solar energy projects including microgrids and utility-scale solar plants. The document outlines Simcoe's microgrid project for the Simcoe area, which would provide reliable solar-generated electricity. Key benefits of the microgrid include no upfront capital costs, an established price per kWh, reliability independent of the wider electricity grid, and energy cost savings of 20% compared to current costs. Simcoe handles project development, financing, construction, and long-term operation and maintenance through a power purchase agreement with the client.
The determination of this paper is to introduce two new spaces , namely 𝑆𝑔
∗
-compact and 𝑆𝑔
∗
-
connected spaces. Additionally some properties of these spaces are investigated.
Mathematics Subject Classification: 54A05
An Experimental Investigation of Capacity Utilization in Manufacturing Indus...IJMER
In the modern day competitive world, every organization demands an effective utilization of
capacity. Capacity Utilization means the maximum amount of output that can be produced in the short run of time. A lot of planning is necessary for the proper management of capacity. Capacity planning is one side of a coin and capacity management is the other. The capacity plans needs to be executed flawlessly, with unpleasant surprises avoided. A managerial problem is to match the capacity with the plans. Companies whether labour or machine intensive have a CI trend that remains fairly constant in
that particular sector. For example a company will have a monthly cumulative CI trend that could be compared with any other company trend within the same market. The present paper makes an attempt to study the most important parameter of the organization i.e capacity utilization of a company
The document describes various photos that were rejected for use in ancillary materials like front covers and billboards. The photos were rejected for reasons such as subjects having the wrong facial expressions, poor focus, visible equipment, hair obstructing faces, shadows obscuring faces, subjects too far apart or not looking at the camera. Explaining why each photo did not meet professional standards for the intended use.
An Enhance PSO Based Approach for Solving Economical Ordered Quantity (EOQ) P...IJMER
The Meta-heuristic approaches can provide a sufficiently good solution to an
optimization problem, especially with incomplete or imperfect information and with lower
computational complexity especially for numerical solutions. This paper presents an enhanced PSO
(Particle Swarm Optimization) technique for solving the same problem. Through the PSO performs well
but it may require some more iteration to converge or sometimes many repetitions for the complex
problems. To overcome these problems an enhanced PSO is presented which utilizes the PSO with
double chaotic maps to perform irregular velocity updates which forces the particles to search greater
space for best global solution. Finally the comparison between both algorithms is performed for the
EOQ problem considering deteriorating items, shortages and partially backlogging. The simulation
results shows that the proposed enhanced PSO converges quickly and found much closer solution then
PSO.
The document discusses the key elements of the everlasting gospel and the three phases of the first angel's message from Revelation 14:6-7. It explains that the everlasting gospel highlights salvation through Jesus alone, and must be brought back to its pure form. It also summarizes that the first angel's message includes: 1) a worldwide proclamation of the pure gospel, 2) a warning that the judgment hour has begun, and 3) a call to worship the Creator of the heavens, earth, and sea - pointing to the seventh-day Sabbath. The pure gospel and this three-phase message are described as restoring true Christianity and preparing people for Christ's return.
This document presents a study on designing a model-based controller for two interacting conical tank level systems. The system is highly nonlinear. It first develops mathematical models for the system using mass and energy balance equations. The nonlinear system is linearized around four operating regions. An internal model controller is designed for each region using the process models. Simulation results in MATLAB Simulink show that the internal model controller is able to maintain the liquid levels at the set points and reject disturbances effectively for all four regions of operation. The controller provides good performance without oscillation or slow settling times.
A Survey of User Authentication Schemes for Mobile DeviceIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
A review of Hierarchical energy Protocols in Wireless Sensor Networkiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document provides an overview of hierarchical energy protocols in wireless sensor networks. It discusses several key protocols including LEACH, PEGASIS, TEEN, and APTEEN. LEACH is described as a clustered-based protocol that randomly selects cluster heads to help distribute the energy load. PEGASIS is presented as an improvement on LEACH that forms chains between sensor nodes to help reduce energy usage. TEEN is a reactive protocol designed for time-critical applications, using hard and soft thresholds to reduce transmissions. Finally, APTEEN is summarized as an extension of TEEN that aims to support both periodic data collection and responding to important events.
A Fault Tolerant Approach To Enhances WSN Lifetime In Star TopologyIRJET Journal
This document summarizes a research paper that proposes a fault-tolerant approach to increase the lifetime of wireless sensor networks using a star topology. It applies a Gradient Diffusion algorithm and Fault Node Recovery algorithm to identify and replace non-functioning sensor nodes. The Fault Node Recovery algorithm uses a genetic algorithm to determine the sequence of non-operating nodes and parameter thresholds. Simulation results showed the approach could increase the number of active nodes by 8-9 times, reduce data loss by up to 98%, and lower energy consumption by around 32%.
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET Journal
This document summarizes research on improving energy efficiency and security in wireless sensor networks (WSNs). It discusses how WSNs have limitations like limited battery power, bandwidth, and storage in sensor nodes. Several energy efficient techniques and secure communication methods are described that aim to extend the lifetime of WSNs. This includes clustering protocols to select energy-efficient cluster heads, optimized multi-hop transmission to reduce energy consumption, and integrating routing and MAC protocols using techniques like honey bee optimization to further improve energy efficiency and security of data transmission in WSNs. The goal of these approaches is to minimize energy usage and maximize the reliable operation of resource-constrained WSNs.
Energy Enhancement by Selecting Optimal Routing Path from Source to sink Node...ijiert bestjournal
WSNs are used for collecting limitations have to be taken into account when desi gning e nergy dissipation significantly methods namely A- star algorithm and fuzzy approach for WSN routing path from the source to the destination,by considering the battery power,number of hops,and traffic load for extend lifetime improves by employing the optimized routing protocol lifetime.
The document discusses energy efficient routing protocols for clustered wireless sensor networks. It provides an overview of wireless sensor networks and discusses how clustering is commonly used to improve energy efficiency and scalability. The document reviews several existing clustering-based routing protocols and analyzes their approaches for prolonging network lifetime by minimizing energy consumption in wireless sensor networks.
This document summarizes a research paper that evaluates the performance of two routing protocols, AODV and DSR, in wireless sensor networks. The paper analyzes the protocols based on two metrics: media access delay and network load. Through simulations with 20 nodes in OPNET, the paper finds that DSR has lower network load for mobile and stationary nodes, while AODV has lower media access delay for mobile nodes and initially for stationary nodes. Overall, the superior protocol depends on the scenario and performance metric considered.
In wireless sensor network energy cutback is considered as a principle intensive challenge which is studied largely in the Wireless Sensor Networks (WSN) literature. Wireless Sensor Networks (WSNs) are pertinent in numerous arenas where WSNs may be used for sensing, ciphering, and communication elements that give a user or administrator the ability to instrument, observe, and retort to events and phenomena in a specific environment. But sensor devices are resource curbed, positioned in an open and unattended environment, different types of attacks and conventional techniques against these attacks are not desirable due to the resource constrained nature of these kinds of networks. An energy-balanced routing method based on forward-aware factor (FAF-EBRM) in which the next-hop node is elected according to the awareness of link weight and forward energy density. FAF-EBRM is compared with Ladder Diffusion Algorithm, which balances the energy utilization, sustain the function era and guarantees high QoS of WSN. The FAF-EBRM is proposed with Secure Routing Layer (SRL) Protocol which ensures that the secure data transmission is achieved without releasing private sensor readings and without introducing significant overhead on the battery-limited sensors.
International journal of computer science and innovation vol 2015-n1-paper5sophiabelthome
This document provides an overview of multicast routing protocols for wireless sensor networks. It first discusses the basic components and characteristics of wireless sensor networks. It then reviews several existing multicast routing protocols, comparing their approaches, advantages, and disadvantages. Finally, it analyzes the protocols based on different parameters to identify challenges that need to be addressed for each protocol.
The development of the wireless sensor networks (WSNs) in various applications like Defense, Health,
Environment monitoring, Industry etc. always attract many researchers in this field. WSN is the network
which consists of collection of tiny devices called sensor nodes. Sensor node typically combines wireless
radio transmitter-receiver and limited energy, restricted computational processing capacity and
communication band width. These sensor node sense some physical phenomenon using different
transduces. The current improvement in sensor technology has made possible WSNs that have wide and
varied applications. While selecting the right sensor for application a number of characteristics are
important. This paper provides the basics of WSNs including the node characteristics. It also throws light
on the different routing protocols.
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...IOSRJECE
WSNs represents one of the most interesting research areas with deep impact on technological development because of their potential usage in a wide variety of applications such as fire monitoring, border surveillance medical care, and highway traffic coordination. Therefore, WSNs researchers have defined many routing protocols for this type of network. In this paper, we have implemented and analyzed different clustering protocols, namely LEACH, LEACH-C, LEACH-1R, and HEED using MATLAB environment. These routing protocols are compared in different terms such as residual energy, data delivery to the base station, number of rounds and live nodes
This document discusses techniques for data dissemination and caching in wireless sensor networks. It aims to reduce energy consumption by minimizing unnecessary data transmission through cooperative caching. Sensor nodes can store data in their local cache or use nearby nodes' caches through cooperative caching. One node close to the sink is selected as the Immediate Dissemination Node to cache data, while other nodes along the path act as dissemination nodes. By caching data closer to the sink, this approach reduces network traffic and prolongs the battery life of sensor nodes. The paper also reviews several routing protocols and discusses how data negotiation, change expectancy, and discarding duplicate data can further improve energy efficiency in wireless sensor networks.
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...IRJET Journal
This document analyzes the performance of energy efficient cross-layer load balancing in tactical multi-gateway wireless sensor networks. It compares the performance of AODV routing under four different modes: Normal, Optimal, Compressed, and Optimal Compressed. The Optimal Compressed mode uses both load balancing and data compression (Run Length Encoding) and performs best with the lowest delay, highest energy fairness, lowest packet loss rate, and lowest routing overhead according to simulations run in NS2. The proposed approach of using both load balancing and compression outperforms using either technique alone or without them, improving important network metrics like lifetime.
A Survey of Routing Protocols for Structural Health MonitoringIJEEE
Wireless sensor networks have emerged in recent years as a promising technology that can impact the field of structural monitoring and infrastructure asset management. Various routing protocols are used to define communication among sensor nodes of the wireless sensor network for purpose of disseminating information. These routing protocols can be designed to improve the network performance in terms of energy consumption, delay and security issues. This paper discusses the requirements of routing protocol for Structural health monitoring and presents summary of various routing protocols used for WSNs for Structural health monitoring.
This document summarizes and compares several routing protocols for wireless sensor networks. It begins with an introduction to wireless sensor networks and discusses some of the key challenges in routing for these networks, such as large numbers of sensor nodes, energy constraints, and random node deployment. The document then categorizes routing protocols as flat-based, hierarchical-based, or location-based and focuses on reviewing various dynamic and static hierarchical/clustering-based routing protocols. Several popular protocols are described in detail, including LEACH, EECS, PEGASIS, and EEPSC. The pros and cons of each approach are discussed.
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
A wireless sensor network is composed of many sensor nodes, that have beengiven out in a
specific zoneandeach of them hadanability of collecting information from the environment and
sending collected data to the sink. The most significant issues in wireless sensor networks,
despite the recent progress is the trouble of the severe limitations of energy resources.Since that
in different applications of sensor nets, we could throw a static or mobile sink, then all aspects of
such networks should be planned with an awareness of energy.One of the most significant topics
related to these networks, is routing. One of the most widely used and efficient methods of
routing isa hierarchy (based on clustering) method.
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
The document summarizes an algorithm proposed to reduce energy consumption in wireless sensor networks using duty cycling and multi-hop routing. The key aspects of the algorithm are:
1) Layering the network environment based on size and identifying the optimal number of cluster heads in each layer.
2) Selecting the first layer closest to the sink as the "gateway layer" and stopping energy usage in half of these sensors to extend the network lifespan.
3) Using multi-hop routing whereby cluster heads send data to heads in the above layer until the gateway layer, which then sends to the static or mobile sink.
4) Simulation results showed the proposed algorithm performs better than LEACH and ELEACH in terms of
Scheduling different types of packets, such as
real-time and non-real-time data packets, at sensor nodes with
resource constraints in Wireless Sensor Networks (WSN) is of
vital importance to reduce sensors’ energy consumptions and endto-end
data transmission delays. Most of the existing packetscheduling
mechanisms of WSN use First Come First Served
(FCFS), non pre-emptive priority and pre-emptive priority
scheduling algorithms. These algorithms incur a high processing
overhead and long end-to-end data transmission delay due to the
FCFS concept, starvation of high priority real-time data packets
due to the transmission of a large data packet in non pre-emptive
priority scheduling, starvation of non-real-time data packets due
to the probable continuous arrival of real-time data in preemptive
priority scheduling, and improper allocation of data
packets to queues in multilevel queue scheduling algorithms.
Moreover, these algorithms are not dynamic to the changing
requirements of WSN applications since their scheduling policies
are predetermined.
In the Advanced Multilevel Priority packet scheduling
scheme, each node except those at the last level has three levels of
priority queues. According to the priority of the packet and
availability of the queue, node will schedule the packet for
transmission. Due to separated queue availability, packet
transmission delay is reduced. Due to reduction in packet
transmission delay, node can goes into sleep mode as soon as
possible. And Expired packets are deleted at the particular node
at itself before reaching the base station, so that processing
burden on the node is reduced. Thus, energy of the node is saved.
Similar to Performance Analysis of Routing Metrics for Wireless Sensor Networks (20)
A Study on Translucent Concrete Product and Its Properties by Using Optical F...IJMER
- Translucent concrete is a concrete based material with light-transferring properties,
obtained due to embedded light optical elements like Optical fibers used in concrete. Light is conducted
through the concrete from one end to the other. This results into a certain light pattern on the other
surface, depending on the fiber structure. Optical fibers transmit light so effectively that there is
virtually no loss of light conducted through the fibers. This paper deals with the modeling of such
translucent or transparent concrete blocks and panel and their usage and also the advantages it brings
in the field. The main purpose is to use sunlight as a light source to reduce the power consumption of
illumination and to use the optical fiber to sense the stress of structures and also use this concrete as an
architectural purpose of the building
Developing Cost Effective Automation for Cotton Seed DelintingIJMER
A low cost automation system for removal of lint from cottonseed is to be designed and
developed. The setup consists of stainless steel drum with stirrer in which cottonseeds having lint is mixed
with concentrated sulphuric acid. So lint will get burn. This lint free cottonseed treated with lime water to
neutralize acidic nature. After water washing this cottonseeds are used for agriculter purpose
Study & Testing Of Bio-Composite Material Based On Munja FibreIJMER
The incorporation of natural fibres such as munja fiber composites has gained
increasing applications both in many areas of Engineering and Technology. The aim of this study is to
evaluate mechanical properties such as flexural and tensile properties of reinforced epoxy composites.
This is mainly due to their applicable benefits as they are light weight and offer low cost compared to
synthetic fibre composites. Munja fibres recently have been a substitute material in many weight-critical
applications in areas such as aerospace, automotive and other high demanding industrial sectors. In
this study, natural munja fibre composites and munja/fibreglass hybrid composites were fabricated by a
combination of hand lay-up and cold-press methods. A new variety in munja fibre is the present work
the main aim of the work is to extract the neat fibre and is characterized for its flexural characteristics.
The composites are fabricated by reinforcing untreated and treated fibre and are tested for their
mechanical, properties strictly as per ASTM procedures.
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)IJMER
Hybrid engine is a combination of Stirling engine, IC engine and Electric motor. All these 3 are
connected together to a single shaft. The power source of the Stirling engine will be a Solar Panel. The aim of
this is to run the automobile using a Hybrid engine
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...IJMER
This document summarizes research on the fabrication and characterization of bio-composite materials using sunnhemp fibre. The document discusses how sunnhemp fibre was used to reinforce an epoxy matrix through hand lay-up methods. Various mechanical properties of the bio-composites were tested, including tensile, flexural, and impact properties. The results of the mechanical tests on the bio-composite specimens are presented. Potential applications of the sunnhemp fibre bio-composites are also suggested, such as in fall ceilings, partitions, packaging, automotive interiors, and toys.
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...IJMER
The Greenstone belts of Karnataka are enriched in BIFs in Dharwar craton, where Iron
formations are confined to the basin shelf, clearly separated from the deeper-water iron formation that
accumulated at the basin margin and flanking the marine basin. Geochemical data procured in terms of
major, trace and REE are plotted in various diagrams to interpret the genesis of BIFs. Al2O3, Fe2O3 (T),
TiO2, CaO, and SiO2 abundances and ratios show a wide variation. Ni, Co, Zr, Sc, V, Rb, Sr, U, Th,
ΣREE, La, Ce and Eu anomalies and their binary relationships indicate that wherever the terrigenous
component has increased, the concentration of elements of felsic such as Zr and Hf has gone up. Elevated
concentrations of Ni, Co and Sc are contributed by chlorite and other components characteristic of basic
volcanic debris. The data suggest that these formations were generated by chemical and clastic
sedimentary processes on a shallow shelf. During transgression, chemical precipitation took place at the
sediment-water interface, whereas at the time of regression. Iron ore formed with sedimentary structures
and textures in Kammatturu area, in a setting where the water column was oxygenated.
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...IJMER
In this paper, the mechanical characteristics of C45 medium carbon steel are investigated
under various working conditions. The main characteristic to be studied on this paper is impact toughness
of the material with different configurations and the experiment were carried out on charpy impact testing
equipment. This study reveals the ability of the material to absorb energy up to failure for various
specimen configurations under different heat treated conditions and the corresponding results were
compared with the analysis outcome
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...IJMER
Robot guns are being increasingly employed in automotive manufacturing to replace
risky jobs and also to increase productivity. Using a single robot for a single operation proves to be
expensive. Hence for cost optimization, multiple guns are mounted on a single robot and multiple
operations are performed. Robot Gun structure is an efficient way in which multiple welds can be done
simultaneously. However mounting several weld guns on a single structure induces a variety of
dynamic loads, especially during movement of the robot arm as it maneuvers to reach the weld
locations. The primary idea employed in this paper, is to model those dynamic loads as equivalent G
force loads in FEA. This approach will be on the conservative side, and will be saving time and
subsequently cost efficient. The approach of the paper is towards creating a standard operating
procedure when it comes to analysis of such structures, with emphasis on deploying various technical
aspects of FEA such as Non Linear Geometry, Multipoint Constraint Contact Algorithm, Multizone
meshing .
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationIJMER
This paper aims to do modelling, simulation and performing the static analysis of a go
kart chassis consisting of Circular beams. Modelling, simulations and analysis are performed using 3-D
modelling software i.e. Solid Works and ANSYS according to the rulebook provided by Indian Society of
New Era Engineers (ISNEE) for National Go Kart Championship (NGKC-14).The maximum deflection is
determined by performing static analysis. Computed results are then compared to analytical calculation,
where it is found that the location of maximum deflection agrees well with theoretical approximation but
varies on magnitude aspect.
In récent year various vehicle introduced in market but due to limitation in
carbon émission and BS Séries limitd speed availability vehicle in the market and causing of
environnent pollution over few year There is need to decrease dependancy on fuel vehicle.
bicycle is to be modified for optional in the future To implement new technique using change in
pedal assembly and variable speed gearbox such as planetary gear optimise speed of vehicle
with variable speed ratio.To increase the efficiency of bicycle for confortable drive and to
reduce torque appli éd on bicycle. we introduced epicyclic gear box in which transmission done
throgh Chain Drive (i.e. Sprocket )to rear wheel with help of Epicyclical gear Box to give
number of différent Speed during driving.To reduce torque requirent in the cycle with change in
the pedal mechanism
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIJMER
This document discusses integrating the Spring, Struts, and Hibernate frameworks to develop enterprise applications. It provides an overview of each framework and their features. The Spring Framework is a lightweight, modular framework that allows for inversion of control and aspect-oriented programming. It can be used to develop any or all tiers of an application. The document proposes an architecture for an e-commerce website that integrates these three frameworks, with Spring handling the business layer, Struts the presentation layer, and Hibernate the data access layer. This modular approach allows for clear separation of concerns and reduces complexity in application development.
Microcontroller Based Automatic Sprinkler Irrigation SystemIJMER
Microcontroller based Automatic Sprinkler System is a new concept of using
intelligence power of embedded technology in the sprinkler irrigation work. Designed system replaces
the conventional manual work involved in sprinkler irrigation to automatic process. Using this system a
farmer is protected against adverse inhuman weather conditions, tedious work of changing over of
sprinkler water pipe lines & risk of accident due to high pressure in the water pipe line. Overall
sprinkler irrigation work is transformed in to a comfortableautomatic work. This system provides
flexibility & accuracy in respect of time set for the operation of a sprinkler water pipe lines. In present
work the author has designed and developed an automatic sprinkler irrigation system which is
controlled and monitored by a microcontroller interfaced with solenoid valves.
On some locally closed sets and spaces in Ideal Topological SpacesIJMER
This document introduces and studies the concept of δˆ s-locally closed sets in ideal topological spaces. Some key points:
- A subset A is δˆ s-locally closed if A can be written as the intersection of a δˆ s-open set and a δˆ s-closed set.
- Various properties of δˆ s-locally closed sets are introduced and characterized, including relationships to other concepts like generalized locally closed sets.
- It is shown that a subset A is δˆ s-locally closed if and only if A can be written as the intersection of a δˆ s-open set and the δˆ s-closure of A.
- Theore
Intrusion Detection and Forensics based on decision tree and Association rule...IJMER
This paper present an approach based on the combination of, two techniques using
decision tree and Association rule mining for Probe attack detection. This approach proves to be
better than the traditional approach of generating rules for fuzzy expert system by clustering methods.
Association rule mining for selecting the best attributes together and decision tree for identifying the
best parameters together to create the rules for fuzzy expert system. After that rules for fuzzy expert
system are generated using association rule mining and decision trees. Decision trees is generated for
dataset and to find the basic parameters for creating the membership functions of fuzzy inference
system. Membership functions are generated for the probe attack. Based on these rules we have
created the fuzzy inference system that is used as an input to neuro-fuzzy system. Fuzzy inference
system is loaded to neuro-fuzzy toolbox as an input and the final ANFIS structure is generated for
outcome of neuro-fuzzy approach. The experiments and evaluations of the proposed method were
done with NSL-KDD intrusion detection dataset. As the experimental results, the proposed approach
based on the combination of, two techniques using decision tree and Association rule mining
efficiently detected probe attacks. Experimental results shows better results for detecting intrusions as
compared to others existing methods
Natural Language Ambiguity and its Effect on Machine LearningIJMER
This document discusses natural language ambiguity and its effect on machine learning. It begins by introducing different types of ambiguity that exist in natural languages, including lexical, syntactic, semantic, discourse, and pragmatic ambiguities. It then examines how these ambiguities present challenges for computational linguistics and machine translation systems. Specifically, it notes that ambiguity is a major problem for computers in processing human language as they lack the world knowledge and context that humans use to resolve ambiguities. The document concludes by outlining the typical process of machine translation and how ambiguities can interfere with tasks like analysis, transfer, and generation of text in the target language.
Today in era of software industry there is no perfect software framework available for
analysis and software development. Currently there are enormous number of software development
process exists which can be implemented to stabilize the process of developing a software system. But no
perfect system is recognized till yet which can help software developers for opting of best software
development process. This paper present the framework of skillful system combined with Likert scale. With
the help of Likert scale we define a rule based model and delegate some mass score to every process and
develop one tool name as MuxSet which will help the software developers to select an appropriate
development process that may enhance the probability of system success.
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersIJMER
The present study investigates the creep in a thick-walled composite cylinders made
up of aluminum/aluminum alloy matrix and reinforced with silicon carbide particles. The distribution
of SiCp is assumed to be either uniform or decreasing linearly from the inner to the outer radius of
the cylinder. The creep behavior of the cylinder has been described by threshold stress based creep
law with a stress exponent of 5. The composite cylinders are subjected to internal pressure which is
applied gradually and steady state condition of stress is assumed. The creep parameters required to
be used in creep law, are extracted by conducting regression analysis on the available experimental
results. The mathematical models have been developed to describe steady state creep in the composite
cylinder by using von-Mises criterion. Regression analysis is used to obtain the creep parameters
required in the study. The basic equilibrium equation of the cylinder and other constitutive equations
have been solved to obtain creep stresses in the cylinder. The effect of varying particle size, particle
content and temperature on the stresses in the composite cylinder has been analyzed. The study
revealed that the stress distributions in the cylinder do not vary significantly for various combinations
of particle size, particle content and operating temperature except for slight variation observed for
varying particle content. Functionally Graded Materials (FGMs) emerged and led to the development
of superior heat resistant materials.
Energy Audit is the systematic process for finding out the energy conservation
opportunities in industrial processes. The project carried out studies on various energy conservation
measures application in areas like lighting, motors, compressors, transformer, ventilation system etc.
In this investigation, studied the technical aspects of the various measures along with its cost benefit
analysis.
Investigation found that major areas of energy conservation are-
1. Energy efficient lighting schemes.
2. Use of electronic ballast instead of copper ballast.
3. Use of wind ventilators for ventilation.
4. Use of VFD for compressor.
5. Transparent roofing sheets to reduce energy consumption.
So Energy Audit is the only perfect & analyzed way of meeting the Industrial Energy Conservation.
An Implementation of I2C Slave Interface using Verilog HDLIJMER
This document describes the implementation of an I2C slave interface using Verilog HDL. It introduces the I2C protocol which uses only two bidirectional lines (SDA and SCL) for communication. The document discusses the I2C protocol specifications including start/stop conditions, addressing, read/write operations, and acknowledgements. It then provides details on designing an I2C slave module in Verilog that responds to commands from an I2C master and allows synchronization through clock stretching. The module is simulated in ModelSim and synthesized in Xilinx. Simulation waveforms demonstrate successful read and write operations to the slave device.
Discrete Model of Two Predators competing for One PreyIJMER
This paper investigates the dynamical behavior of a discrete model of one prey two
predator systems. The equilibrium points and their stability are analyzed. Time series plots are obtained
for different sets of parameter values. Also bifurcation diagrams are plotted to show dynamical behavior
of the system in selected range of growth parameter
Discrete Model of Two Predators competing for One Prey
Performance Analysis of Routing Metrics for Wireless Sensor Networks
1. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.6, Nov-Dec. 2012 pp-4128-4132 ISSN: 2249-6645
Performance Analysis of Routing Metrics for Wireless Sensor Networks
Eswar Rao. K, 1 K Naresh Kumar2
(Assistant professor, Aditya Institute of Technology and Management, Andhra Pradesh, India)
ABSTRACT: A wireless sensor network is a trivially based on simply flooding the entire network.
heterogeneous network consisting of a large number of tiny However, more elaborate routing algorithms are essential
low-cost nodes and one or more base stations. Each sensor for the applicability of such wireless networks, since energy
node comprises sensing, processing, transmission, mobilize, has to be conserved in low powered devices and wireless
position finding system, and power units. These networks communication always leads to increased energy
can use in various applications like military, health and consumption.
commercial. Routing in wireless sensor networks has been The rest of the paper is organized as section 2:
an active area of research for many years. Sensor nodes discuss about various routing metrics, section 3: presents a
have a limited transmission range, processing, storage comparison of routing metrics, section 4: concludes the
capabilities and energy resources are also limited. In paper.
wireless sensor networks data is forwarded using multi-hop
mechanism. Therefore, a variety of routing metrics has II. ROUTING METRICS
been proposed by various authors in wireless sensor The existing routing metrics are classified into five
networks for providing routing algorithms with high categories based on their operation. Topology based, Signal
flexibility in the selection of best path and offering a strength based, Active probing based, Mobility aware and
compromise between throughput, end-to-end delay, and Energy aware metrics.
energy consumption. In this paper, we present a detailed
survey about existing routing metrics in wireless sensor 1.1. Topology Based
networks. The routing metrics are also compared based on In this technique the topological information of the
their essential characteristics and tabulated. network will be considered i,e. the number of neighbors of
each node, number of hops and/or paths towards a
Keywords: WCETT, ETT, ETX, Hopcount, RTT, MIC particular destination. The metrics always consider
connectivity information which is available locally by the
I. INTRODUCTION routing protocol, without requiring additional passive or
A wireless sensor network (WSN) is a active measurements. The topology-based metrics do not
heterogeneous network consisting of a large number of tiny take into account several variables that have an impact on
low-cost nodes (devices) and one or more base stations both the network and application performance, such as the
(sinks). Main purpose of the WSN is to monitor some transmit rates of the links are popular due to their
physical phenomena (e.g., temperature, barometric simplicity.
pressure, light) inside an area of deployment. Nodes are
equipped with radio transceiver, processing unit, battery Hop count
and sensor(s). Nodes are constrained in processing power In this metric, every link counts as one equal unit
and energy, whereas the base stations are not severely independent of the quality or other characteristics of the
energy resources. The base station act as gateways between link and very simple technique. The ease of implementation
the WSN and other networks such as Internet etc.. The has made hop count the most widely used metric in wired
WSN is used in various applications like military, health networks and it is the default metric in many wireless
and commercial. They provide simple and cheap sensor networks routing protocols, such as OLSR [2], DSR
mechanism for monitoring in the specified area. WSNs are [3], DSDV [4] and AODV [5]. Fewer hops on the data path
frequently deployed to collect sensitive information. WSN produce smaller delay, whether these involve network links
can be used to monitor the movements of traffic in a city. or buffers or computational power. The implicit assumption
Such a network can be used to determine location is the existence of error-free links. On the contrary, links in
of people or vehicles [1]. WSNs can be classified according wireless sensor networks cannot be assumed error-free.
to several aspects with impact on the security protocol
design. One such aspect is the mobility of nodes and the 1.2. Signal Strength Based Metrics
base station. The nodes can be mobile or placed on static Signal strength metric has been used as link
positions. The same holds true for the base station. Another quality metrics in several routing protocols for wireless
consideration is the way the nodes are placed. The nodes sensor networks. The signal strength can be viewed as a
can be deployed manually on specific locations following good indicator for measuring link quality since a packet can
some predefined network topology or randomly deployed in be transferred successfully when the signal strength is more
an area, e.g., by dropping from a plane. The number of than the threshold value.
nodes is also a very important factor number of nodes in a
network can range from tens to tens of thousands. Because 1.3. Active Probing Based Metrics
of limited transmission range, communication between any To overcome the drawbacks of topology based
two devices requires collaborating intermediate forwarding metrics various authors have proposed active probing
network nodes, i.e. devices act as routers to forward the metrics to carry out active measurements and use probe
data. Communication between any two nodes may be packets to directly estimate those probabilities. Probing
www.ijmer.com 4128 | Page
2. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.6, Nov-Dec. 2012 pp-4128-4132 ISSN: 2249-6645
technique had various challenges such as packet sizes of Expected Transmission Time (ETT) metric incorporating
probes in the network should be equal to the data so that the throughput into its calculation. Let S be the size of the
what probes measure is as close to the target as possible and probing packet and B the measured bandwidth of a link,
probe packets should not give any priority in the network. then the ETT of this link is defined as
The probing based metrics have proved promising in the
context of wireless sensor networks. They measure directly
the quantity of interest, rather than inferring it from indirect
measurements, and do not rely on analytical assumptions. Awerbuch [8] proposed Medium Time Metric (MTM)
based on overhead, reliability of the link and size of the
Per-hop Round Trip Time (RTT) packet.
The per-hop Round-Trip Time (RTT) metric is
based on the bidirectional delay on a link [6]. In order to
measure the RTT, a probe packet is sent periodically to
each neighboring node with time stamp. Then each
neighbor node returns the probe immediately. This probe
response enables the sending node to calculate the RTT
Where overhead is defined as per-packet overhead
value. The path RTT metric is the summation of all links
of the link that includes control frames, back-off, and fixed
RTT in the route. The RTT metric is dependent on the
headers and reliability is denoted as the fraction of packets
network traffic. Since it comprises queuing, channel
delivered successfully over the link.
contention, as well as 802.11 MAC retransmission delays.
As wireless sensor networks provide multiple non-
overlapping channels, they propose an adaptation of the
Per-hop packet pair delay (PktPair)
ETT metric accounting for the use of multiple channels,
This delay technique is designed to overcome the
namely the Weighted Cumulative ETT (WCETT). Let k be
problem of distortion of RTT measurements due to queuing
the total number of channels of a system, the sum of
delays and it consists periodic transmission of two probe
transmission times over all nodes on channel j is defined as:
packets with different sizes back-to-back from each node.
The neighbor node calculates the inter-probe arrival delay
and reports it back to the sender. This metric is less
susceptible to self-interference than the RTT metric, but it As total path throughput will be dominated by the
is not completely immune, as probe packets in multi-hop bottleneck channel, they propose to use a weighted average
scenario contend for the wireless channel with data packets. between the maximum value and the sum of all ETTs.
Both the RTT and PktPair metrics measure delay directly,
hence they are load-dependent and prone to the self-
interference phenomenon. Moreover, the measurement
overhead they introduce is O(n 2), where n is the number of The main disadvantage of the WCETT metric is that it is
nodes. not immediately clear if there is an algorithm that can
compute the path with the lowest weight in polynomial or
Expected Transmission Count (ETX) less time.
To overcome drawbacks of RTT and PktPair
techniques, authors proposed Expected Transmission Count Metric of Interference and Channel switching (MIC)
(ETX) metric which is first routing metric based on active The Metric of Interference and Channel switching (MIC)
probing measurements designed for wireless sensor [9] considers intra-flow and inter-flow interference
networks. ETX estimates the number of transmissions problem. The MIC metric of a path p is defined
required to send a packet over a link. Minimizing the
number of transmissions optimize the overall throughput
and energy consumption. Let df is the expected forward
delivery ratio and dr is the reverse delivery ratio, Assuming
that each attempt to transmit a packet is statistically where N is the total number of nodes in the network and
independent from the precedent attempt, each transmission min(ETT) is the smallest ETT in the network, which can be
attempt can be considered a Bernoulli trial and the number estimated based on the lowest transmission rate of the
of attempts till the packet is successfully received a wireless cards. The two components of MIC, Interference-
Geometric variable, the expected number of transmissions aware Re-source Usage (IRU) and Channel Switching Cost
is defined as (CSC) are defined as:
Expected Transmission Time (ETT), Medium Time Metric
(MTM), and Weighted Cumulative Expected
Transmission Time (WCETT) Multi-Channel Routing Metric (MCR)
Draves [7] presented the drawbacks of ETX Kyasanur and Vaidya [10] extend WCETT by
technique such as it prefers heavily congested links to considering the cost of changing channels. Let
unloaded links, if the link-layer loss rate of congested links InterfaceUsage(i) be the fraction of time a switchable
is smaller than on the unloaded links. Later he proposed the
www.ijmer.com 4129 | Page
3. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.6, Nov-Dec. 2012 pp-4128-4132 ISSN: 2249-6645
interface spends on transmitting on channel i and let pi(j)be estimated as a function of the associativity ticks over all
the probability t used interface is on a different channel links along the route
when we want to send a packet on channel j. If we assume
that the total of the current interface idle time can
potentially be used on channel j, we can estimate as ps(j)
Link affinity and path stability
The affinity of a link is related to the received power over
that link, its rate of change and a threshold, determining
Let SwitchingDelay denote the switching latency of an
whether the link is broken or not. Each node calculates the
interface. Then, the cost of using channel j is measured as
strength of the signal received over periodically. The signal
strength change rate as the average rate of signal strength
In order to prevent frequent channel switching of the change as
chosen paths, a switching cost is included into the ETT
metric, so that the resulting MCR metric becomes
The link affinity is determined by
Modified ETX (mETX) and effective number of
transmissions (ENT)
Koksal and Balakrishnan [11] considered the accuracy of The affinity between two nodes A and B is then given by
loss estimator function. In certain conditions such
as links with low average loss rate but high variability, the The route stability is then given by the minimum of the
estimation capacity of the mean statistic is poor. They affinities of all links lying in the route
propose two alternative statistics for the estimation of
required number of transmissions over a link.
The route is selected as long as the estimated value for its
Modified ETX (mETX), is defined as stability exceeds the required time to transfer data, whose
estimate equals the time required to transmit data over the
link capacity C.
where μ is the estimated average packet loss ratio of a link
and the variance of this value. Like ETX, mETX is additive Mobility-model driven metrics
over concatenated links. Mcdonald and Znati [14] proposed mobility-model
driven metric, which defines a probabilistic measure of the
Effective Number of Transmissions (ENT), is defined as availability of links that are subject to link failures caused
by node mobility. Each node is characterized by statistical
distribution of the mean, variance of the speed of a node
The δ acts as an additional degree of freedom with respect and average interval time. Gerharz et al. [15] and Jiang et
to mETX and the value of δ depends on the number of al. [16] proposed metric based on the estimation of average
subsequent retransmissions, which will cause the link layer residual lifetime of a link. However, the weak link in all
protocol to give up a transmission attempt. these studies is the assumption that all nodes have similar
mobility characteristics which is not acceptable in wireless
1.4. Mobility-Aware Metrics sensor networks.
Mobility-aware metrics selects routes with higher
expected life-time to minimize the routing overhead related 1.5. Energy-Aware Metrics
to route changes and their impact on throughput. The Energy consumption is an important constraint in
metrics largely use signal strength measurements and their wireless sensor networks. Sensors have restricted battery
rate of variation to infer the stability of links and routes. lifetime and are most vulnerable to the energy constraints.
The path average degree of association stability, as In some cases, choosing paths so that the overall delay is
proposed in the context of associativity based routing minimized may result in overuse of certain nodes in the
(ABR) and the affinity metric defined in [12] and reused network and premature exhaustion of their battery.
by the Route-Lifetime Assessment Based Routing (RABR) Therefore, energy concerns have to be properly reflected in
protocol in [13]. the definition of routing metrics. The total energy
consumed when sending and receiving a packet is
Link associativity ticks and path average degree of influenced by various factors such as the wireless radio
association stability propagation environment, interference from simultaneous
Sensor nodes transmit beacon packets at fixed time transmissions, MAC protocol operation, and routing
intervals and calculate the received number of probs from algorithm. The aim objective of energy aware metrics is to
their neighbors. These values serve as indicators of the minimize overall energy consumption and to maximize the
actual stability of the link. Low values of associativity ticks time until the first node runs out of energy.
imply mobile nodes in high mobility state, whereas high
associativity ticks, beyond some threshold value thrA, are Minimal Total Power routing (MTPR)
obtained when a mobile node is more stable. The average K. Scott [17] proposed Minimal Total Power
degree of association stability over route R, AaveR, is Routing metric MTPR to minimize the overall energy
www.ijmer.com 4130 | Page
4. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.6, Nov-Dec. 2012 pp-4128-4132 ISSN: 2249-6645
consumption. Later Singh [18] formalize this idea. Let ei,j Maximal residual energy path routing (MREP)
denote the energy consumed for transferring a packet from Chang and Tassiulas [22] proposed Maximum
node i to the neighboring node j. Then, if the packet has to Residual Energy Path (MREP) link metric based on the
traverse the path p, including nodes n1…..nk, the total remaining battery capacity and the necessary transmission
energy E required for the packet transfer is energy. Let ei,j be the energy consumed to send one packet
over the link from node i to node j, Ej the initial battery
energy and E‟j the residual energy at node j. Chang and
Tassiulas define two metrics for the link i to j. The
Minimum battery cost routing (MBCR)
remaining energy of a node di,j, defined as
In this metric the battery capacity of a node is
taken into consideration to balance the energy consumption
over all nodes in a network. The “Minimum Battery Cost
and the inverse of the residual capacity of a node in terms
Routing” (MBCR) [18] is based on the remaining battery
of packets that can be delivered with the remaining energy
capacity of the node. The ratio of battery capacity Rbrc is
defined as
2. Comparison of Routing Metrics
Under the assumption that all nodes have the same battery The various metrics are compared based on important
full capacity, a cost value fi(Ei) is assigned to each node n i parameters and tabulated below table 1.
based on its residual battery capacity E i
Table 1: comparison of routing metrics
Metrics Optimization Metric Path
Then the total available battery lifetime along a path p is the Objectives Computation Metric
sum of the battery capacities of all nodes along the route Method Function
Topology Minimize Use of locally Summation
based delay available
Out of the full set P of possible paths, the one selected p’ information
features minimum total residual battery capacity Signal Higher Use of locally Based on
strength expected available routing
The aim drawback of MBCR is that the selected route may based route life time information algorithm
well feature individual nodes with small remaining battery Active Minimize Active Summation
capacity. probing delay probing
based Minimize
Min-Max Battery Cost Routing (MMBCR) probability of
The Min-Max Battery Cost Routing (MMBCR) data delivery
metric [19] addresses the drawbacks of MCBR metric in Mobility Higher Active Based on
avoiding nodes with very low residual battery capacity aware expected probing the routing
along paths with high overall battery capacity. The idea is route lifetime Metrics algorithm
to select a path, which minimizes the maximum power piggybacked
required at any node in a network. The MMCBR the chosen to route
path must p‟ fulfill discovery
packets
Energy Minimize Use of locally Summation
aware energy available
Conditional max-min battery capacity routing consumption information
(CMMBCR)
Toh [20] combines the MTPR and MMBCR into III. CONCLUSION
one single hybrid routing metric called Conditional Max- A wireless sensor network is a heterogeneous network
Min Battery Capacity Routing (CMMBCR) metric. It consisting of a large number of tiny low-cost nodes and one
searches paths using MTPR, with the restriction that all or more base stations. These networks can use in various
nodes need to have a remaining percentage battery capacity applications like military, health and commercial. Routing
that exceeds a threshold value γ. If there is no such path in wireless sensor networks has been an active area of
then MMBCR is used. research for many years. Sensor nodes have a limited
Later Kim [21] compares MTPR, MMBCR and transmission range, processing, storage capabilities and
CMMBCR. He presented the overhearing transmissions of energy resources are also limited. In this paper, we
some neighboring nodes have a significant impact on the presented a detailed survey about existing routing metrics in
performance of each metric and all behave similarly. In wireless sensor networks. The routing metrics are also
dense networks MTPR allows connections to live longer, compared based on their essential characteristics and
whereas in sparse networks it is more important to avoid tabulated. As sensor nodes have limited battery capability
network partition hence MMBCR performs better. energy aware routing metrics are useful.
www.ijmer.com 4131 | Page
5. International Journal of Modern Engineering Research (IJMER)
www.ijmer.com Vol.2, Issue.6, Nov-Dec. 2012 pp-4128-4132 ISSN: 2249-6645
REFERENCES
[1] M. Gruteser, G. Schelle, A. Jain, R. Han, and [12] K. Paul, S. Bandyipadhyay, A. Mukherjee, and D.
Grunwald , Privacy-aware location sensor networks, Saha. Communication-aware mo-bile hosts in ad-
2003 hoc wireless network. IEEE ICPWC ‟99. Jaipur,
[2] T. Clausen and P. Jacquet. Optimized link state India, February 1999.
routing protocol (OLSR). IETF RFC 3626, October [13] A. Agarwal, A. Ajuja, J.P. singh, and R. Shorey,
2003; http://www.ietf.org/rfc/rfc3626.txt. Route-lifetime based routing (RABR) protocol for
[3] D. Johnson and D. Maltz. Dynamic source routing in mobile ad-hoc networks. IEEE ICC 2000, New
ad hoc wireless networks. In T. Imielinski and H. Orleans, LA, United States, June 2000.
Korth, editors, Mobile Computing, Dordrecht, The [14] A. Mcdonald and T. Znati. A path availability model
Netherlands, 1996. Kluwer Academic Publishers. for wireless ad-hoc networks. In Proceedings of the
[4] C. Perkins and P. Bhagwat. Highly dynamic IEEE Wireless Communications and Networking
destination-sequenced distance-vector routing (dsdv) Conference, 1998.
for mobile computers. In Proceedings of SIGCOMM, [15] M. Gerharz, C. de Waal, M. Frank, and P. Martini.
October 1994. Link stability in mobile wireless ad hoc networks. In
[5] C.E. Perkins and E.M. Royer. Ad hoc on-demand Proceedings of the 27th Annual IEEE Conference on
distance vector routing. In Proceed-ings of the 2nd Local Computer Network, November 2002.
IEEE Workshop on Mobile Computing Systems and [16] S. Jiang, D. He, and J. Rao. A prediction-based link
Applications, pp. 90–100, New Orleans, LA, February availability estimation for mobile ad hoc networks.
1999. Proceedings of INFOCOM „01, 2001.
[6] A. Adya, P. Bahl, J. Padhye, A. Wolman, and L. [17] K. Scott and N. Bambos. Routing and channel
Zhou. A multi-radio unification pro-tocol for IEEE assignment for low power transmission in PCS. In
802.11 wireless networks. In Proceedings of ICUPC ‟96, vol. 2, pp. 498–502, 1996
Broadnets ‟04, pp. 344 – 354, 2004 [18] J-P. Sheu, C-T. Hu, and C-M. Chao. The Handbook of
[7] R. Draves, J. Padhye, and B. Zill. Routing in multi- Ad Hoc Wireless Networks, Chapter Energy-
radio, multi-hop wireless mesh networks. In Conserving Grid Routing Protocol in Mobile Ad Hoc
Proceedings of MOBICOM ‟04, New York, NY, Networks. RCR Press LLC, 2003.
USA, pp. 114–128, 2004. [19] S. Singh, M. Woo, and C. Raghavendra. Power-aware
[8] B. Awerbuch, D. Holmer, and R. Rubens. The routing in mobile ad hoc net-works. In The Fourth
Medium Time Metric: High throughput route Annual ACM/IEEE International Conference on
selection in multi-rate ad hoc wireless networks. Mobile Com-puting and Networking, pp. 181–190,
Springer Mobile Networks and Applications, vol. 11, 1998.
no. 2, pp. 253-266, April 2006. [20] C.-K. Toh. Maximum battery life routing to support
[9] Y. Yang, J. Wang, and R. Kravets, Designing routing ubiquitous mobile computing in wireless ad hoc
metrics for mesh networks, Proc. WiMesh, 2005. networks. IEEE Communications Magazine, pages 2–
[10] P. Kyasanur and N.H. Vaidya. Routing and link-layer 11, June 2001.
protocols for multi-channel multi-interface ad [21] D. Kim, J. Garcia-Luna-Aceves, K. Obraczka, J.
hoc wireless networks. SIGMOBILE Mob. Comput. Cano, and P. Manzoni. Performance analysis of
Commun., January 2006. power-aware route selection protocols in mobile ad
[11] C. E. Koksal and H. Balakrishnan. Quality aware hoc networks. Proc. IEEE Networks 2002, Atlanta,
routing in time-varying wireless networks. in IEEE GA, USA, August 2002
Journal on Selected Areas of Communication Special [22] J. Chang and L. Tassiulas. Maximum lifetime routing
Issue on Multi-Hop Wireless Mesh Networks, in wireless sensor networks. In Proceedings of 37th
November 2006. Annual Allerton Conference on Communication,
Control, and Computing, Monticello, IL, September
1999 .
www.ijmer.com 4132 | Page