SlideShare a Scribd company logo
1 of 7
Download to read offline
Bulletin of Electrical Engineering and Informatics
ISSN: 2302-9285
Vol. 6, No. 1, March 2017, pp. 81~87, DOI: 10.11591/eei.v6i1.577  81
Received November 7, 2016; Revised January 7, 2017; Accepted January 21, 2017
Data Flow in Wireless Sensor Network Protocol Stack
by using Bellman-Ford Routing Algorithm
Rakesh Kumar Saini
1*
, Ritika
2
, Sandip Vijay
3
1, 2
Department of Computer Science and Application, DIT University, Dehradun
Uttrakhand, India
3
Department of Electronics and Communication, ICFAI University, Dehradun
Uttrakhand, India
*Corresponding author, e-mail: rk.saini@dituniversity.edu.in
1*
, hod.mca@dituniversity.edu.in
2
,
vijaysandip@gmail.com
3
Abstract
Wireless sensor network consists various sensor nodes that are used to monitor any target area
like forest fire detection by our army person and monitoring any industrial activity by industry manager.
Wireless sensor networks have been deployed in several cities to monitor the concentration of dangerous
gases for citizens. In wireless sensor network when sensor nodes communicate from each other then
routing protocol are used for communication between protocol layers. Wireless sensor network protocol
stack consist five layers such as Application layer, Transport layer, Network layer, MAC Layer, Physical
layer. In this paper we study and analysis Bellman-Ford routing algorithm and check the flow of data
between these protocol layers. For simulation purpose we are using Qualnet 5.0.2 simulator tool.
Keywords: sensor nodes, wireless sensor network, Bellman-Ford routing algorithm, Qualnet 5.0.2
1. Introduction
A Wireless sensor network has many sensor nodes that are interconnected by wireless
communication channels. Sensor node is a small device that is used to monitor the physical and
environmental condition such as temperature, sound and any movement in the sensing field.
Sensor node senses the data and sends to nearest sensor node and all sensor nodes
cooperately pass their data to the base station via internet or satellite. Nowadays wireless
sensor networks are popular and their applications are used by our military for environment
monitoring. Wireless sensor networks are used for other purpose like home security, earthquake
warning. Despite the infinite scopes of wireless sensor networks, they are limited by the node
battery lifetime. Once they are deployed, the network can keep operating while the battery
power is adequate. This is critical point to be considered as it is almost impossible to replace the
node battery once deployed over an inaccessible area. Such constraints combined with a typical
deployment of large number of sensor nodes, have posed many challenges to the design and
management of sensor networks and necessitate energy-awareness at all layers of networking
protocol stack [1-2]. The main task of a sensor node in a sensor field is to detect events,
perform quick local data processing, and then transmit the data. Power consumption can hence
be divided into three domains: sensing, communication, and data processing.
In this paper we study and analysis Bellman-Ford routing algorithm and check the flow
of data between Wireless sensor network protocols stack layers.
2. Wireless Sensor Network
A wireless sensor network consists distributed autonomous sensors nodes that are
used to monitor physical or environmental conditions, such as temperature, sound, vibration,
pressure and to cooperatively pass their data to the base station [2-3]. The more modern
networks are bi-directional, also enabling control of sensor activity. The development of wireless
sensor networks was motivated by military applications such as battlefield surveillance; today
such networks are used in many industrial and consumer applications, such as industrial
process monitoring and control machine health monitoring, and so on. The WSN is built of
 ISSN: 2089-3191
Bulletin of EEI Vol. 6, No. 1, March 2017 : 81 – 87
82
"nodes" – from a few to several hundreds or even thousands, where each node is connected to
one (or sometimes several) sensors. Each such sensor network node has typically several
parts: a radio transceiver with an internal antenna or connection to an external antenna, a
microcontroller, an electronic circuit for interfacing with the sensors and an energy source,
usually a battery or an embedded form of energy harvesting. A sensor node might vary in size
from that of a shoebox down to the size of a grain of dust, although functioning "motes"(demo
video) of genuine microscopic dimensions have yet to be created. The cost of sensor nodes is
similarly variable, ranging from hundreds of dollars to a few pennies, depending on the
complexity of the individual sensor nodes. Size and cost constraints on sensor nodes result in
corresponding constraints on resources such as energy, memory, computational speed and
communications bandwidth. The topology of the WSNs can vary from a simple star network to
an advanced multi-hop network. The wireless sensor node, being a microelectronic device, can
only be equipped with a limited power source (< 0.5 Ah, 1.2 V). In some application scenarios,
replenishment of power resources might be impossible [5]. Sensor node lifetime, therefore,
shows a strong dependence on battery lifetime. In a multihop ad hoc sensor network, each
node plays the dual role of data originator and data router. The malfunctioning of a few nodes
can cause significant topological changes and might require rerouting of packets and
reorganization of the network. Hence, power conservation and power management take on
additional importance [4-5]. It is for these reasons that researchers are currently focusing on the
design of power-aware protocols and algorithms for sensor networks. In Wireless Sensor
network, all sensor nodes move from one location to another location [7]. In this paper we
analyze Bellman-Ford routing algorithm and check the data flow between protocol layers [9].
3. Protocol Stack of WSN
Wireless sensor network protocol stack has five layers such as Application layer,
Transport layer, Network layer, MAC Layer, Physical layer [10-11].The Wireless sensor network
protocol stack used by base station and sensor nodes as mentioned in Figure 1 (Wireless
Sensor Network Protocol Stack). WSNs Protocol Stack combines energy of sensor nodes and
routing awareness, integrates packets with networking protocols, communicates energy
efficiently through the wireless medium, and promotes cooperative efforts of sensor nodes.
Wireless sensor network protocol stack is modification of OSI (Open system interconnection). It
is used for wireless network. In wireless sensor network when sensor nodes cooperately pass
their data to the base station then this protocol stack works for exchanging or passing
information from one layer to another layer adjacently [12]. It does not provide communication
non-adjacently between Protocol layers.
Figure 1. Wireless Sensor Networks Protocol Stack
In WSNs, The physical layer is responsible for frequency selection, carrier frequency
generation, signal detection, modulation, and data encryption. The MAC layer is responsible for
the multiplexing of data streams, data frame detection, medium access and error control. It
ensures reliable point-to-point and point-to-multipoint connections in a communication network.
The network layer takes care of routing the data supplied by the transport layer. The transport
layer helps to maintain the flow of data if the sensor networks application requires it. Depending
on the sensing tasks, different types of application software can be built and used on the
application layer. In addition, the power, mobility, and task management planes monitor the
power, movement, and task distribution among the sensor nodes. These planes help the sensor
Bulletin of EEI ISSN: 2302-9285 
Data Flow in Wireless Sensor Network Protocol Stack by using ... (Rakesh Kumar Saini)
83
nodes coordinate the sensing task and lower overall power consumption. The power
management plane manages how a sensor node uses its power.
4. Simulation Setup
For analysis of data flow between WSNs protocol stack layers we create a simulation
setup (Figure 2). In this simulation setup we consider 17 sensor nodes that are communicate
between each other and finaly send data to destination node. In this simulation we use Bellman-
Ford routing algorithm for routing data packets between sensor nodes. Bellman-Ford routing
algorithm computes shortest paths from sensor node to all other sensor nodes and finally sends
data packets by a shortest path to the base station. Bellman-Ford routing algorithm is very
usefull and energy-efficient approach in wireless sensor network. Running simulation (Figure 3)
show the working of all sensor nodes [13-14]. There are many sensor nodes communicate from
each other and finally send cooperately sense data to destination nodes. In this simulation we
are using Qualnet 5.0.2 simulator tool. Qualnet 5.0.2 is created for Wireless sensor network and
Adhoc network.
Figure 2. Simulation Setup
Figure 3. Running Simulation
5. Simulation Results and Analysis
For Study and analysis of data packets from top layer (Application layer) to bottom layer
(Physical layer) we are consider Qualnet 5.0.2 simulator tool. Qualnet 5.0.2 is a very popular
 ISSN: 2089-3191
Bulletin of EEI Vol. 6, No. 1, March 2017 : 81 – 87
84
simulator tool in wireless sensor network. Parameters that are used in this simulation are shown
in Table 1. In this simulation the performance of Bellman-Ford is verified. In this simulation we
consider sensor nodes 1, 2,3,5,7,10,11,16 cooperately pass their data to the destination node
17.
Table 1. Simulation Parameters
Parameter Value
Simulator Qualnet 5.0.2
Source Sensor nodes 1,2,3,5,7,10,11,16
Destination node 17
Buffer Size 1024
Terrain Range 100m x 100m
No. of sensor nodes 17
Frequencies 2.4GHz
Traffic Type CBR
Channel Type Wireless channel
Protocols BELLMAN-FORD
In this simulation for study and analysis of Bellman-Ford routing algorithm we check the
values on wireless sensor network protocol stack (Application layer, Transport layer, Network
layer, MAC layer, Physical layer). First we check data packets that are coming from Application
layer to Transport layer similarly flow of data packets from Transport layer to Network layer,
Network layer to MAC layer and from MAC layer to Physical layer [17-18].
Figure 4. Data Packets Send from Application Layer to Transport Layer
In Figure 4, Data packets send from Application layer to Transport layer In Figure 5,
Data packets received from Application layer to Transport layer. In Figure 6 Data packets
received from Transport layer to Network layer. In Figure 7. Data packets received from
Network layer to MAC layer. In Figure 8 Data packets received from MAC layer to Physical
layer.
Bulletin of EEI ISSN: 2302-9285 
Data Flow in Wireless Sensor Network Protocol Stack by using ... (Rakesh Kumar Saini)
85
Figure 5. Data Packets Received from Application Layer at Transport
Figure 6. Data Packets received from Transport layer at Network
Figure 7. Data Packets received from Network layer at MAC layer
In this simulation result, data packets that are coming from Transport layer to Network
layer show frequency of sensor nodes adjacently. Similarly data packets coming from Network
layer to MAC layer and then data packets are coming from MCA layer to Physical layer. By
study and analysis of data packets flow from top layer(Application layer) to Bottom
layer(Physical layer) we find that all sensor nodes forwarding data to the base station adjacently
means one layer to next layer and so on. By using Bellman-Ford routing algorithm all sensor
nodes forward data to base station but Bellman-Ford routing algorithm is not energy-efficient
[15]. For improve energy-efficiency in wireless sensor network we can use Cross-layer design
 ISSN: 2089-3191
Bulletin of EEI Vol. 6, No. 1, March 2017 : 81 – 87
86
approach in wireless sensor network. Cross-layer design approach is more energy-efficient,
scalable and useful approach in wireless sensor network [16].
Figure 8. Data Packets Received from MCA Layer at Physical Layer
6. Conclusion
In this simulation we study and analysis of Bellman-Ford routing algorithm at different
wireless sensor network protocol stack layer (Application layer, Transport layer, Network layer,
MAC layer, Physical layer). These layers exchange data adjacently between each other. In this
simulation we analysis data flow at different-different layer. In future work we will develop a
cross-layer design approach that will be more energy-efficient as compare to traditional layered
approach.
References
[1] IF Akyildiz et al., Wireless sensor networks: a survey, Computer Networks 38. 2002: 393–422.
[2] JN Al-Karaki, AE Kamal. Routing Techniques in Wireless Sensor Networks: A Survey. IEEE Wireless
Communication. Dec. 2004; 11(6): 6-28.
[3] WB Heinemann et al., An Application-Specific Protocol Architecture for Wireless Micro sensor
Networks. IEEE Transactions on Wireless Communications. Oct 2002; 1(4): 660 - 670.
[4] WR Heinemann, A Chandrakasan, H Balkrishnan. Energy-Efficient Communication Protocol for
Wireless Micro sensor Networks. In Proceedings of 33rd Hawaii International Conference on System
Science. Jan. 2000; 2: 1-10.
[5] Mao Ye, Chengfa Li, Guihai Chen, Jie Wu. An Energy efficient clustering scheme in Wireless sensor
network. Ad Hoc and Sensor wireless Networks. April 2006; 3: 99-119.
[6] Amir Sepasi Zahmati, Bahman Abolhassani, Ali Asghar Behesti Shirazi, Ali Shojaee Bakhtiari. An
Energy-Efficient protocol with Static clustering for Wireless Sensor Network. Proceedings of world
academy of science, Engineering and Technology. July 2007; 22.
[7] C-Y Chong, SP Kumar. Sensor networks: evolution, opportunities, and challenges. Proceedings of the
IEEE. 2003; 91(8): 1247–1256.
[8] Soheil Ghiasi, Ankur Srivastava, Xiaojian Yang, Majid Sarrafzadeh. Optimal Energy Aware Clustering
in Sensor Networks. SENSORS Journal. 2002; 2(7): 258-269.
[9] Al-Karaki, Jamal N, Ahmed E Kamal. Routing techniques in wireless sensor networks:a survey.
Wireless communications, IEEE. 2004; 11(6): 6-28.
[10] Mardani, Morteza, Seung-Jun Kim, Georgios B Giannakis. Cross-layer design of wireless multihop
random access networks. Signal Processing, IEEE Transactions. 60.5 (2012): 2562-2574.
[11] Heinemann, Wendi Rabiner, Anantha Chandrakasan, Hari Balakrishnan. Energy-efficient
communication protocol for wireless micro sensor networks. System sciences, 2000. Proceedings of
the 33rd annual Hawaii international conference on. IEEE. 2000.
[12] [Herman Sahota, Ratnesh Kumar, Ahmed Kamal, Jing Huang. An Energy-Efficient Wireless Sensor
Network for Precision Agriculture. In Proc. IEEE. 2010.
[13] Yong Ding, Zhou Xu, Lingyun Tao. An Cross Layer Algorithm Based on Power Control for Wireless
Sensor Networks. Springer-Verlag Berlin Heidelberg. 2010: 209-216.
[14] Qingxu Xiong, Xiang. Cross-layer design of MAC and application semantics in Wireless Sensor
Netowrks. IEEE 2014 fourth international conference on communication systems and network
technologies.
Bulletin of EEI ISSN: 2302-9285 
Data Flow in Wireless Sensor Network Protocol Stack by using ... (Rakesh Kumar Saini)
87
[15] Atif Sharif, Vidyasagar M Potdar, AJD Rathnayaka. LCART: A Cross-layered Transport Protocol for
Heterogeneous WSN. IEEE SENSORS 2010 Conference.
[16] Ian F.Akyildiz, Mehmet CVuran, Ozgur B Akan. A Cross-Layer Protocol for Wireless Sensor Network.
In Proc. IEEE 2006.
[17] Chia-Hung Tsai, Tsu-Wen Hsu, Meng-Shiuan Pan, Yu-Chee Tseng. Cross-Layer, Energy-Efficient
design for supporting continuous queries in Wireless Sensor Network: A Quorum-Based Approach.
Springer Science+Business Media, LLC. 2009.
[18] Huaqing Wang, Yue Ouyang, Guixia Kang. An Energy Efficient Cross-Layer Design for Healthcare
Monitoring Wireless Sensor Networks. In Proc.IEEE 2008.
[19] Thomas Beluch, Daniela Dragomirescu, Robert Plana. A Sub-nanosecond Synchronized MAC-PHY
cross-layer design for Wireless Sensor Networks. ELSEVIER, Ad Hoc Networks. 2013; 11: 823-845.

More Related Content

What's hot

Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Applicationijsrd.com
 
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSMULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSvtunotesbysree
 
Scalability in wireless sensor networks
Scalability in wireless sensor networksScalability in wireless sensor networks
Scalability in wireless sensor networkssourabhshivtiwari
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Networkiosrjce
 
Wireless sensor network wireless network
Wireless sensor network wireless networkWireless sensor network wireless network
Wireless sensor network wireless networkTeced Ce
 
Hetrogenous wireless sensor network
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor networkChinmoy Jena
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...IJEEE
 
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed SurveyComparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Surveytheijes
 
Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsIOSR Journals
 
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkMuhammad Kaife Uddin
 
An algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkAn algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkeSAT Publishing House
 
Ppt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th semPpt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th semshikhathegreat
 
Protection Technique for Complex Distribution Smart Grid Using Wireless Token...
Protection Technique for Complex Distribution Smart Grid Using Wireless Token...Protection Technique for Complex Distribution Smart Grid Using Wireless Token...
Protection Technique for Complex Distribution Smart Grid Using Wireless Token...Power System Operation
 

What's hot (20)

Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
 
file4.pdf
file4.pdffile4.pdf
file4.pdf
 
9345.pdf
9345.pdf9345.pdf
9345.pdf
 
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKSMULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
MULTIPLE CHOICE QUESTIONS WITH ANSWERS ON WIRELESS SENSOR NETWORKS
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Scalability in wireless sensor networks
Scalability in wireless sensor networksScalability in wireless sensor networks
Scalability in wireless sensor networks
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Network
 
Energy aware routing for wireless sensor networks
Energy aware routing for wireless sensor networksEnergy aware routing for wireless sensor networks
Energy aware routing for wireless sensor networks
 
Wireless sensor network wireless network
Wireless sensor network wireless networkWireless sensor network wireless network
Wireless sensor network wireless network
 
Hetrogenous wireless sensor network
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor network
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
 
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed SurveyComparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
Comparison of Routing protocols in Wireless Sensor Networks: A Detailed Survey
 
Mw2522122216
Mw2522122216Mw2522122216
Mw2522122216
 
Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network Models
 
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor Network
 
Chapter
ChapterChapter
Chapter
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
An algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkAn algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor network
 
Ppt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th semPpt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th sem
 
Protection Technique for Complex Distribution Smart Grid Using Wireless Token...
Protection Technique for Complex Distribution Smart Grid Using Wireless Token...Protection Technique for Complex Distribution Smart Grid Using Wireless Token...
Protection Technique for Complex Distribution Smart Grid Using Wireless Token...
 

Similar to Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Routing Algorithm

IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET Journal
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET Journal
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkAM Publications
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNIAEME Publication
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop TransmissionIOSR Journals
 
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKComplete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKRutvik Pensionwar
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
 
Mobility_Research_paper
Mobility_Research_paperMobility_Research_paper
Mobility_Research_paperPiyush Jalan
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...IRJET Journal
 
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...IRJET Journal
 
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...IJNSA Journal
 
Mobile Relay in Data-Intensive using Routing Tree WSN
Mobile Relay in Data-Intensive using Routing Tree WSNMobile Relay in Data-Intensive using Routing Tree WSN
Mobile Relay in Data-Intensive using Routing Tree WSNijircee
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Networkijtsrd
 

Similar to Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Routing Algorithm (20)

IRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor NetworkIRJET- Energy Efficient Protocol in Wireless Sensor Network
IRJET- Energy Efficient Protocol in Wireless Sensor Network
 
Oj3425062509
Oj3425062509Oj3425062509
Oj3425062509
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
 
G017344246
G017344246G017344246
G017344246
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
 
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKComplete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
 
Mobility_Research_paper
Mobility_Research_paperMobility_Research_paper
Mobility_Research_paper
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
 
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
Multiple Sink Positioning and Relocation for Improving Lifetime in Wireless S...
 
MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...
MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...
MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...
 
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
 
Mobile Relay in Data-Intensive using Routing Tree WSN
Mobile Relay in Data-Intensive using Routing Tree WSNMobile Relay in Data-Intensive using Routing Tree WSN
Mobile Relay in Data-Intensive using Routing Tree WSN
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
 

More from journalBEEI

Square transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherSquare transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherjournalBEEI
 
Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
 
Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...journalBEEI
 
A secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksA secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksjournalBEEI
 
Plant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkPlant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkjournalBEEI
 
Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...journalBEEI
 
Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...journalBEEI
 
Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...journalBEEI
 
Wireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmWireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmjournalBEEI
 
Implementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennaImplementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennajournalBEEI
 
The calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headThe calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headjournalBEEI
 
Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
 
Design of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationDesign of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationjournalBEEI
 
Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...journalBEEI
 
Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)journalBEEI
 
Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
 
Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...journalBEEI
 
An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...journalBEEI
 
Parking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationParking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationjournalBEEI
 
Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...journalBEEI
 

More from journalBEEI (20)

Square transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherSquare transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipher
 
Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...
 
Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...
 
A secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksA secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networks
 
Plant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkPlant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural network
 
Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...
 
Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...
 
Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...
 
Wireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmWireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithm
 
Implementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennaImplementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antenna
 
The calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headThe calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human head
 
Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...
 
Design of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationDesign of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting application
 
Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...
 
Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)
 
Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...
 
Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...
 
An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...
 
Parking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationParking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentation
 
Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...
 

Recently uploaded

HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 

Recently uploaded (20)

HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 

Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Routing Algorithm

  • 1. Bulletin of Electrical Engineering and Informatics ISSN: 2302-9285 Vol. 6, No. 1, March 2017, pp. 81~87, DOI: 10.11591/eei.v6i1.577  81 Received November 7, 2016; Revised January 7, 2017; Accepted January 21, 2017 Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Routing Algorithm Rakesh Kumar Saini 1* , Ritika 2 , Sandip Vijay 3 1, 2 Department of Computer Science and Application, DIT University, Dehradun Uttrakhand, India 3 Department of Electronics and Communication, ICFAI University, Dehradun Uttrakhand, India *Corresponding author, e-mail: rk.saini@dituniversity.edu.in 1* , hod.mca@dituniversity.edu.in 2 , vijaysandip@gmail.com 3 Abstract Wireless sensor network consists various sensor nodes that are used to monitor any target area like forest fire detection by our army person and monitoring any industrial activity by industry manager. Wireless sensor networks have been deployed in several cities to monitor the concentration of dangerous gases for citizens. In wireless sensor network when sensor nodes communicate from each other then routing protocol are used for communication between protocol layers. Wireless sensor network protocol stack consist five layers such as Application layer, Transport layer, Network layer, MAC Layer, Physical layer. In this paper we study and analysis Bellman-Ford routing algorithm and check the flow of data between these protocol layers. For simulation purpose we are using Qualnet 5.0.2 simulator tool. Keywords: sensor nodes, wireless sensor network, Bellman-Ford routing algorithm, Qualnet 5.0.2 1. Introduction A Wireless sensor network has many sensor nodes that are interconnected by wireless communication channels. Sensor node is a small device that is used to monitor the physical and environmental condition such as temperature, sound and any movement in the sensing field. Sensor node senses the data and sends to nearest sensor node and all sensor nodes cooperately pass their data to the base station via internet or satellite. Nowadays wireless sensor networks are popular and their applications are used by our military for environment monitoring. Wireless sensor networks are used for other purpose like home security, earthquake warning. Despite the infinite scopes of wireless sensor networks, they are limited by the node battery lifetime. Once they are deployed, the network can keep operating while the battery power is adequate. This is critical point to be considered as it is almost impossible to replace the node battery once deployed over an inaccessible area. Such constraints combined with a typical deployment of large number of sensor nodes, have posed many challenges to the design and management of sensor networks and necessitate energy-awareness at all layers of networking protocol stack [1-2]. The main task of a sensor node in a sensor field is to detect events, perform quick local data processing, and then transmit the data. Power consumption can hence be divided into three domains: sensing, communication, and data processing. In this paper we study and analysis Bellman-Ford routing algorithm and check the flow of data between Wireless sensor network protocols stack layers. 2. Wireless Sensor Network A wireless sensor network consists distributed autonomous sensors nodes that are used to monitor physical or environmental conditions, such as temperature, sound, vibration, pressure and to cooperatively pass their data to the base station [2-3]. The more modern networks are bi-directional, also enabling control of sensor activity. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance; today such networks are used in many industrial and consumer applications, such as industrial process monitoring and control machine health monitoring, and so on. The WSN is built of
  • 2.  ISSN: 2089-3191 Bulletin of EEI Vol. 6, No. 1, March 2017 : 81 – 87 82 "nodes" – from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors. Each such sensor network node has typically several parts: a radio transceiver with an internal antenna or connection to an external antenna, a microcontroller, an electronic circuit for interfacing with the sensors and an energy source, usually a battery or an embedded form of energy harvesting. A sensor node might vary in size from that of a shoebox down to the size of a grain of dust, although functioning "motes"(demo video) of genuine microscopic dimensions have yet to be created. The cost of sensor nodes is similarly variable, ranging from hundreds of dollars to a few pennies, depending on the complexity of the individual sensor nodes. Size and cost constraints on sensor nodes result in corresponding constraints on resources such as energy, memory, computational speed and communications bandwidth. The topology of the WSNs can vary from a simple star network to an advanced multi-hop network. The wireless sensor node, being a microelectronic device, can only be equipped with a limited power source (< 0.5 Ah, 1.2 V). In some application scenarios, replenishment of power resources might be impossible [5]. Sensor node lifetime, therefore, shows a strong dependence on battery lifetime. In a multihop ad hoc sensor network, each node plays the dual role of data originator and data router. The malfunctioning of a few nodes can cause significant topological changes and might require rerouting of packets and reorganization of the network. Hence, power conservation and power management take on additional importance [4-5]. It is for these reasons that researchers are currently focusing on the design of power-aware protocols and algorithms for sensor networks. In Wireless Sensor network, all sensor nodes move from one location to another location [7]. In this paper we analyze Bellman-Ford routing algorithm and check the data flow between protocol layers [9]. 3. Protocol Stack of WSN Wireless sensor network protocol stack has five layers such as Application layer, Transport layer, Network layer, MAC Layer, Physical layer [10-11].The Wireless sensor network protocol stack used by base station and sensor nodes as mentioned in Figure 1 (Wireless Sensor Network Protocol Stack). WSNs Protocol Stack combines energy of sensor nodes and routing awareness, integrates packets with networking protocols, communicates energy efficiently through the wireless medium, and promotes cooperative efforts of sensor nodes. Wireless sensor network protocol stack is modification of OSI (Open system interconnection). It is used for wireless network. In wireless sensor network when sensor nodes cooperately pass their data to the base station then this protocol stack works for exchanging or passing information from one layer to another layer adjacently [12]. It does not provide communication non-adjacently between Protocol layers. Figure 1. Wireless Sensor Networks Protocol Stack In WSNs, The physical layer is responsible for frequency selection, carrier frequency generation, signal detection, modulation, and data encryption. The MAC layer is responsible for the multiplexing of data streams, data frame detection, medium access and error control. It ensures reliable point-to-point and point-to-multipoint connections in a communication network. The network layer takes care of routing the data supplied by the transport layer. The transport layer helps to maintain the flow of data if the sensor networks application requires it. Depending on the sensing tasks, different types of application software can be built and used on the application layer. In addition, the power, mobility, and task management planes monitor the power, movement, and task distribution among the sensor nodes. These planes help the sensor
  • 3. Bulletin of EEI ISSN: 2302-9285  Data Flow in Wireless Sensor Network Protocol Stack by using ... (Rakesh Kumar Saini) 83 nodes coordinate the sensing task and lower overall power consumption. The power management plane manages how a sensor node uses its power. 4. Simulation Setup For analysis of data flow between WSNs protocol stack layers we create a simulation setup (Figure 2). In this simulation setup we consider 17 sensor nodes that are communicate between each other and finaly send data to destination node. In this simulation we use Bellman- Ford routing algorithm for routing data packets between sensor nodes. Bellman-Ford routing algorithm computes shortest paths from sensor node to all other sensor nodes and finally sends data packets by a shortest path to the base station. Bellman-Ford routing algorithm is very usefull and energy-efficient approach in wireless sensor network. Running simulation (Figure 3) show the working of all sensor nodes [13-14]. There are many sensor nodes communicate from each other and finally send cooperately sense data to destination nodes. In this simulation we are using Qualnet 5.0.2 simulator tool. Qualnet 5.0.2 is created for Wireless sensor network and Adhoc network. Figure 2. Simulation Setup Figure 3. Running Simulation 5. Simulation Results and Analysis For Study and analysis of data packets from top layer (Application layer) to bottom layer (Physical layer) we are consider Qualnet 5.0.2 simulator tool. Qualnet 5.0.2 is a very popular
  • 4.  ISSN: 2089-3191 Bulletin of EEI Vol. 6, No. 1, March 2017 : 81 – 87 84 simulator tool in wireless sensor network. Parameters that are used in this simulation are shown in Table 1. In this simulation the performance of Bellman-Ford is verified. In this simulation we consider sensor nodes 1, 2,3,5,7,10,11,16 cooperately pass their data to the destination node 17. Table 1. Simulation Parameters Parameter Value Simulator Qualnet 5.0.2 Source Sensor nodes 1,2,3,5,7,10,11,16 Destination node 17 Buffer Size 1024 Terrain Range 100m x 100m No. of sensor nodes 17 Frequencies 2.4GHz Traffic Type CBR Channel Type Wireless channel Protocols BELLMAN-FORD In this simulation for study and analysis of Bellman-Ford routing algorithm we check the values on wireless sensor network protocol stack (Application layer, Transport layer, Network layer, MAC layer, Physical layer). First we check data packets that are coming from Application layer to Transport layer similarly flow of data packets from Transport layer to Network layer, Network layer to MAC layer and from MAC layer to Physical layer [17-18]. Figure 4. Data Packets Send from Application Layer to Transport Layer In Figure 4, Data packets send from Application layer to Transport layer In Figure 5, Data packets received from Application layer to Transport layer. In Figure 6 Data packets received from Transport layer to Network layer. In Figure 7. Data packets received from Network layer to MAC layer. In Figure 8 Data packets received from MAC layer to Physical layer.
  • 5. Bulletin of EEI ISSN: 2302-9285  Data Flow in Wireless Sensor Network Protocol Stack by using ... (Rakesh Kumar Saini) 85 Figure 5. Data Packets Received from Application Layer at Transport Figure 6. Data Packets received from Transport layer at Network Figure 7. Data Packets received from Network layer at MAC layer In this simulation result, data packets that are coming from Transport layer to Network layer show frequency of sensor nodes adjacently. Similarly data packets coming from Network layer to MAC layer and then data packets are coming from MCA layer to Physical layer. By study and analysis of data packets flow from top layer(Application layer) to Bottom layer(Physical layer) we find that all sensor nodes forwarding data to the base station adjacently means one layer to next layer and so on. By using Bellman-Ford routing algorithm all sensor nodes forward data to base station but Bellman-Ford routing algorithm is not energy-efficient [15]. For improve energy-efficiency in wireless sensor network we can use Cross-layer design
  • 6.  ISSN: 2089-3191 Bulletin of EEI Vol. 6, No. 1, March 2017 : 81 – 87 86 approach in wireless sensor network. Cross-layer design approach is more energy-efficient, scalable and useful approach in wireless sensor network [16]. Figure 8. Data Packets Received from MCA Layer at Physical Layer 6. Conclusion In this simulation we study and analysis of Bellman-Ford routing algorithm at different wireless sensor network protocol stack layer (Application layer, Transport layer, Network layer, MAC layer, Physical layer). These layers exchange data adjacently between each other. In this simulation we analysis data flow at different-different layer. In future work we will develop a cross-layer design approach that will be more energy-efficient as compare to traditional layered approach. References [1] IF Akyildiz et al., Wireless sensor networks: a survey, Computer Networks 38. 2002: 393–422. [2] JN Al-Karaki, AE Kamal. Routing Techniques in Wireless Sensor Networks: A Survey. IEEE Wireless Communication. Dec. 2004; 11(6): 6-28. [3] WB Heinemann et al., An Application-Specific Protocol Architecture for Wireless Micro sensor Networks. IEEE Transactions on Wireless Communications. Oct 2002; 1(4): 660 - 670. [4] WR Heinemann, A Chandrakasan, H Balkrishnan. Energy-Efficient Communication Protocol for Wireless Micro sensor Networks. In Proceedings of 33rd Hawaii International Conference on System Science. Jan. 2000; 2: 1-10. [5] Mao Ye, Chengfa Li, Guihai Chen, Jie Wu. An Energy efficient clustering scheme in Wireless sensor network. Ad Hoc and Sensor wireless Networks. April 2006; 3: 99-119. [6] Amir Sepasi Zahmati, Bahman Abolhassani, Ali Asghar Behesti Shirazi, Ali Shojaee Bakhtiari. An Energy-Efficient protocol with Static clustering for Wireless Sensor Network. Proceedings of world academy of science, Engineering and Technology. July 2007; 22. [7] C-Y Chong, SP Kumar. Sensor networks: evolution, opportunities, and challenges. Proceedings of the IEEE. 2003; 91(8): 1247–1256. [8] Soheil Ghiasi, Ankur Srivastava, Xiaojian Yang, Majid Sarrafzadeh. Optimal Energy Aware Clustering in Sensor Networks. SENSORS Journal. 2002; 2(7): 258-269. [9] Al-Karaki, Jamal N, Ahmed E Kamal. Routing techniques in wireless sensor networks:a survey. Wireless communications, IEEE. 2004; 11(6): 6-28. [10] Mardani, Morteza, Seung-Jun Kim, Georgios B Giannakis. Cross-layer design of wireless multihop random access networks. Signal Processing, IEEE Transactions. 60.5 (2012): 2562-2574. [11] Heinemann, Wendi Rabiner, Anantha Chandrakasan, Hari Balakrishnan. Energy-efficient communication protocol for wireless micro sensor networks. System sciences, 2000. Proceedings of the 33rd annual Hawaii international conference on. IEEE. 2000. [12] [Herman Sahota, Ratnesh Kumar, Ahmed Kamal, Jing Huang. An Energy-Efficient Wireless Sensor Network for Precision Agriculture. In Proc. IEEE. 2010. [13] Yong Ding, Zhou Xu, Lingyun Tao. An Cross Layer Algorithm Based on Power Control for Wireless Sensor Networks. Springer-Verlag Berlin Heidelberg. 2010: 209-216. [14] Qingxu Xiong, Xiang. Cross-layer design of MAC and application semantics in Wireless Sensor Netowrks. IEEE 2014 fourth international conference on communication systems and network technologies.
  • 7. Bulletin of EEI ISSN: 2302-9285  Data Flow in Wireless Sensor Network Protocol Stack by using ... (Rakesh Kumar Saini) 87 [15] Atif Sharif, Vidyasagar M Potdar, AJD Rathnayaka. LCART: A Cross-layered Transport Protocol for Heterogeneous WSN. IEEE SENSORS 2010 Conference. [16] Ian F.Akyildiz, Mehmet CVuran, Ozgur B Akan. A Cross-Layer Protocol for Wireless Sensor Network. In Proc. IEEE 2006. [17] Chia-Hung Tsai, Tsu-Wen Hsu, Meng-Shiuan Pan, Yu-Chee Tseng. Cross-Layer, Energy-Efficient design for supporting continuous queries in Wireless Sensor Network: A Quorum-Based Approach. Springer Science+Business Media, LLC. 2009. [18] Huaqing Wang, Yue Ouyang, Guixia Kang. An Energy Efficient Cross-Layer Design for Healthcare Monitoring Wireless Sensor Networks. In Proc.IEEE 2008. [19] Thomas Beluch, Daniela Dragomirescu, Robert Plana. A Sub-nanosecond Synchronized MAC-PHY cross-layer design for Wireless Sensor Networks. ELSEVIER, Ad Hoc Networks. 2013; 11: 823-845.