IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
This document presents a QoS-based packet scheduling algorithm for hybrid wireless networks. It proposes using the Earliest Deadline First (EDF) algorithm to schedule packets for online conference applications and the Least Slack Time First algorithm to schedule packets for online video applications. The goal is to reduce transmission delay and improve QoS. It implements this scheduling approach using the NS2 network simulator. The scheduling algorithm classifies packets by application type and places them in queues. EDF and Least Slack Time are then used to schedule packets from each queue to minimize delay for multimedia applications over hybrid wireless networks.
A cross layer delay-aware multipath routing algorithm for mobile adhoc networkscsandit
Mobile Ad Hoc Networks (MANETS) require reliable routing and Quality of Service(QoS)
mechanism to support diverse applications with varying and stringent requirements. Routing
protocols such as AODV, AOMDV, DSR and OLSR use minimum hop count as the metric for
path selection, hence are not suitable for delay sensitive real time applications. To support such
applications delay constrained routing protocols are employed. These Protocols makes path
selection based on the delay over the discovered links during routing discovery and routing
table calculations. We propose a variation of a node-disjoint Multipath QoS Routing protocol
called Cross Layer Delay aware Node Disjoint Multipath AODV (CLDM-AODV) based on
delay constraint. It employs cross-layer communications between MAC and routing layers to
achieve link and channel-awareness. It regularly updates the path status in terms of lowest
delay incurred at each intermediate node. Performance of the proposed protocol is compared
with single path AODV and NDMR protocols. Proposed CLDM-AODV is superior in terms of
better packet delivery and reduced overhead between intermediate nodes.
A Fuzzy Based Dynamic Queue Management Approach to Improve QOS in Wireless se...IJARIDEA Journal
Abstract— Wireless Sensor Networks (WSNs) are predicted to be the following iteration of networks which
will kind an indispensable a part of man’s lives and which furnish a bridge between the true bodily and
virtual worlds. WSNs will have to be able to aid more than a few functions over the same platform. Specific
applications would have unique QoS requirements helping the preliminary specifications for delivering
Quality of services (QoS), which is fundamental for numerous purposes, is directly concerning energy
consumption, delay, reliability, distortion, and community lifetime. There may be an inevitable correlation
between quality of accessible service levels in WSNs and power consumption in these networks, while
acquiring any of those bases acquires the influential interface on the other.
Keywords—Data integrity, Delay differentiated services, Dynamic routing, Potential field, Wireless sensor
networks.
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
In multi-radio wireless mesh networks, one node is eligible to transmit packets over multiple channels to different destination nodes simultaneously. This feature of multi-radio wireless mesh network makes high throughput for the network and increase the chance for multi path routing. This is because the multiple channel availability for transmission decreases the probability of the most elegant problem called as interference problem which is either of interflow and intraflow type. For avoiding the problem like interference and maintaining the constant network performance or increasing the performance the WMN need to consider the packet aggregation and packet forwarding. Packet aggregation is process of collecting several packets ready for transmission and sending them to the intended recipient through the channel, while the packet forwarding holds the hop-by-hop routing. But choosing the correct path among different available multiple paths is most the important factor in the both case for a routing algorithm. Hence the most challenging factor is to determine a forwarding strategy which will provide the schedule for each node for transmission within the channel. In this research work we have tried to implement two forwarding strategies for the multi path multi radio WMN as the approximate solution for the above said problem. We have implemented Global State Routing (GSR) which will consider the packet forwarding concept and Aggregation Aware Layer 2 Routing (AAL2R) which considers the both concept i.e. both packet forwarding and packet aggregation. After the successful implementation the network performance has been measured by means of simulation study.
The document discusses performance exploration of quality of service (QoS) parameters in mobile ad hoc networks (MANETs). It contains 6 figures analyzing how different QoS parameters are affected by increasing the reporting rate of data packets in the MANET. Figure 2 shows that packet delivery ratio decreases as reporting rate increases due to congestion. Figure 3 shows that packet loss ratio increases with higher reporting rates. Figure 4 indicates that throughput initially increases then decreases with reporting rate. Control overheads and average energy consumption shown in Figures 5 and 6 also are affected by varying the reporting rate in the MANET. The document analyzes how the reporting rate impacts key QoS metrics during data transmission in a MANET.
ECA MODEL BASED QOS AODV ROUTING FOR MANETSIJCNCJournal
Applications like banking, interactive multimedia, movie on demand, VOIP, etc., are delay sensitive by
nature. The QoS given to users will be affected by network delay, which can be mitigated by employing
QoS routing and efficient data transfer. To build routing table, normal AODV routing uses flooding
technique, which will not consider QoS requirements. Hence QoS based routing which is stable for the
entire application is essential, which understands the dynamic nature of the MANET and establishes the
required route, in minimum possible time. We have proposed an intelligent routing protocol based ECA
model and AODV for establishing QoS route.
The simulation results shows that the ECA model gives better results, while considering the local
connectivity time, source to destination connectivity time, number of data packets successfully delivered to
the destination, local and global error correction time, compared to AODV.
A cross layer delay-aware node disjoint multipath routing algorithm for mobil...ijwmn
Mobile Ad Hoc Networks (MANETS) require reliable routing and Quality of Service(QoS) mechanism to
support diverse applications with varying and stringent requirements for delay, jitter, bandwidth, packets
loss. Routing protocols such as AODV, AOMDV, DSR and OLSR use shortest path with minimum hop
count as the main metric for path selection, hence are not suitable for delay sensitive real time
applications. To support such applications delay constrained routing protocols are employed. These
Protocols makes path selection between source and destination based on the delay over the discovered
links during routing discovery and routing table calculations. We propose a variation of a node-disjoint
Multipath QoS Routing protocol called Cross Layer Delay aware Node Disjoint Multipath AODV (CLDMAODV)
based on delay constraint. It employs cross-layer communications between MAC and routing
layers to achieve link and channel-awareness. It regularly updates the path status in terms of lowest delay
incurred at each intermediate node. Performance of the proposed protocol is compared with single path
AODV and NDMR protocols. Proposed CLDM-AODV is superior in terms of better packet delivery and
reduced overhead between intermediate nodes.
This document summarizes a research paper that proposes an energy and bandwidth constrained routing technique for mobile ad hoc networks (MANETs). It presents an available bandwidth measurement algorithm that estimates available bandwidth more accurately by considering node capacity, link utilization, idle time synchronization, collision probability, and overhead from backoff mechanisms. It also proposes a probability-based overhearing method to reduce energy consumption from overhearing without affecting route quality. The techniques are evaluated using NS2 simulations to analyze network performance in terms of quality of service parameters.
This document presents a QoS-based packet scheduling algorithm for hybrid wireless networks. It proposes using the Earliest Deadline First (EDF) algorithm to schedule packets for online conference applications and the Least Slack Time First algorithm to schedule packets for online video applications. The goal is to reduce transmission delay and improve QoS. It implements this scheduling approach using the NS2 network simulator. The scheduling algorithm classifies packets by application type and places them in queues. EDF and Least Slack Time are then used to schedule packets from each queue to minimize delay for multimedia applications over hybrid wireless networks.
A cross layer delay-aware multipath routing algorithm for mobile adhoc networkscsandit
Mobile Ad Hoc Networks (MANETS) require reliable routing and Quality of Service(QoS)
mechanism to support diverse applications with varying and stringent requirements. Routing
protocols such as AODV, AOMDV, DSR and OLSR use minimum hop count as the metric for
path selection, hence are not suitable for delay sensitive real time applications. To support such
applications delay constrained routing protocols are employed. These Protocols makes path
selection based on the delay over the discovered links during routing discovery and routing
table calculations. We propose a variation of a node-disjoint Multipath QoS Routing protocol
called Cross Layer Delay aware Node Disjoint Multipath AODV (CLDM-AODV) based on
delay constraint. It employs cross-layer communications between MAC and routing layers to
achieve link and channel-awareness. It regularly updates the path status in terms of lowest
delay incurred at each intermediate node. Performance of the proposed protocol is compared
with single path AODV and NDMR protocols. Proposed CLDM-AODV is superior in terms of
better packet delivery and reduced overhead between intermediate nodes.
A Fuzzy Based Dynamic Queue Management Approach to Improve QOS in Wireless se...IJARIDEA Journal
Abstract— Wireless Sensor Networks (WSNs) are predicted to be the following iteration of networks which
will kind an indispensable a part of man’s lives and which furnish a bridge between the true bodily and
virtual worlds. WSNs will have to be able to aid more than a few functions over the same platform. Specific
applications would have unique QoS requirements helping the preliminary specifications for delivering
Quality of services (QoS), which is fundamental for numerous purposes, is directly concerning energy
consumption, delay, reliability, distortion, and community lifetime. There may be an inevitable correlation
between quality of accessible service levels in WSNs and power consumption in these networks, while
acquiring any of those bases acquires the influential interface on the other.
Keywords—Data integrity, Delay differentiated services, Dynamic routing, Potential field, Wireless sensor
networks.
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
In multi-radio wireless mesh networks, one node is eligible to transmit packets over multiple channels to different destination nodes simultaneously. This feature of multi-radio wireless mesh network makes high throughput for the network and increase the chance for multi path routing. This is because the multiple channel availability for transmission decreases the probability of the most elegant problem called as interference problem which is either of interflow and intraflow type. For avoiding the problem like interference and maintaining the constant network performance or increasing the performance the WMN need to consider the packet aggregation and packet forwarding. Packet aggregation is process of collecting several packets ready for transmission and sending them to the intended recipient through the channel, while the packet forwarding holds the hop-by-hop routing. But choosing the correct path among different available multiple paths is most the important factor in the both case for a routing algorithm. Hence the most challenging factor is to determine a forwarding strategy which will provide the schedule for each node for transmission within the channel. In this research work we have tried to implement two forwarding strategies for the multi path multi radio WMN as the approximate solution for the above said problem. We have implemented Global State Routing (GSR) which will consider the packet forwarding concept and Aggregation Aware Layer 2 Routing (AAL2R) which considers the both concept i.e. both packet forwarding and packet aggregation. After the successful implementation the network performance has been measured by means of simulation study.
The document discusses performance exploration of quality of service (QoS) parameters in mobile ad hoc networks (MANETs). It contains 6 figures analyzing how different QoS parameters are affected by increasing the reporting rate of data packets in the MANET. Figure 2 shows that packet delivery ratio decreases as reporting rate increases due to congestion. Figure 3 shows that packet loss ratio increases with higher reporting rates. Figure 4 indicates that throughput initially increases then decreases with reporting rate. Control overheads and average energy consumption shown in Figures 5 and 6 also are affected by varying the reporting rate in the MANET. The document analyzes how the reporting rate impacts key QoS metrics during data transmission in a MANET.
ECA MODEL BASED QOS AODV ROUTING FOR MANETSIJCNCJournal
Applications like banking, interactive multimedia, movie on demand, VOIP, etc., are delay sensitive by
nature. The QoS given to users will be affected by network delay, which can be mitigated by employing
QoS routing and efficient data transfer. To build routing table, normal AODV routing uses flooding
technique, which will not consider QoS requirements. Hence QoS based routing which is stable for the
entire application is essential, which understands the dynamic nature of the MANET and establishes the
required route, in minimum possible time. We have proposed an intelligent routing protocol based ECA
model and AODV for establishing QoS route.
The simulation results shows that the ECA model gives better results, while considering the local
connectivity time, source to destination connectivity time, number of data packets successfully delivered to
the destination, local and global error correction time, compared to AODV.
A cross layer delay-aware node disjoint multipath routing algorithm for mobil...ijwmn
Mobile Ad Hoc Networks (MANETS) require reliable routing and Quality of Service(QoS) mechanism to
support diverse applications with varying and stringent requirements for delay, jitter, bandwidth, packets
loss. Routing protocols such as AODV, AOMDV, DSR and OLSR use shortest path with minimum hop
count as the main metric for path selection, hence are not suitable for delay sensitive real time
applications. To support such applications delay constrained routing protocols are employed. These
Protocols makes path selection between source and destination based on the delay over the discovered
links during routing discovery and routing table calculations. We propose a variation of a node-disjoint
Multipath QoS Routing protocol called Cross Layer Delay aware Node Disjoint Multipath AODV (CLDMAODV)
based on delay constraint. It employs cross-layer communications between MAC and routing
layers to achieve link and channel-awareness. It regularly updates the path status in terms of lowest delay
incurred at each intermediate node. Performance of the proposed protocol is compared with single path
AODV and NDMR protocols. Proposed CLDM-AODV is superior in terms of better packet delivery and
reduced overhead between intermediate nodes.
This document summarizes a research paper that proposes an energy and bandwidth constrained routing technique for mobile ad hoc networks (MANETs). It presents an available bandwidth measurement algorithm that estimates available bandwidth more accurately by considering node capacity, link utilization, idle time synchronization, collision probability, and overhead from backoff mechanisms. It also proposes a probability-based overhearing method to reduce energy consumption from overhearing without affecting route quality. The techniques are evaluated using NS2 simulations to analyze network performance in terms of quality of service parameters.
In wireless distributed sensor networks, one open problem is how to guarantee the reliable relay
selection based on the quality of services diversity. To address this problem, we focus on the reliable
adaptive relay selection approach and adaptive QoS supported algorithm, based on which we present a
Markov chain model, in consideration of different packet states and error control algorithm assignment.
The mathematical analyses and MATLAB simulation results show that the proposed relay selection
approach could perform better in terms of saturation throughput, reliability, and energy efficiency,
compared with the traditional approaches. More importantly, the quality of real-time multimedia streaming
is improved significantly, in terms of decodable frame ratio and delay.
Qo s oriented distributed routing protocols : anna university 2nd review pptAAKASH S
To find a QoS path between source and destination, Which satisfies
The QoS requirements for each admitted connection and
Optimizes the use of network resources
Quality encompasses the data loss, latency, jitter, efficient use of network resources,..
QoS mechanisms for unfairness: managing queuing behavior, shaping traffic, control admission, routing, …
Usually, a hybrid network has widespread base stations
The data transmission in hybrid networks has two features:
An AP can be a source or a destination to any mobile node
It allows a stream to have anycast transmission along multiple transmission paths to its destination through base stations
The number of transmission hops between a mobile node and an AP is small
It enables a source node to connect to an AP through an intermediate node
In this paper introduce the QoS-Oriented Distributed routing protocol(QOD)
This QOD protocol makes five contributions:
QoS-guaranteed neighbor selection algorithm
Distributed packet scheduling algorithm
Mobility-based segment resizing algorithm
Soft-deadline based forwarding scheduling algorithm
Data redundancy elimination based transmission
A Survey on Cross Layer Routing Protocol with Quality of ServiceIJSRD
Wireless is playing the wide role in today’s industrial application. Central idea of this paper is to enhance quality of service (QoS) for multimedia transmission over ad-hoc network. This paper describes the operational of different QoS routing protocols, their properties and various parameters advantages and disadvantages. Also describes the use of QoS in Cross layer routing protocol. Finally, it concludes by study of all these cross layer QoS routing protocols.
A-Serv: A Novel Architecture Providing Scalable Quality of ServiceCSCJournals
QoS architectures define how routers process packets to ensure QoS service guarantees enforced. Existing QoS architectures such as Integrated Services (IntServ), Differentiated Services (DiffServ), and Dynamic Packet State (DPS) share one common property that the packet structure and the function of the routers are closely connected. Packets of one data flow are treated the same all the time at different routers. We propose to decouple such connection between packet structures and router functions. In our solution, packets carry as much information as possible, while routers process packets as detailed as possible until their load burden prohibits. We call such novel QoS architecture Adaptive Services (A-Serv). A-Serv utilizes our newly designed Load Adaptive Router to provide adaptive QoS to data flows. Treatments to data flows are not predefined but based on the load burden in Load Adaptive Routers. A-Serv overcomes the scalability problem of IntServ, provides better service guarantees to individual data flows than DiffServ and can be deployed incrementally. Our empirical analysis results show that compared with DiffServ architecture, A-Serv can provide differentiated services to data flows in the same DiffServ class and can provide better guaranteed QoS to data flows. Furthermore, A-Serv provides better protection to data flows than DiffServ when malicious data flows exist.
Dynamic routing for data integrity and delay differentiated services in wirel...LeMeniz Infotech
Dynamic routing for data integrity and delay differentiated services in wireless sensor networks
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Visit : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANETijcsa
In Mobile Ad Hoc Network (MANET), the collection of mobile nodes gets communicated without the need of any customary infrastructure. In MANET, repeated topology changes and intermittent link breakage
causes the failure of existing path. This leads to rediscovery of new route by broadcasting RREQ packet.The number of RREQ packet in the network gets added due to the increased amount of link failures. This result in increased routing overhead which degrades the packet delivery ratio in MANET. While designing
routing protocols for MANET, it is indispensable to reduce the overhead in route discovery. In our previous
work[17], routing protocol based on neighbour details and probabilistic knowledge is utilized, additionally
the symmetric cipher AES is used for securing the data packet. Through this protocol, packet delivery ratio
gets increased and confidentiality is ensured. But there is a problem in secure key exchange among the
source and destination while using AES. To resolve that problem, hybrid cryptographic system i.e.,
combination of AES and RSA is proposed in this paper. By using this hybrid cryptographic scheme and the
routing protocol based on probability and neighbour knowledge, enhanced secure packet delivery is
ensured in MANET
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ijcsit
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding
environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in
volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks
(WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end
delay.Multipath routing is to discover multipath during route discovery from source to sink. Discover
multipath and sending data via these different paths improve the bandwidth and decrease the end to end
delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive
multipath routing protocol establishing three paths with awareness of node’s residual energy and distance.
ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for
multimedia data in terms of end to end delay and packet delivery ratio.
Interference Aware Multi-path Routing in Wireless Sensor NetworksRakesh Behera
Routing in wireless sensor networks has been considered an important field of research over the past decade. Wireless sensor network essentially consists of data Sensor Nodes and Video Sensor Nodes, which senses both sound and motion of events. Single path routing protocol has been used for route discovery. Though this protocol reduces computation complexity and resource utilization, there are some disadvantages like reduced network throughput, network performance, increased traffic load and delay in data delivery. To overcome these drawbacks a new protocol called Interference Aware Multi-path Routing(IAMR) is proposed to improve the reliability of data transmission, fault-tolerance, Quality of Service. Here, the traffic intersection spread out among the multiple paths. This technique is applied between the sources and sink to reduce routing overhead and energy consumption. The proposed protocol is simulated using NS2
This document analyzes the impact of varying transmission range, mobility speed, and number of nodes on the performance of three routing protocols (AODV, DSDV, DSR) in mobile ad hoc networks. It simulates these protocols using the NS-2 simulator and measures the performance based on several QoS metrics including packet delivery ratio, end-to-end delay, routing overhead, and throughput. The results show that AODV generally has the best packet delivery ratio and throughput, while DSDV has the lowest end-to-end delay. DSR performance is between AODV and DSDV. Increasing the transmission range and number of nodes tends to improve performance, while increasing mobility reduces it.
CONGESTION AWARE LINK COST ROUTING FOR MANETSIJCNCJournal
Due to the dynamic topology, self-configuration and decentralized nature of Mobile Ad hoc Network
(MANET), it provides many benefits in wireless networks and is easy to deploy. But the transmission of
data over ad hoc networks has elevated many technical issues for successful routing. Congestion is one of
the important issues which cause performance degradation of a network, due to long delay and high packet
loss. This paper proposes a Congestion aware Link Cost Routing for MANET where the protocol finds a
path with optimized linked cost based on SNR, Link delay, and the and remaining battery power. Along
with this optimization, in this protocol, every node finds its congestion status and participates in the route
discovery on the basis of its status. Data forwarding is also done based on the congestion status at the time
of forwarding. The protocol results in better performance in terms of packet delivery fraction, end to end
delay, throughput, and packet drop when compared to existing protocols.
Packet delivery ratio, delay, throughput, routing overhead etc are the strict quality of service requirements
for applications in Ad hoc networks. So, the routing protocol not only finds a suitable path but also the path
should satisfy the QoS constraints also. Quality of services (QoS) aware routing is performed on the basis
of resource availability in the network and the flow of QoS requirement. In this paper we developed a
source routing protocol which satisfying the link bandwidth and end –to- end delay factor. Our protocol
will find multiple paths between the source and the destination, out of those one will be selected for data
transfer and others are reserve at the source node those can be used for route maintenance purpose. The
path selection is strictly based on the bandwidth and end-to-end delay in case two or more then two paths
are having the same values for QoS constraints then we will use hop as a parameter for path selection.
To find a QoS path between source and destination, Which satisfies
The QoS requirements for each admitted connection and
Optimizes the use of network resources
Quality encompasses the data loss, latency, jitter, efficient use of network resources,..
QoS mechanisms for unfairness: managing queuing behavior, shaping traffic, control admission, routing, …
Usually, a hybrid network has widespread base stations
The data transmission in hybrid networks has two features:
An AP can be a source or a destination to any mobile node
It allows a stream to have anycast transmission along multiple transmission paths to its destination through base stations
The number of transmission hops between a mobile node and an AP is small
It enables a source node to connect to an AP through an intermediate node
This document summarizes a research paper that proposes a novel cross-layer routing technique for mobile ad hoc networks. The technique calculates both signal strength and node mobility to select the most efficient and stable path for data transmission. It aims to improve on traditional ad hoc routing protocols like AODV by considering both link quality metrics from the physical layer (signal strength) and node mobility. The proposed method selects routes based on signal strength if mobility is high, and on traditional hop count if mobility is low, in order to find paths that reduce link failure and improve throughput.
Congestion in Wireless Sensor Networks has negative impact on the Quality of Service.
Congestion effects the performance metrics, namely throughput and per-packet energy
consumption, network lifetime and packet delivery ratio. Reducing congestion allows better
utilization of the network resources and thus enhances the Quality of Service metrics of the
network. Traffic Aware Dynamic Routing to Alleviate Congestion in Wireless Sensor Networks
reduces congestion by considering one hop neighbor routing in the network. This paper
proposed an algorithm for Quality of Service Based Traffic-Aware Data forwarding for
congestion control in wireless sensor networks based on two hop neighbor information. On
detection of congestion, the algorithm forwards data packets around the congestion areas by
spreading the excessive packets through multiple paths. The path with light load or under
loaded nodes is efficiently utilized whenever congestion occurs. The main aspect of the
algorithm is to build path to the destination using two independent potential fields depth and
queue length. Queue length field solves the traffic-aware problem. Depth field creates a
backbone to forward packets to the sink. Both fields are combined to yield a hybrid potential
field to make dynamic decision for data forwarding. Network Simulator used for simulating the
algorithm is NS2. The proposed algorithm performs better.
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...IJECEIAES
An innovative technology that is widely used in many applications is the Mobile Ad-hoc Network (MANET). Discovery and maintenance of routes at MANET are important issues. Within MANET, broadcasting is used to discover a path within on-demand routing protocols. Establishing and maintaining a route periodically among the nodes is the challenge that requires the transmitting of control packets across a network. This state leads to the issue of broadcasting storms. Broadcasting control packets increase control packets overhead and decrease network performance. In this paper, we proposed a scheme called AODV-Velocity and Dynamic (AODV-VD) for effective broadcast control packets. The routing protocol for the ad-hoc on-demand distance victor (AODV) is used to implement the proposed AODV-VD scheme. AODV-VD scheme reduces both the excessive route discovery control packets and network overhead. Network simulator version 2.35 (NS2.35) was used to compare the proposed AODV-VD scheme to the AODV routing protocol in terms of end-to-end latency, average throughput, packet transmission ratio and overhead ratio.
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...ijasuc
Prioritized flow control is a type of QoS provisioning in which each class is provided a different QoS by
assigning priority to one class over another in terms of allocating resources. It is an effective means to
provide service differentiation to different class of service in mobile ad hoc networks. So the objective is to
achieve a desired level of service to high-priority flows so that the wireless medium is completely utilized
using adaptive rate control. In this paper, we propose to design QoS architecture for Bandwidth
Management and Rate Control in MANET. Our proposed QoS architecture contains an adaptive
bandwidth management technique which measures the available bandwidth at each node in real-time and
it is then propagated on demand by the QoS routing protocol. The source nodes perform call admission
control for different priority of flows based on the bandwidth information provided by the QoS routing.
The network bandwidth utilization is monitored continuously and network congestion is detected in
advance. Then a rate control mechanism is used to regulate best-effort traffic.
Mtadf multi hop traffic aware data for warding for congestion control in wir...ijwmn
The document summarizes a proposed algorithm called MTADF (Multi Hop Traffic-Aware Data Forwarding) for congestion control in wireless sensor networks. The algorithm uses two potential fields - depth potential field and queue length potential field - to route data packets around congested areas along multiple paths. This helps distribute traffic more evenly and utilize less busy nodes, reducing packet drops and improving throughput compared to existing one-hop routing algorithms. The algorithm constructs the two potential fields independently and then combines them to make dynamic forwarding decisions for data packets. Simulations show the MTADF algorithm performs better than previous work in mitigating congestion.
Dynamic Routing for Data Integrity and Delay Differentiated Services in Wirel...syeda yasmeen
The document proposes a routing algorithm called IDDR for wireless sensor networks that aims to provide both low delay for delay-sensitive applications and high data integrity for integrity-sensitive applications. IDDR constructs a virtual hybrid potential field to separate packets by application type and route them along different paths, improving data integrity by caching packets on underloaded paths while reducing delay by sending delay-sensitive packets along shorter paths. Using theoretical analysis, the authors prove IDDR is stable, and simulations show it provides differentiated quality of service for different application requirements.
This document summarizes a research paper that analyzes end-to-end delay distribution in wireless sensor networks. It first introduces the importance of average delay and end-to-end delay distribution for real-time quality of service in wireless sensor networks. It then discusses previous work that analyzed average delay but failed to consider single hop delay distribution or bursty traffic. The document proposes a comprehensive cross-layer analysis framework to model average delay and end-to-end delay distribution considering both deterministic and random node deployments. It also compares the performance of CSMA/CA and a cross-layer MAC protocol in terms of throughput, packet loss, and delay.
Las reacciones químicas involucran la unión o separación de sustancias químicas iniciales llamadas reactivos que al reaccionar producen nuevas sustancias llamadas productos. Algunas reacciones químicas cotidianas son la fotosíntesis, mediante la cual las plantas obtienen alimentos a partir del agua, dióxido de carbono y sales minerales usando la energía del sol, y la respiración celular, en la que las células animales y vegetales combinan alimentos con oxígeno para producir dió
In wireless distributed sensor networks, one open problem is how to guarantee the reliable relay
selection based on the quality of services diversity. To address this problem, we focus on the reliable
adaptive relay selection approach and adaptive QoS supported algorithm, based on which we present a
Markov chain model, in consideration of different packet states and error control algorithm assignment.
The mathematical analyses and MATLAB simulation results show that the proposed relay selection
approach could perform better in terms of saturation throughput, reliability, and energy efficiency,
compared with the traditional approaches. More importantly, the quality of real-time multimedia streaming
is improved significantly, in terms of decodable frame ratio and delay.
Qo s oriented distributed routing protocols : anna university 2nd review pptAAKASH S
To find a QoS path between source and destination, Which satisfies
The QoS requirements for each admitted connection and
Optimizes the use of network resources
Quality encompasses the data loss, latency, jitter, efficient use of network resources,..
QoS mechanisms for unfairness: managing queuing behavior, shaping traffic, control admission, routing, …
Usually, a hybrid network has widespread base stations
The data transmission in hybrid networks has two features:
An AP can be a source or a destination to any mobile node
It allows a stream to have anycast transmission along multiple transmission paths to its destination through base stations
The number of transmission hops between a mobile node and an AP is small
It enables a source node to connect to an AP through an intermediate node
In this paper introduce the QoS-Oriented Distributed routing protocol(QOD)
This QOD protocol makes five contributions:
QoS-guaranteed neighbor selection algorithm
Distributed packet scheduling algorithm
Mobility-based segment resizing algorithm
Soft-deadline based forwarding scheduling algorithm
Data redundancy elimination based transmission
A Survey on Cross Layer Routing Protocol with Quality of ServiceIJSRD
Wireless is playing the wide role in today’s industrial application. Central idea of this paper is to enhance quality of service (QoS) for multimedia transmission over ad-hoc network. This paper describes the operational of different QoS routing protocols, their properties and various parameters advantages and disadvantages. Also describes the use of QoS in Cross layer routing protocol. Finally, it concludes by study of all these cross layer QoS routing protocols.
A-Serv: A Novel Architecture Providing Scalable Quality of ServiceCSCJournals
QoS architectures define how routers process packets to ensure QoS service guarantees enforced. Existing QoS architectures such as Integrated Services (IntServ), Differentiated Services (DiffServ), and Dynamic Packet State (DPS) share one common property that the packet structure and the function of the routers are closely connected. Packets of one data flow are treated the same all the time at different routers. We propose to decouple such connection between packet structures and router functions. In our solution, packets carry as much information as possible, while routers process packets as detailed as possible until their load burden prohibits. We call such novel QoS architecture Adaptive Services (A-Serv). A-Serv utilizes our newly designed Load Adaptive Router to provide adaptive QoS to data flows. Treatments to data flows are not predefined but based on the load burden in Load Adaptive Routers. A-Serv overcomes the scalability problem of IntServ, provides better service guarantees to individual data flows than DiffServ and can be deployed incrementally. Our empirical analysis results show that compared with DiffServ architecture, A-Serv can provide differentiated services to data flows in the same DiffServ class and can provide better guaranteed QoS to data flows. Furthermore, A-Serv provides better protection to data flows than DiffServ when malicious data flows exist.
Dynamic routing for data integrity and delay differentiated services in wirel...LeMeniz Infotech
Dynamic routing for data integrity and delay differentiated services in wireless sensor networks
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Visit : www.lemenizinfotech.com / www.ieeemaster.com
Mail : projects@lemenizinfotech.com
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANETijcsa
In Mobile Ad Hoc Network (MANET), the collection of mobile nodes gets communicated without the need of any customary infrastructure. In MANET, repeated topology changes and intermittent link breakage
causes the failure of existing path. This leads to rediscovery of new route by broadcasting RREQ packet.The number of RREQ packet in the network gets added due to the increased amount of link failures. This result in increased routing overhead which degrades the packet delivery ratio in MANET. While designing
routing protocols for MANET, it is indispensable to reduce the overhead in route discovery. In our previous
work[17], routing protocol based on neighbour details and probabilistic knowledge is utilized, additionally
the symmetric cipher AES is used for securing the data packet. Through this protocol, packet delivery ratio
gets increased and confidentiality is ensured. But there is a problem in secure key exchange among the
source and destination while using AES. To resolve that problem, hybrid cryptographic system i.e.,
combination of AES and RSA is proposed in this paper. By using this hybrid cryptographic scheme and the
routing protocol based on probability and neighbour knowledge, enhanced secure packet delivery is
ensured in MANET
ENERGY LOCATION AWARE ROUTING PROTOCOL (ELARP) FOR WIRELESS MULTIMEDIA SENSOR...ijcsit
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding
environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in
volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks
(WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end
delay.Multipath routing is to discover multipath during route discovery from source to sink. Discover
multipath and sending data via these different paths improve the bandwidth and decrease the end to end
delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive
multipath routing protocol establishing three paths with awareness of node’s residual energy and distance.
ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for
multimedia data in terms of end to end delay and packet delivery ratio.
Interference Aware Multi-path Routing in Wireless Sensor NetworksRakesh Behera
Routing in wireless sensor networks has been considered an important field of research over the past decade. Wireless sensor network essentially consists of data Sensor Nodes and Video Sensor Nodes, which senses both sound and motion of events. Single path routing protocol has been used for route discovery. Though this protocol reduces computation complexity and resource utilization, there are some disadvantages like reduced network throughput, network performance, increased traffic load and delay in data delivery. To overcome these drawbacks a new protocol called Interference Aware Multi-path Routing(IAMR) is proposed to improve the reliability of data transmission, fault-tolerance, Quality of Service. Here, the traffic intersection spread out among the multiple paths. This technique is applied between the sources and sink to reduce routing overhead and energy consumption. The proposed protocol is simulated using NS2
This document analyzes the impact of varying transmission range, mobility speed, and number of nodes on the performance of three routing protocols (AODV, DSDV, DSR) in mobile ad hoc networks. It simulates these protocols using the NS-2 simulator and measures the performance based on several QoS metrics including packet delivery ratio, end-to-end delay, routing overhead, and throughput. The results show that AODV generally has the best packet delivery ratio and throughput, while DSDV has the lowest end-to-end delay. DSR performance is between AODV and DSDV. Increasing the transmission range and number of nodes tends to improve performance, while increasing mobility reduces it.
CONGESTION AWARE LINK COST ROUTING FOR MANETSIJCNCJournal
Due to the dynamic topology, self-configuration and decentralized nature of Mobile Ad hoc Network
(MANET), it provides many benefits in wireless networks and is easy to deploy. But the transmission of
data over ad hoc networks has elevated many technical issues for successful routing. Congestion is one of
the important issues which cause performance degradation of a network, due to long delay and high packet
loss. This paper proposes a Congestion aware Link Cost Routing for MANET where the protocol finds a
path with optimized linked cost based on SNR, Link delay, and the and remaining battery power. Along
with this optimization, in this protocol, every node finds its congestion status and participates in the route
discovery on the basis of its status. Data forwarding is also done based on the congestion status at the time
of forwarding. The protocol results in better performance in terms of packet delivery fraction, end to end
delay, throughput, and packet drop when compared to existing protocols.
Packet delivery ratio, delay, throughput, routing overhead etc are the strict quality of service requirements
for applications in Ad hoc networks. So, the routing protocol not only finds a suitable path but also the path
should satisfy the QoS constraints also. Quality of services (QoS) aware routing is performed on the basis
of resource availability in the network and the flow of QoS requirement. In this paper we developed a
source routing protocol which satisfying the link bandwidth and end –to- end delay factor. Our protocol
will find multiple paths between the source and the destination, out of those one will be selected for data
transfer and others are reserve at the source node those can be used for route maintenance purpose. The
path selection is strictly based on the bandwidth and end-to-end delay in case two or more then two paths
are having the same values for QoS constraints then we will use hop as a parameter for path selection.
To find a QoS path between source and destination, Which satisfies
The QoS requirements for each admitted connection and
Optimizes the use of network resources
Quality encompasses the data loss, latency, jitter, efficient use of network resources,..
QoS mechanisms for unfairness: managing queuing behavior, shaping traffic, control admission, routing, …
Usually, a hybrid network has widespread base stations
The data transmission in hybrid networks has two features:
An AP can be a source or a destination to any mobile node
It allows a stream to have anycast transmission along multiple transmission paths to its destination through base stations
The number of transmission hops between a mobile node and an AP is small
It enables a source node to connect to an AP through an intermediate node
This document summarizes a research paper that proposes a novel cross-layer routing technique for mobile ad hoc networks. The technique calculates both signal strength and node mobility to select the most efficient and stable path for data transmission. It aims to improve on traditional ad hoc routing protocols like AODV by considering both link quality metrics from the physical layer (signal strength) and node mobility. The proposed method selects routes based on signal strength if mobility is high, and on traditional hop count if mobility is low, in order to find paths that reduce link failure and improve throughput.
Congestion in Wireless Sensor Networks has negative impact on the Quality of Service.
Congestion effects the performance metrics, namely throughput and per-packet energy
consumption, network lifetime and packet delivery ratio. Reducing congestion allows better
utilization of the network resources and thus enhances the Quality of Service metrics of the
network. Traffic Aware Dynamic Routing to Alleviate Congestion in Wireless Sensor Networks
reduces congestion by considering one hop neighbor routing in the network. This paper
proposed an algorithm for Quality of Service Based Traffic-Aware Data forwarding for
congestion control in wireless sensor networks based on two hop neighbor information. On
detection of congestion, the algorithm forwards data packets around the congestion areas by
spreading the excessive packets through multiple paths. The path with light load or under
loaded nodes is efficiently utilized whenever congestion occurs. The main aspect of the
algorithm is to build path to the destination using two independent potential fields depth and
queue length. Queue length field solves the traffic-aware problem. Depth field creates a
backbone to forward packets to the sink. Both fields are combined to yield a hybrid potential
field to make dynamic decision for data forwarding. Network Simulator used for simulating the
algorithm is NS2. The proposed algorithm performs better.
Dynamic routing discovery scheme for high mobility in mobile ad hoc wireless ...IJECEIAES
An innovative technology that is widely used in many applications is the Mobile Ad-hoc Network (MANET). Discovery and maintenance of routes at MANET are important issues. Within MANET, broadcasting is used to discover a path within on-demand routing protocols. Establishing and maintaining a route periodically among the nodes is the challenge that requires the transmitting of control packets across a network. This state leads to the issue of broadcasting storms. Broadcasting control packets increase control packets overhead and decrease network performance. In this paper, we proposed a scheme called AODV-Velocity and Dynamic (AODV-VD) for effective broadcast control packets. The routing protocol for the ad-hoc on-demand distance victor (AODV) is used to implement the proposed AODV-VD scheme. AODV-VD scheme reduces both the excessive route discovery control packets and network overhead. Network simulator version 2.35 (NS2.35) was used to compare the proposed AODV-VD scheme to the AODV routing protocol in terms of end-to-end latency, average throughput, packet transmission ratio and overhead ratio.
A QUALITY OF SERVICE ARCHITECTURE FOR RESOURCE PROVISIONING AND RATE CONTROL ...ijasuc
Prioritized flow control is a type of QoS provisioning in which each class is provided a different QoS by
assigning priority to one class over another in terms of allocating resources. It is an effective means to
provide service differentiation to different class of service in mobile ad hoc networks. So the objective is to
achieve a desired level of service to high-priority flows so that the wireless medium is completely utilized
using adaptive rate control. In this paper, we propose to design QoS architecture for Bandwidth
Management and Rate Control in MANET. Our proposed QoS architecture contains an adaptive
bandwidth management technique which measures the available bandwidth at each node in real-time and
it is then propagated on demand by the QoS routing protocol. The source nodes perform call admission
control for different priority of flows based on the bandwidth information provided by the QoS routing.
The network bandwidth utilization is monitored continuously and network congestion is detected in
advance. Then a rate control mechanism is used to regulate best-effort traffic.
Mtadf multi hop traffic aware data for warding for congestion control in wir...ijwmn
The document summarizes a proposed algorithm called MTADF (Multi Hop Traffic-Aware Data Forwarding) for congestion control in wireless sensor networks. The algorithm uses two potential fields - depth potential field and queue length potential field - to route data packets around congested areas along multiple paths. This helps distribute traffic more evenly and utilize less busy nodes, reducing packet drops and improving throughput compared to existing one-hop routing algorithms. The algorithm constructs the two potential fields independently and then combines them to make dynamic forwarding decisions for data packets. Simulations show the MTADF algorithm performs better than previous work in mitigating congestion.
Dynamic Routing for Data Integrity and Delay Differentiated Services in Wirel...syeda yasmeen
The document proposes a routing algorithm called IDDR for wireless sensor networks that aims to provide both low delay for delay-sensitive applications and high data integrity for integrity-sensitive applications. IDDR constructs a virtual hybrid potential field to separate packets by application type and route them along different paths, improving data integrity by caching packets on underloaded paths while reducing delay by sending delay-sensitive packets along shorter paths. Using theoretical analysis, the authors prove IDDR is stable, and simulations show it provides differentiated quality of service for different application requirements.
This document summarizes a research paper that analyzes end-to-end delay distribution in wireless sensor networks. It first introduces the importance of average delay and end-to-end delay distribution for real-time quality of service in wireless sensor networks. It then discusses previous work that analyzed average delay but failed to consider single hop delay distribution or bursty traffic. The document proposes a comprehensive cross-layer analysis framework to model average delay and end-to-end delay distribution considering both deterministic and random node deployments. It also compares the performance of CSMA/CA and a cross-layer MAC protocol in terms of throughput, packet loss, and delay.
Las reacciones químicas involucran la unión o separación de sustancias químicas iniciales llamadas reactivos que al reaccionar producen nuevas sustancias llamadas productos. Algunas reacciones químicas cotidianas son la fotosíntesis, mediante la cual las plantas obtienen alimentos a partir del agua, dióxido de carbono y sales minerales usando la energía del sol, y la respiración celular, en la que las células animales y vegetales combinan alimentos con oxígeno para producir dió
Durante las vacaciones de invierno, la familia visitó Tandil donde comieron un asado el primer día y vieron El Cristo al segundo día. También experimentaron granizo y visitaron varios lugares como Don Quijote, La Piedra Movediza y El Centinela antes de regresar a Bahía.
This document outlines questions that were asked to a target audience to help inform the creation of a horror film opening sequence. The questions covered topics like gender and age of the audience, important aspects to include, whether a mystery/psychological opening would appeal, location ideas, if the killer's identity should be revealed, use of flashbacks, amount of dialogue, what the audience wants to learn, and the idea of social media interaction. The responses will help the group decide what to include in their 2 minute opening sequence, with a focus on displaying the characters.
La aplicación permite a los turistas planificar y organizar rutas de naturaleza por Extremadura al consultar rutas creadas por otros, editar sus propias rutas con puntos de interés y duración, y consultar y compartir puntos de interés valorados. Es compatible con múltiples sistemas operativos.
This short document promotes creating presentations using Haiku Deck, a tool for making slideshows. It encourages the reader to get started making their own Haiku Deck presentation by uploading it to SlideShare. A stock photo accompanies the text.
Friendbook: A Semantic-Based Friend Recommendation System for Social Networks1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Jamie Sharp is a graphic designer, marketer, and project manager with experience in various areas including brochures, posters, logos, websites, and presentations. She has worked on projects for organizations such as Yellow Springs Kids Playhouse, Antique Power Inc., Central State University, and Hooven-Dayton Corp. Jamie is award-winning, capable, organized, creative, and knowledgeable.
Episerver julkishallinnon käytössä - Miika NiemeläKnowit Oy
Episerverin Suomen Marketing Manager Miika Niemelän esitys Knowitin EPiServer-julkaisualusta julkishallinnon käytössä -seminaarissa Ekbergillä 11.11.2015.
Team AMIS reviewed Oracle OpenWorld 2015, noting the key themes of mobile, big data, and cloud transitions. The event featured keynote sessions on these topics and emphasized Oracle's vision of 80% of production apps in the cloud by 2025. Oracle is focused on developing agile with frequent releases and changing how it sells cloud to focus on consumption over credits. The cloud changes how Oracle and its customers operate, with a focus on multitenancy, portability between cloud and on-premises, and positioning Oracle's full software stack running in the public cloud.
DATA TRANSPARENT AUTHENTICATION USING QOD IN HYBRID NETWORKSEditor IJMTER
Hybrid networks are next generation of wireless networks that could be a
combination of Mobile wireless adhoc (MANET) networks and Wireless Infrastructure
networks. They are increasingly utilized in wireless communications that are extremely
supporting real time transmission with restricted Quality of Service. Invalid reservation and
race condition issues happens in MANET. In existing system, QoS-Oriented Distributed
routing protocol (QOD) is employed to boost the QoS support capability of hybrid networks,
it transforms the packet routing problem to resource scheduling problem that has 5
algorithms. They are, QoS guaranteed neighbor selection algorithm, Distributed packet
scheduling algorithm, Mobility based segment resizing algorithm, Traffic redundant
elimination algorithm and Data redundancy elimination based transmission algorithm. The
main drawback of hybrid networks is so far examined in minimum transmission hops and has
less beneficial feature with restricted number of mobile access points, mobility speeds, and
mobile workloads and with different network sizes. It will extremely perform on random
way point model and less in real mobility model. This paper present Data Transparent
Authentication to authenticates data streams by adjusting interpacket delay. Data Transparent
Authentication while not Communication overhead is an approach which reduces breakdown
of original information or sends out of band authentication data.
A scalable and power efficient solution for routing in mobile ad hoc network ...ijmnct
This document summarizes a research paper that proposes a scalable and power-efficient routing solution for mobile ad hoc networks (MANETs). The paper describes a cluster-based MANET architecture and develops a graph theoretic routing algorithm that finds paths from source to destination nodes using routes with minimum cumulative degree. Simulation results show that the algorithm provides efficient routing paths even as the number of nodes increases, and uses multi-hop connectivity to transmit packets using minimum power irrespective of the number of nodes in the network. The algorithm is shown to be scalable and power efficient compared to other routing methods.
REAL-TIME ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORKS: A SURVEYcscpconf
Wireless sensor networks can be termed as a new generation of distributed embedded systems
that has a capability of meeting broad range of real-time applications. Examples include
radiation monitoring, fire monitoring, border surveillance, and medical care to name but a few.
Wireless sensor networks that are deployed in time/mission-critical applications with highly
dynamic environments have to interact with the physical phenomenon under stringent timing
constraints and severe resource limitations. For such real-time wireless sensor networks,
designing and developing a real-time routing protocol that meets the required real-time
guarantee of data packets communication is a stimulating field of study that raised many
challenges and research issues. In this paper, we present a comprehensive survey of real-time
routing protocols in WSN, by discussing each protocol with its key features. Finally, we concluded this paper with open research issues and challenges of real-time routing in WSN.
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks (WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end delay.Multipath routing is to discover multipath during route discovery from source to sink. Discover multipath and sending data via these different paths improve the bandwidth and decrease the end to end delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive multipath routing protocol establishing three paths with awareness of node’s residual energy and distance. ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for multimedia data in terms of end to end delay and packet delivery ratio.
The present paper describes a novel Raspberry Pi and Arduino UNO architecture used as a meteorological station. One of the advantages of the proposed architecture is the huge quantity of sensors developed for its usage; practically one can find them for any application, and weather sensing is not an exception. The principle followed is to configure Raspberry as a collector for measures obtained from Arduino, transmitting occurs via USB; meanwhile, Raspberry broadcasts them via a web page. For such activity is possible thanks to Raspbian, a Linux-based operating system. It has a lot of libraries and resources available, among them Apache Web Server, that gives the possibility to host a web-page. On it, the user can observe temperature, humidity, solar radiance, and wind speed and direction. Information on the web-page is refreshed each five minute; however, measurements arrive at Raspberry every ten seconds. This low refreshment rate was determined because weather variables normally do not abruptly change. As an additional feature, system stores all information on the log file, this gives the possibility for future analysis and processing.
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks (WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end delay. Multipath routing is to discover multipath during route discovery from source to sink. Discover multipath and sending data via these different paths improve the bandwidth and decrease the end to end delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive multipath routing protocol establishing three paths with awareness of node’s residual energy and distance. ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for multimedia data in terms of end to end delay and packet delivery ratio.
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks (WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end delay.Multipath routing is to discover multipath during route discovery from source to sink. Discover multipath and sending data via these different paths improve the bandwidth and decrease the end to end delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive multipath routing protocol establishing three paths with awareness of node’s residual energy and distance. ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for multimedia data in terms of end to end delay and packet delivery ratio.
A novel routing technique for mobile ad hoc networks (manet)ijngnjournal
Actual network size depends on the application and the protocols developed for the routing for this kind of
networks should be scalable and efficient. Each routing protocol should support small as well as large
scale networks very efficiently. As the number of node increase, it increases the management functionality
of the network. Graph theoretic approach traditionally was applied to networks where nodes are static or
fixed. In this paper, we have applied the graph theoretic routing to MANET where nodes are mobile. Here,
we designed all identical nodes in the cluster except the cluster head and this criterion reduces the
management burden on the network. Each cluster supports a few nodes with a cluster head. The intracluster
connectivity amongst the nodes within the cluster is supported by multi-hop connectivity to ensure
handling mobility in such a way that no service disruption can occur. The inter-cluster connectivity is also
achieved by multi-hop connectivity. However, for inter-cluster communications, only cluster heads are
connected. This paper demonstrates graph theoretic approach produces an optimum multi-hop connectivity
path based on cumulative minimum degree that minimizes the contention and scheduling delay end-toend.
It is applied to both intra-cluster communications as well as inter-cluster communications. The
performance shows that having a multi-hop connectivity for intra-cluster communications is more power
efficient compared to broadcast of information with maximum power coverage. We also showed the total
number of required intermediate nodes in the transmission from source to destination. However, dynamic
behavior of the nodes requires greater understanding of the node degree and mobility at each instance of
time in order to maintain end-to-end QoS for multi-service provisioning. Our simulation results show that
the proposed graph theoretic routing approach will reduce the overall delay and improves the physical
layer data frame transmission.
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIJCNCJournal
This document proposes an improved quality of service protocol for real-time traffic in mobile ad hoc networks. It presents a modified version of the AODV routing protocol that provides two key improvements: 1) A balanced best-effort traffic aware route discovery mechanism that selects paths with lower ratios of best-effort packets to minimize their impact on real-time traffic. 2) A packet forwarding procedure that gives transmission priority to real-time packets by transmitting them immediately from the queue while best-effort packets have to wait, improving throughput for real-time applications. Simulation results show the proposed protocol performs better than basic AODV in terms of throughput and delay for real-time traffic.
The document summarizes the SPEED routing protocol for wireless sensor networks. SPEED aims to provide soft real-time communication by maintaining a consistent delivery speed across the network. It uses stateless non-deterministic geographic forwarding and neighborhood feedback to route packets while balancing energy consumption and avoiding congestion. Simulation results using MATLAB show that SPEED achieves low miss ratios and end-to-end delays while balancing energy usage across nodes in the network.
EFFICIENT MULTI-PATH PROTOCOL FOR WIRELESS SENSOR NETWORKSijwmn
Wireless sensor networks are useful for streaming multimedia in infrastructure-free and hazardous environments. However, these networks are quite different from their wired counterpart and are composed of nodes with constrained bandwidth and energy. Multiple-path transmission is one of the methods for ensuring QoS routing in both wired and wireless environment. Directed diffusion, a well known wireless sensor network protocol, only routes packets through a single path, which barely meets the throughput requirement of multimedia data. Instead, we propose a multipath algorithm based on directed diffusion that reinforces multiple routes with high link quality and low latency. This algorithm retains the merits of the original directed diffusion algorithms, including its energy efficiency and scalability. A hybrid metric of link quality and latency is used as the criterion for path selection. In order to select disjoint paths, we propose a scheme for reinforced nodes to respond negatively to multiple reinforcement messages. We use the NS-2 simulation tool with video trace generated by Multiple Description Coding (MDC) to evaluate the performance. The results show that our algorithm gives better throughput and delay performance, i.e higher video quality, than standard directed diffusion that transmits over a single path, with low overheads and energy consumption.
A comparative study in wireless sensor networksijwmn
This document summarizes and compares several routing algorithms proposed for wireless sensor networks. It discusses algorithms that aim to improve reliability, power efficiency, lifetime, and fault tolerance. The evaluation section compares how each algorithm addresses challenges like reliability, energy conservation, and adapting to topology changes. While various algorithms achieve improvements in areas like power efficiency and lifetime, most still have limitations and do not fully address all the key challenges for wireless sensor networks.
SELFLESS DISTRIBUTED CREDIT BASED SCHEDULING FOR IMPROVED QOS IN IEEE 802.16 ...ijwmn
Packet and flow scheduling algorithms for WiMAX has been a topic of interest for a long time since the very inception of WiMAX networks. WiMAX offers advantages particularly in terms of Quality of service it offers over a longer range at the MAC level. In our paper, we propose two credit based scheduling schemes one in which completed flows distributes the left over credits equally to all higher priority flows(FDCBSS) and another in which completed flows give away all the excess credits to the highest priority uncompleted flow(SDCBSS). Both the schemes are compatible with 802.16 MAC protocol and can efficiently serve real time bursty traffic with reduced latency and hence improved QOS for real time flows. We compare the two proposed schemes for their latency, bandwidth utilization and throughput for real time burst flows with the basic Deficit Round Robin scheduling scheme.
Selfless Distributed Credit Based Scheduling for Improved QOS In IEEE 802.16 ...ijwmn
Packet and flow scheduling algorithms for WiMAX has been a topic of interest for a long time since the very inception of WiMAX networks. WiMAX offers advantages particularly in terms of Quality of service it offers over a longer range at the MAC level. In our paper, we propose two credit based scheduling schemes one in which completed flows distributes the left over credits equally to all higher priority flows(FDCBSS) and another in which completed flows give away all the excess credits to the highest priority uncompleted flow(SDCBSS). Both the schemes are compatible with 802.16 MAC protocol and can efficiently serve real time bursty traffic with reduced latency and hence improved QOS for real time flows. We compare the two proposed schemes for their latency, bandwidth utilization and throughput for real time burst flows with the basic Deficit Round Robin scheduling scheme.
Selfless Distributed Credit Based Scheduling for Improved QOS In IEEE 802.16 ...ijwmn
Packet and flow scheduling algorithms for WiMAX has been a topic of interest for a long time since the
very inception of WiMAX networks. WiMAX offers advantages particularly in terms of Quality of service
it offers over a longer range at the MAC level. In our paper, we propose two credit based scheduling
schemes one in which completed flows distributes the left over credits equally to all higher priority
flows(FDCBSS) and another in which completed flows give away all the excess credits to the highest
priority uncompleted flow(SDCBSS). Both the schemes are compatible with 802.16 MAC protocol and
can efficiently serve real time bursty traffic with reduced latency and hence improved QOS for real time
flows. We compare the two proposed schemes for their latency, bandwidth utilization and throughput for
real time burst flows with the basic Deficit Round Robin scheduling scheme.
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkIJCI JOURNAL
In Multihop Wireless Networks, traffic forwarding capability of each node varies according to its level of contention. Each node can yield its channel access opportunity to its neighbouring nodes, so that all the nodes can evenly share the channel and have similar forwarding capability. In this manner the wireless channel is utilized effectively, which is achieved using Contention Window Adaptation Mechanism (CWAM). This mechanism achieves a higher end-to-end throughout but consumes the network power to a higher level. So, a newly proposed algorithm Quadrant- Based Directional Routing Protocol (Q-DIR) is implemented as a cross-layer with CWAM, to reduce the total network power consumption through limited flooding and also reduce the routing overheads, which eventually increases overall network throughput. This algorithm limits the broadcast region to a quadrant where the source node and the destination nodes are located. Implementation of the algorithm is done in Linux based NS-2 simulator
QoS based Admission Control using Multipath Scheduler for IP over Satellite N...IJECEIAES
This paper presents a novel scheduling algorithm to support quality of service (QoS) for multiservice applications over integrated satellite and terrestrial networks using admission control system with multipath selection capabilities. The algorithm exploits the multipath routing paradigm over LEO and GEO satellites constellation in order to achieve optimum end-toend QoS of the client-server Internet architecture for HTTP web service, file transfer, video streaming and VoIP applications. The proposed multipath scheduler over the satellite networks advocates load balancing technique based on optimum time-bandwidth in order to accommodate the burst of application traffics. The method tries to balance the bandwidth load and queue length on each link over satellite in order to fulfil the optimum QoS level for each traffic type. Each connection of a traffic type will be routed over a link with the least bandwidth load and queue length at current time in order to avoid congestion state. The multipath routing scheduling decision is based on per connection granularity so that packet reordering at the receiver side could be avoided. The performance evaluation of IP over satellites has been carried out using multiple connections, different file sizes and bit-errorrate (BER) variations to measure the packet delay, loss ratio and throughput.
This document summarizes a research paper that proposes a new routing algorithm called Quadrant-Based Directional Routing (Q-DIR) for multihop wireless networks. Q-DIR is implemented as a cross-layer with Contention Window Adaptation Mechanism (CWAM) to reduce network power consumption and increase throughput. Q-DIR limits flooding to the quadrant containing the source and destination nodes. CWAM adapts the contention window size based on node traffic to improve throughput. Simulation results show that Q-DIR with CWAM outperforms standard flooding protocols by utilizing fewer nodes and increasing throughput while reducing power consumption.
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...IRJET Journal
This document analyzes the performance of energy efficient cross-layer load balancing in tactical multi-gateway wireless sensor networks. It compares the performance of AODV routing under four different modes: Normal, Optimal, Compressed, and Optimal Compressed. The Optimal Compressed mode uses both load balancing and data compression (Run Length Encoding) and performs best with the lowest delay, highest energy fairness, lowest packet loss rate, and lowest routing overhead according to simulations run in NS2. The proposed approach of using both load balancing and compression outperforms using either technique alone or without them, improving important network metrics like lifetime.
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
In multi-radio wireless mesh networks, one node is eligible to transmit packets over multiple channels to
different destination nodes simultaneously. This feature of multi-radio wireless mesh network makes high
throughput for the network and increase the chance for multi path routing. This is because the multiple
channel availability for transmission decreases the probability of the most elegant problem called as
interference problem which is either of interflow and intraflow type. For avoiding the problem like
interference and maintaining the constant network performance or increasing the performance the WMN
need to consider the packet aggregation and packet forwarding. Packet aggregation is process of collecting
several packets ready for transmission and sending them to the intended recipient through the channel,
while the packet forwarding holds the hop-by-hop routing. But choosing the correct path among different
available multiple paths is most the important factor in the both case for a routing algorithm. Hence the
most challenging factor is to determine a forwarding strategy which will provide the schedule for each
node for transmission within the channel. In this research work we have tried to implement two forwarding
strategies for the multi path multi radio WMN as the approximate solution for the above said problem. We
have implemented Global State Routing (GSR) which will consider the packet forwarding concept and
Aggregation Aware Layer 2 Routing (AAL2R) which considers the both concept i.e. both packet forwarding
and packet aggregation. After the successful implementation the network performance has been measured
by means of simulation study.
Similar to Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks (20)
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 𝟏)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐄𝐏𝐏 𝐂𝐮𝐫𝐫𝐢𝐜𝐮𝐥𝐮𝐦 𝐢𝐧 𝐭𝐡𝐞 𝐏𝐡𝐢𝐥𝐢𝐩𝐩𝐢𝐧𝐞𝐬:
- Understand the goals and objectives of the Edukasyong Pantahanan at Pangkabuhayan (EPP) curriculum, recognizing its importance in fostering practical life skills and values among students. Students will also be able to identify the key components and subjects covered, such as agriculture, home economics, industrial arts, and information and communication technology.
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐍𝐚𝐭𝐮𝐫𝐞 𝐚𝐧𝐝 𝐒𝐜𝐨𝐩𝐞 𝐨𝐟 𝐚𝐧 𝐄𝐧𝐭𝐫𝐞𝐩𝐫𝐞𝐧𝐞𝐮𝐫:
-Define entrepreneurship, distinguishing it from general business activities by emphasizing its focus on innovation, risk-taking, and value creation. Students will describe the characteristics and traits of successful entrepreneurs, including their roles and responsibilities, and discuss the broader economic and social impacts of entrepreneurial activities on both local and global scales.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
Walmart Business+ and Spark Good for Nonprofits.pdf
Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks
1. Dynamic Routing for Data Integrity
and Delay Differentiated Services
in Wireless Sensor Networks
Jiao Zhang, Member, IEEE, Fengyuan Ren, Member, IEEE, Shan Gao, Hongkun Yang, and
Chuang Lin, Senior Member, IEEE
Abstract—Applications running on the same Wireless Sensor Network (WSN) platform usually have different Quality of Service (QoS)
requirements. Two basic requirements are low delay and high data integrity. However, in most situations, these two requirements
cannot be satisfied simultaneously. In this paper, based on the concept of potential in physics, we propose IDDR, a multi-path dynamic
routing algorithm, to resolve this conflict. By constructing a virtual hybrid potential field, IDDR separates packets of applications with
different QoS requirements according to the weight assigned to each packet, and routes them towards the sink through different paths
to improve the data fidelity for integrity-sensitive applications as well as reduce the end-to-end delay for delay-sensitive ones. Using the
Lyapunov drift technique, we prove that IDDR is stable. Simulation results demonstrate that IDDR provides data integrity and delay
differentiated services.
Index Terms—Wireless sensor networks, data integrity, delay differentiated services, dynamic routing, potential field
Ç
1 INTRODUCTION
WSNS, which are used to sense the physical world, will
play an important role in the next generation net-
works. Due to the diversity and complexity of applications
running over WSNs, the QoS guarantee in such networks
gains increasing attention in the research community.
As a part of an information infrastructure, WSNs should
be able to support various applications over the same plat-
form. Different applications might have different QoS
requirements. For instance, in a fire monitoring application,
the event of a fire alarm should be reported to the sink as
soon as possible. On the other hand, some applications
require most of their packets to successfully arrive at the
sink irrespective of when they arrive. For example, in habitat
monitoring applications, the arrival of packets is allowed to
have a delay, but the sink should receive most of the packets.
WSNs have two basic QoS requirements: low delay
and high data integrity, leading to what are called delay-
sensitive applications and high-integrity applications, respec-
tively. Generally, in a network with light load, both
requirements can be readily satisfied. However, a heavily
loaded network will suffer congestion, which increases
the end-to-end delay.
This work aims to simultaneously improve the fidelity
for high-integrity applications and decrease the end-to-end
delay for delay-sensitive ones, even when the network is
congested. We borrow the concept of potential field from
the discipline of physics and design a novel potential-
based routing algorithm, which is called integrity and
delay differentiated routing (IDDR). IDDR is able to pro-
vide the following two functions:
Improve fidelity for high-integrity applications. The basic
idea is to find as much buffer space as possible from
the idle and/or under-loaded paths to cache the
excessive packets that might be dropped on the
shortest path. Therefore, the first task is to find these
idle and/or underloaded paths, then the second task
is to cache the packets efficiently for subsequent
transmission. IDDR constructs a potential field
according to the depth1
and queue length informa-
tion to find the under-utilized paths. The packets
with high integrity requirement will be forwarded to
the next hop with smaller queue length. A mecha-
nism called Implicit Hop-by-Hop Rate Control is
designed to make packet caching more efficient.
Decrease end-to-end delay for delay-sensitive applications.
Each application is assigned a weight, which repre-
sents the degree of sensitivity to the delay. Through
building local dynamic potential fields with different
slopes according to the weight values carried by
packets, IDDR allows the packets with larger weight
to choose shorter paths. In addition, IDDR also
employs the priority queue to further decrease the
queuing delay of delay-sensitive packets.
J. Zhang is with the School of Information and Communication Engineer-
ing, BUPT and State Key Laboratory of Networking and Switching Tech-
nology, BUPT, China. E-mail: jiaozhang@bupt.edu.cn.
F. Ren, S. Gao, and C. Lin are with the Department of Computer Science
and Technology, Tsinghua University, Beijing, China and Tsinghua
National Laboratory for Information Science and Technology, China.
E-mail: {renfy, gaoshan, clin}@csnet1.cs.tsinghua.edu.cn.
H. Yang is with the Department of Computer Science, University of Texas
at Austin, Texas. E-mail: yang.hongk@gmail.com.
Manuscript received 19 Aug. 2013; revised 23 Dec. 2013; accepted 18 Mar.
2014. Date of publication 26 Mar. 2014; date of current version 23 Dec. 2014.
For information on obtaining reprints of this article, please send e-mail to:
reprints@ieee.org, and reference the Digital Object Identifier below.
Digital Object Identifier no. 10.1109/TMC.2014.2313576
1. In this paper, depth of a node is defined as the least hops that the
node is away from the sink.
328 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 2, FEBRUARY 2015
1536-1233 ß 2014 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
2. IDDR inherently avoids the conflict between high integ-
rity and low delay: the high-integrity packets are cached on
the underloaded paths along which packets will suffer a
large end-to-end delay because of more hops, and the
delay-sensitive packets travel along shorter paths to
approach the sink as soon as possible. Using the Lyapunov
drift theory, we prove that IDDR is stable. Furthermore,
the results of a series of simulations conducted on the
TOSSIM platform [1] demonstrate the efficiency and feasi-
bility of the IDDR scheme.
The remainder of the paper is organized as follows.
Section 2 introduces the related work and motivation. The
details of IDDR are described in Section 3. Section 4 proves
the stability of IDDR. The performance of IDDR is evaluated
through experiments on a small testbed and simulations on
the TOSSIM platform in Sections 5 and 6, respectively.
Finally, the conclusions are drawn in Section 7.
2 RELATED WORK AND MOTIVATION
2.1 Related Work
Most QoS provisioning protocols proposed for traditional
ad hoc networks have large overhead caused by end-to-end
path discovery and resource reservation [2], [3], [4], [5], [6].
Thus, they are not suitable for resource-constrained WSNs.
Some mechanisms have been designed to provide QoS serv-
ices specifically for WSNs. Here we mainly focus on the
metrics of delay and reliability.
2.1.1 Providing Real-Time Service
RAP exploits the notion of velocity and proposes a velocity-
monotonic scheduling policy to minimize the ratio of
missed deadlines [7]. However, the global information of
network topology is required. Implicit Earliest Deadline
First (EDF) mainly utilizes a medium access control protocol
to provide real-time service [8]. The implicit prioritization is
used instead of relying on control packets as most other pro-
tocols do. SPEED maintains a desired delivery speed across
the network through a novel combination of feedback con-
trol and non-deterministic QoS-aware geographic forward-
ing [9]. In [10], a two-hop neighbor information-based
gradient routing mechanism is proposed to enhance real-
time performance. The routing decision is made based on
the number of hops from a source to the sink and the two-
hop information.
2.1.2 Providing Reliability Service
Adaptive Forwarding Scheme (AFS) employs the packet
priority to determine the forwarding behavior to control the
reliability [11]. ReInforM uses the concept of dynamic
packet states to control the number of paths required for the
desired reliability [12]. However, both of AFS and ReInforM
require to know the global network topology. LIEMRO [13]
utilizes a dynamic path maintenance mechanism to monitor
the quality of the active paths during network operation
and regulates the injected traffic rate of the paths according
to the latest perceived paths quality. However, it does not
consider the effects of buffer capacity and service rate of the
active nodes to estimate and adjust the traffic rate of the
active paths.
2.1.3 Providing Real-Time and Reliability Services
MMSPEED extends SPEED for service differentiation and
probabilistic QoS guarantee [6]. It uses the same mecha-
nism as SPEED to satisfy the delay requirements for dif-
ferent types of traffic, and uses redundant paths to ensure
reliability. The MAC layer function is modified to provide
prioritized access and reliable multicast delivery of pack-
ets to multiple neighbors. However, when the network is
congested, all the source nodes still continuously transmit
packets to the sink along multipaths without taking some
other mechanisms, such as caching packets for some
time. This not only deteriorates reliability but also retards
the delay-sensitive packets. Energy-Efficient and QoS-
based Multipath Routing Protocol (EQSR) [14] improves
reliability through using a lightweight XOR-based For-
ward Error Correction (FEC) mechanism, which introdu-
ces data redundancy in the data transmission process.
Furthermore, in order to meet the delay requirements of
various applications, EQSR employs a queuing model to
manage real-time and non-real-time traffic. DARA [15]
considers reliability, delay and residual energy. But it
only differentiates the applications into two classes: criti-
cal and non-critical. The neighbor sets of a node for the
two kinds of applications are different and all the packets
belonging to the same category will be forwarded to the
next hop computed by the same function. Obviously, two
classifications of the applications in WSNs are not
enough. D. Djenouri and Balasingham proposed LOCAL-
MOR, which considers latency, reliability and energy
[16]. It puts the incoming packets into three queues
according to their requirements. LOCALMOR satisfies the
requirement of reliability-sensitive applications by trans-
mitting the data to both the primary sink and the second-
ary sink, which incurs much overhead. What’s more, it
combines the queue management mechanism and routing
to provide differentiated services.
How to design a routing protocol that provides data
integrity and delay differentiated services over the same
WSN simultaneously without incurring much overhead
is an extremely challenging problem. The main contribu-
tion of this paper is to borrow the concept of the potential
field from physics and design a novel potential-based
dynamic routing algorithm, IDDR, which can provide
high integrity and delay-differentiated services using
only local information.
2.2 Motivation
Fig. 1 illustrates a small part of a WSN. Suppose node 1 is
a hotspot and there are both high-integrity packets (hollow
rectangles) and delay-sensitive packets (solid rectangles)
from source nodes A, B and C. A commonly used routing
algorithm will choose the optimal path for all the packets.
For example, the standard shortest path tree (SPT) routing
will forward all of them to node 1 as shown in Fig. 1a.
This will cause congestion and thus lead to many high-
integrity packets loss and large end-to-end delay for delay-
sensitive packets. A multipath routing algorithm as shown
in Fig. 1b can utilize more paths to avoid hotspots. How-
ever, the low delay and high throughput are hardly met
simultaneously. The reasons are:
ZHANG ET AL.: DYNAMIC ROUTING FOR DATA INTEGRITY AND DELAY DIFFERENTIATED SERVICES IN WIRELESS SENSOR... 329
3. Delay-sensitive packets occupy the limited band-
width and buffers, worsening drops of high-integrity
ones.
High-integrity packets block the shortest paths,
compelling the delay-sensitive packets to travel
more hops before reaching the sink, which increases
the delay.
High-integrity packets occupy the buffers, which
also increases the queuing delay of delay-sensitive
packets.
To overcome the above drawbacks, we intend to design a
mechanism which allows the delay-sensitive packets to
move along the shortest path and the packets with fidelity
requirements to detour to avoid possible dropping on
the hotspots. In this way, the data integrity and delay differ-
entiated services can be provided in the same network. Moti-
vated by this understanding, we propose the IDDR scheme,
a potential-based multi-path dynamic routing algorithm.
As shown in Fig. 1c, the high-integrity packets do not
choose node 1 due to its large queue length. Some other idle
and/or underloaded paths, such as path 2 ! 3 ! Sink and
4 ! 5 ! 6 ! Sink, are used to cache and route these packets
efficiently so as to protect them from being dropped in the
hotspot. On the other hand, IDDR gives delay-sensitive packets
priority to go ahead in the shortest path to achieve low delay.
Furthermore, if the traffic on the shortest path is heavy,
IDDR can also select other paths for the delay-sensitive pack-
ets, such as path: A ! 4 ! 5 ! 6 ! Sink shown in Fig. 1d,
the link from node 1 to the sink is so busy that node A or B
will bypass node 1 and send packets to the sink along other
under-utilized paths to avoid packets being dropped.
IDDR distinguishes different types of packets using the
weight values inserted into the header of packets, and then
performs different actions on them. Its cornerstone is to con-
struct proper potential fields to make right routing decisions
for different types of packets. Next the potential-based
IDDR algorithm will be described in detail.
3 DETAILS ON IDDR
We first describe the potential fields on which IDDR is based.
Then we present how the potential fields improve the data
fidelity and decrease the end-to-end delay of packets.
3.1 Design of Potential Fields
A potential-based routing paradigm has been designed
for traditional wireline networks [17]. However, it did not
attract widespread attention because of its huge manage-
ment overhead. It is quite expensive to build an exclusive
virtual field for each destination in traditional networks
where numerous destinations might be distributed arbi-
trarily. On the contrary, the potential-based routing algo-
rithm is much suitable for the many-to-one traffic pattern
in WSNs. In some special applications and environments,
more than one sink may exist. However, generally the
data-centric WSNs only require nodes to transmit their
sampling data to one of them. Therefore, in this work, we
build a unique virtual potential field to customize a mul-
tipath dynamic routing algorithm, which finds proper
paths to the sink for the packets with high integrity and
delay requirements. Next, the potential-based routing
algorithm for WSNs with one sink is described. It is
straightforward to extend the algorithm to work in WSNs
with multiple sinks. In Section 3.4.3, we will introduce
this extension in detail.
Fig. 2 depicts a general potential field whose shape
looks like a bowl. All data packets are transmitted to the
bottom along the surface like water. In WSNs with light
traffic, IDDR works similar to the shortest path routing
algorithm. But in WSNs with heavy load, large backlogs
will form some bulges on the bowl surface. The bulges will
block the paths and prevent packets from moving down to
the bottom directly.
3.1.1 Potential Field Model
In the bowl model shown in Fig. 2, we can view the whole
network as a gravity field. A packet can be viewed as a drop
of water, moving down to the bottom along the surface of
the bowl. The trajectory of this packet is determined by the
force from the potential field.
A single-valued potential VvðtÞ is assigned to node v on
the bowl surface at time t to form a scalar potential field. Let
VvðtÞ be the neighbor set of node v during time t. Consider a
packet p at node v, to reach the sink, p will be forwarded to a
neighbor w 2 VvðtÞ. We define a force acting on the packet p
at node v based on the potential difference between node v
and node w at time t as follows:
Fv!wðtÞ ¼ VvðtÞ À VwðtÞ: (1)
The packet will be forwarded to the neighbor x at time t for
which the force Fv!xðtÞ is the maximum, namely, the neigh-
bor in the direction of the steepest gradient. If the surface is
smooth, the packet will move straightly down to the bottom,
Fig. 1. Motivation of IDDR.
330 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 2, FEBRUARY 2015
4. but if the surface is somewhat rough, the packet will move
along an irregular curve which is formed by a series of valleys.
3.1.2 Depth Potential Field
To provide the basic routing function, i.e., to make each
packet move towards the sink, the proposed IDDR
algorithm defines a depth potential field V d
v ðtÞ ¼ DvðtÞ,
where DvðtÞ is the depth of node v at time t. Thus the depth
field force Fd
v!wðtÞ from node v to its neighbor w 2 VvðtÞ is
Fd
v!wðtÞ ¼ DvðtÞ À DwðtÞ: (2)
The depth difference ðDvðtÞ À DwðtÞÞ 2 fÀ1; 0; 1g since two
nodes with more than one hops distance cannot become
neighbors.
3.1.3 Queue Length Field
Define the queue length potential field of node v at time t
as V q
v ðtÞ ¼ QvðtÞ, where QvðtÞ denotes the queue length
normalized to the buffer size of node v at t. Then the queue
length potential force Fq
v!wðtÞ from node v to w 2 VvðtÞ at
time t is
Fq
v!wðtÞ ¼ QvðtÞ À QwðtÞ: (3)
The range of QvðtÞ is ½0; 1Š, hence we get Fq
v!wðtÞ 2 ½À1; 1Š.
Note that the less is the backlog in the queue at node w,
the larger is the potential force. Hence, driven by this queue
potential field, packets will always be forwarded towards
the underloaded areas, bypassing the hotspots.
3.1.4 Hybrid Potential Field
We construct a virtual hybrid potential on the basis of the
depth and queue length potential fields defined above. The
two independent fields are linearly combined together:
V m
v ðtÞ ¼ aV d
v ðtÞ þ V q
v ðtÞ, where V m
v ðtÞ is the potential of the
mixed field at node v, and a 0. Then the mixed force
from node v to one of its neighbor w 2 VvðtÞ
Fm
v!wðtÞ ¼ ðQvðtÞ þ aDvðtÞÞ À ðQwðtÞ þ aDwðtÞÞ: (4)
Note that if a ¼ 0, then only the queue potential field works,
which cannot ensure that the packets generated by sensors
will be transmitted to the sink at last. Hence we let a 0.
In the next two subsections, we will illustrate how the
potential field and steepest gradient method improve fidel-
ity and decrease delay.
3.2 High-Integrity Services
How to provide high-integrity services for applications?
The basic idea of IDDR is to consider the whole network
as a big buffer to cache the excessive packets before they
arrive at the sink. There are two key steps: (1) Finding
enough buffer spaces from the idle or underloaded
nodes, which is actually resource discovery. (2) Caching
the excessive packets in these idle buffers efficiently for
subsequent transmissions, which implies an implicit hop-
by-hop rate control.
3.2.1 Resource Discovery
In a under-utilized WSN, the queue length is very small,
the hybrid potential field is governed by the depth poten-
tial field. IDDR performs like the shortest path algorithm,
that is, a node always chooses one neighbor with lower
depth as its next hop. However, in a over-utilized WSN,
the shortest paths are likely be full of packets. Therefore,
new coming packets will be driven out of the shortest
paths to find other available resource. If a node knows the
queue length information of its neighbors, it can forward
packets to the underloaded neighbors to stand against pos-
sible dropping. The following two propositions explain
how IDDR reaches this goal.
Proposition 1. Denote the depth of node v as d. Let S denote the
neighbors of node v with the same depth, that is, S ¼
fxjDxðtÞ ¼ d; x 2 VvðtÞg and L denote the neighbors of node
v with smaller depth, that is, L ¼ fxjDxðtÞ ¼ d À 1; x 2
VvðtÞg. Let l 2 L be the node with the minimal queue length in
L. If node s 2 S has the minimum queue length in S and satis-
fies that QsðtÞ QlðtÞ À a, then node v will choose node s
rather than node l as the next hop at time t.
Proof. If node v does not choose node l as its parent, it will
not choose any other nodes in L since node l has the min-
imal queue length and all the nodes in L have the same
depth. The potential values at nodes, v, l and s, are:
V m
v ðtÞ ¼ ad þ QvðtÞ; (5)
V m
l ðtÞ ¼ aðd À 1Þ þ QlðtÞ; (6)
V m
s ðtÞ ¼ ad þ QsðtÞ: (7)
We can derive the force values at node v as follows:
Fm
v!lðtÞ ¼ a þ ðQvðtÞ À QlðtÞÞ; (8)
Fm
v!sðtÞ ¼ ðQvðtÞ À QsðtÞÞ: (9)
On the other hand, we can rewrite QsðtÞ QlðtÞ À a as
ðQvðtÞ À QsðtÞÞ a þ ðQvðtÞ À QlðtÞÞ: (10)
Hence, we can readily have Fm
v!sðtÞ Fm
v!lðtÞ.
According to the potential field model, node v will
choose s as its next hop rather than l, which means that
the packets from node v will be forwarded to the neigh-
bors at the same depth since they have more available
buffer space to cache packets. tu
Fig. 2. The smooth “bowl” of depth potential field.
ZHANG ET AL.: DYNAMIC ROUTING FOR DATA INTEGRITY AND DELAY DIFFERENTIATED SERVICES IN WIRELESS SENSOR... 331
5. Remarks. Proposition 1 describes the tradeoff between the
path length and the queue length. If the lightest node
l 2 L has a small queue length, then packets will be for-
warded to it. However, if the queue length of node l is
large, sending packets to it will likely cause packets drop-
ping and thus severely deteriorate the performance of the
high-integrity applications. In this situation, it is better to
choose a node with smaller queue length even with the
same depth, such as node v, as the next hop.
Then how to quantify the queue length difference
between the nodes with smaller depth and that with the
same depth. Denote DQ ¼ QlðtÞ À QsðtÞ. Inequality
QlðtÞÀ QsðtÞ a can be rewritten as a DQ, which
implies that a is actually the threshold of the queue
length difference between node l and node s that node v
begins to send packets to the neighbor with the same
depth rather than that with lower depth. Since the nor-
malized queue length difference is not larger than 1, a
should be smaller than 1 to ensure that a node can send
packets to the under-utilized nodes with the same depth
when all the nodes with smaller depth are congested.
The smaller is the a, the larger is the possibility that a
node selects a neighbor with the same depth instead of
with smaller depth as the next hop.
Proposition 1 confirms that IDDR allows a node to
choose its next hop from the neighbors with the same depth.
Proposition 2. Denote the depth of node v as d. Let H ¼
fxjDxðtÞ ¼ d þ 1; x 2 VvðtÞg; S ¼ fxjDxðtÞ ¼ d; x 2 VvðtÞg
and L ¼ fxjDxðtÞ ¼ d À 1; x 2 VvðtÞg. Node s 2 S has the
minimal queue length in S, and node l 2 L has the minimal
queue length in L. If h has the minimum queue length in H
and node h satisfies QhðtÞ QsðtÞ À a as well as QhðtÞ
QlðtÞ À 2a, then node v will choose node h rather than node s
or l as the next hop at time t.
Proof. Similar to the proof of Proposition 1. tu
Remarks. Proposition 2 describes when IDDR chooses the
next hop from the neighbors with higher depth, namely,
forwards packets backwards. If there is not enough buf-
fers in the neighbors with the same and lower depth,
then packets will be sent to the node with the higher
depth to avoid congestion.
Rewrite QhðtÞ QlðtÞ À 2a as QlðtÞ À QhðtÞ 2a.
Since the maximum value of ðQlðtÞ À QhðtÞÞ is 1, we can
obtain that only when a 0:5, the IDDR algorithm can
allow a node to choose its next hop from the neighbors
with higher depth.
Combining the above two Propositions, we can con-
clude that nodes can only forward packets along the
shortest path when a 1, when 0:5 a 1, packets
will possibly be transmitted to the neighbors with the
same depth, and when 0 a 0:5, packets can be
transmitted to the neighbors with the same or even
higher depth to improve the data integrality.
3.2.2 Implicit Hop-by-Hop Rate Control
Once detecting a hotspot, if no optimal path, e.g., the short-
est path, exists, IDDR will send packets along a suboptimal
path. However, if all the neighbors of node v are congested,
which is likely to happen near the sink due to the many-to-
one traffic pattern in WSNs, node v should cache the arrived
packets before some neighbors have available buffer space.
Actually, this process is equivalent to a hop-by-hop rate
control, which is opposite to the end-to-end flow control of
TCP and the sink-source rate control in WSNs [18]. The
IDDR uses a simple rule described below to ensure that it
can efficiently cache the excessive packets that are to be sent
to the hotspots.
Rule 1. For node v, if QwðtÞ ¼ 1, where w 2 VvðtÞ, then w
should not be selected as the parent in any case at time t.
Thus, the excessive packets will be cached in the local
node rather than be dropped at successive nodes. Addi-
tionally, Rule 1 also implies an implicit source rate control.
If all the paths between a source node and the sink is full
of cached packets, this source node will be compelled to
slow down.
In a word, combining the queue length potential field
with Rule 1, the traffic-aware IDDR mechanism can spa-
tially and temporally spread packets in a reasonable pattern
to improve the overall throughput so as to meet the fidelity
requirements of high-integrity applications.
3.3 Delay-Differentiated Services
There are mainly four factors that affect the end-to-end
delay in WSNs: (1) Transmission delay. It is limited by
the link bandwidth; (2) Competition of the radio channel.
Especially under a contention based MAC, a packet has
to compete for the access of the channel and wait for
transmission until the channel is idle; (3) Queuing delay.
A large queue will seriously delay packets; (4) Path
length. Generally, the more hops a packet travels, the
large propagation delay it will suffer. The physical limi-
tation determines the transmission delay, and the MAC
affects the competition of the radio channel. They are
both beyond the scope of this paper. The IDDR aims to
decrease the queuing delay and shorten the path length
for delay sensitive packets.
Before describing how IDDR provides the delay-differen-
tiated services, we first observe some interesting properties
of the hybrid potential field. Then, we propose two effective
mechanisms to decrease the end-to-end delay of delay-sen-
sitive packets.
3.3.1 Slope of the Hybrid Potential Field
From Eq. (4), we know that parameter a is actually the slope
of the depth potential field:
@Fm
v!wðtÞ
@d
¼ a; (11)
where d ¼ DvðtÞ. Thus a significantly influences the choice
of the next hop. We now use an example to illustrate the
behavior of a packet in the potential fields with different
values of a. Fig. 3 shows the longitudinal section of two
depth fields with a ¼ 1:0 and a ¼ 0:5. The normalized
queue length of node x with depth d ¼ 3 is 0.6, and node
y with depth d ¼ 4 has an empty queue. For a packet at
node y in the potential field with a ¼ 1:0, it will directly
be forwarded to node x because the potential difference
between node y and node x is 0:4 ¼ ð4:0 À 3:6Þ. However,
332 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 2, FEBRUARY 2015
6. in the potential field with a ¼ 0:5, the packet at node y
cannot be directly forwarded to node x because the poten-
tial value ð2:0Þ of node y with depth d ¼ 4 is lower than
that ð2:1Þ of node x with depth d ¼ 3. Thus, we can see
that packets will be more easily driven out of the shortest
paths with smaller a. If we can use different a values to
build different depth fields, packets moving in these dif-
ferent fields will gain different services. IDDR uses this
interesting property to achieve different end-to-end delay
for different type of packets. Next we will present how to
obtain these different a values.
3.3.2 Packet Weight
Each packet header contains a 8-bit weight to represent the
level of delay sensitivity. The larger is the weight, the
more delay-sensitive is the packet. IDDR uses the weight
values to build different potential fields with different
slopes as follows:
a0
¼ a þ
Packet Weight
0xff
; (12)
where 0xff is the maximum of the 8-bit weight. A larger
a0
value means higher weight of the depth potential
field. Thus it is harder to drive heavy packets with larger
weight out of the shortest paths than light ones with
smaller weight. They will immediately occupy most of
the buffer along the shortest paths. The backlog filled by
the heavy packets will further reject the light ones. IDDR
will find other nodes and paths to cache the light packets
to improve their throughput, while the shortest paths
are used to forward the heavy ones to decrease their
end-to-end delay.
Once a node receives a packet with a non-zero weight,
a0
will be calculated to form an assistant routing table rel-
ative to the main routing table established using the origi-
nal value of a. Note that IDDR just builds multiple
potential fields temporally and locally, but does not main-
tain all the possible fields (at most 256) across the whole
network all the time, which can decrease the implementa-
tion overhead. Furthermore, Rule 1 will be disabled for
delay-sensitive packets. In other words, delay-sensitive
packets are not cached for the purpose of decreasing the
end-to-end delay.
3.3.3 Priority Queue
To further decrease the queuing delay, IDDR employs the
priority queue mechanism to allow the delay-sensitive pack-
ets to be transmitted prior to the other packets. Specifically,
the most heavy packets are transmitted first and the others
are ranked according to their weights. The packets with the
same weight are ordered according to their arrival time.
3.4 Design of IDDR Algorithm
3.4.1 Procedure of IDDR
Consider a WSN with different high-integrity or delay-sen-
sitive applications. Let c be the identifier of different appli-
cations. In summary, the main procedure of the IDDR
algorithm at node i works as follows:
1. If the queue at node i is not empty, then
aðcÞ
¼ a þ packet weight of p
0xff is computed for packet p at
the head of the queue.
2. Let Wi;bðtÞ¼fðQiðtÞ þ aðcÞ
DiðtÞÞÀðQbðtÞ þ aðcÞ
Db ðtÞÞg.
Select the next hop bÃ
¼ argmaxb2ViðtÞ;QjðtÞ6¼1Wi;bðtÞ.
3. Node i sends packet p to node bÃ
. Go to (1).
3.4.2 Construction of Depth Potential Field
The depth potential field is important because it provides the
basic routing function. It is constructed based on the depth
value of each node. At the beginning, the depth values of all
the nodes are initialized to 0xff, except that the default
depth of the sink is 0. The sink first sends a depth update
message, the nodes one hop away from the sink obtain their
own depth by adding 1 to the depth value in the update mes-
sage and then send new update messages with their own
depth values. Similarly, all the other nodes can obtain their
own depth by receiving update messages from their neigh-
bors who already know the depth value. Multiple sinks may
exist in large scale WSNs. According to the procedure of the
depth potential field construction, these sinks will periodi-
cally broadcast their update messages of depth. The nodes
receive these update messages, compare the different depth
values from different sinks, and then choose the nearest sink
as its destination. If the smallest depth value is not unique,
the node can choose one of them randomly. Actually, when
multiple sinks exist in a large scale WSN, IDDR will naturally
partition the whole networks into subregions managed by
different sinks. Therefore, IDDR can work in large scale
WSNs with multiple sinks.
3.4.3 Signaling
Each node requires the depth and queue length of its
neighbors to make forwarding decisions. How often to
update the depth and queue length between neighbors is
quite important since too small period leads to much
overhead while too large period leads to imprecise infor-
mation. IDDR defines a Maximum Update Interval (MUI)
and a Least Update Interval (LUI) between two successive
update messages. MUI is always larger than LUI. The
update messages should be sent between a LUI and a
MUI at least once. If no message is received from a neigh-
bor during two MUIs intervals, this neighbor will be con-
sidered dead, and IDDR will recalculate the depth and
other related values. An update message will be sent
Fig. 3. The Slope of the potential field. The solid line represents the lon-
gitudinal section of depth potential field; the solid dots on the horizontal
axis are nodes; the short vertical bars over the dots denote the normal-
ized queue length of these nodes.
ZHANG ET AL.: DYNAMIC ROUTING FOR DATA INTEGRITY AND DELAY DIFFERENTIATED SERVICES IN WIRELESS SENSOR... 333
7. when any one of the following events occurs: (1) MUI
timer expires. If the elapsed time since sending the last
update message exceeds the MUI, a new update message
will be sent immediately no matter whether the depth or
queue length has changed. (2) Queue length variation
exceeds a certain threshold. If the queue length of a node
has varied 10 percent compared with that in the last suc-
cessful update message, and the elapsed time exceeds the
LUI since the last update message. (3) Depth changes. If
the depth of a node has changed, and the elapsed time
exceeds the LUI since the last successful update message.
4 PERFORMANCE ANALYSIS
As a decentralized algorithm, the proposed IDDR algo-
rithm needs to be stable to guarantee its normal running.
In this section, we will prove that IDDR is stable and
throughput-optimal using the Lyapunov drift technique.
To use the technique, we assume that IDDR operates in
slotted time with slots normalized to integral units n,
n 2 f0; 1; 2; . . .g. The length of the time slot can be LUI of
update messages.
Consider a WSN as a graph G½nŠ ¼ ðN ½nŠ; L½nŠÞ, where
N [n] is the set of nodes and L[n] is the set of links at time
slot n. Let ma;b½nŠ denote the transmission rate over link
ða; bÞ at time slot n. Before proceeding further, we first sum-
marize the assumptions for the analysis and define two con-
cepts, i.e., stability and capacity region.
Assume that the packet arrival processes of different
applications to node i at time slot n, A
ðcÞ
i ½nŠ, are i.i.d., and
ergodic with rates
ðcÞ
i , hence limn!1
1
n
PnÀ1
t¼0 A
ðcÞ
i ½tŠ ¼
ðcÞ
i .
All the links have the same transmission rate. The trans-
mission rate and the arrival rate are assumed to be
bounded:
P
b mi;b½nŠ mout
max;i;
P
a ma;i½nŠ min
max;i;
P
c
ðcÞ
i
max
i , where mout
max;i; min
max;i and max
i are constants and rep-
resent the upper bounds of the summation of outgoing
traffic, incoming traffic from neighbors and exterior
incoming traffic at node i, respectively. All nodes have
the same buffer size B.
Besides, since IDDR focuses on providing differentiated
services at the routing layer, we assume a proper MAC
layer protocol is provided in WSNs.
Stability. The network is stable under a policy if the sum
of the number of backlogged packets in the network has an
upper bound that does not depend on the initial condition.
Network capacity region. All the rate matrices
ðcÞ
i that can
be supported over a network G composes the network
capacity region LG.
Under a given stationary randomized transmission
scheduling policy, let ~f ¼ ðf
ðcÞ
a;b Þða;bÞ2L where f
ðcÞ
a;b ¼ Efm
ðcÞ
a;b½nŠg.
A routing algorithm providing differentiated services
will stabilize the network if and only if the following
conditions are satisfied:
f
ðcÞ
a;b ! 0; fðcÞ
a;a ¼ 0 8a; b; c; (13)
ðcÞ
i þ
X
a
f
ðcÞ
a;i
X
b
f
ðcÞ
i;b (14)
X
i;c
ðcÞ
i ¼
X
a2Vsink
fa;sink: (15)
The establishment of equation (15) results from the fact
that the sum of the exogenous flow is equivalent with the
sum of the data that reaches to the sink when the network
becomes stable.
We say traffic ~A½nŠ ¼ ðA
ðcÞ
i ½nŠÞi2N can be stabilized if a
routing algorithm exists under which the mean of the
number of packets queued in the network is bounded.
According to the definition of the capacity region, ðð1þ
Þ~A½nŠÞ 2 LG implies that there exists a stationary random-
ized control algorithm that makes valid decisions ~m such
that E
È P
b ~mi;b½nŠ À
P
a ~ma;i½nŠ
É
¼
ðcÞ
i þ , and the expecta-
tion is based only on the current topology state Si½nŠ and
independent of the queue length of node i at time slot n,
Ui½nŠ [19].
Next we will prove that IDDR is stable whenever ~A½nŠ is
interior in the capacity region LG. Vi½nŠ is the set of neigh-
bors of node i at time slot n. ^Vi½nŠ ¼ fbjb 2 Vi½nŠ; Qb½nŠ 6¼ 1g
and ^L½nŠ ¼ fða; bÞjQb½nŠ 6¼ 1g.
Lemma 1. Under the assumption that the link capacity is equal
for all links, the distributed IDDR algorithm is equivalent to
the centralized optimization problem
max
X
ði;bÞ2^L½nŠ
Wi;b½nŠmi;b½nŠ: (16)
Proof. In IDDR, node i selects the next hop bÃ
according to the
solution of maxb2^Vi½nŠWi;b½nŠ. Hence the proposed IDDR
algorithm is based on solving the optimization problem:
max
P
i maxb2^Vi½nŠWi;b½nŠ. Since all links have the same
link capacity, the problem of max
P
i maxb2^Vi½nŠWi;b½nŠ can
be transformed into max
P
i maxb2^Vi½nŠfWi;b½nŠmi;b½nŠg.
Since the routing scheme does not consider the interfer-
ence in MAC layer and a node will send packets to only
one neighbor of it at the same time, we can obtain that:
max
X
i
max
b2^Vi½nŠ
fWi;b½nŠmi;b½nŠg
¼ max
X
i
max
X
b2^Vi½nŠ
Wi;b½nŠmi;b½nŠ
8
:
9
=
;
0
@
1
A;
¼ max
X
i
X
b2^Vi½nŠ
Wi;b½nŠmi;b½nŠ:
(17)
Note that f
P
iði; bÞjb 2 ^Vi½nŠg can be written as fði;
jÞjði; jÞ 2 ^L½nŠg. So we have max
P
i
P
b2^Vi½nŠ Wi;b½nŠÂ
mi;b½nŠ ¼ max
P
ði;bÞ2^L½nŠ Wi;b½nŠmi;b½nŠ: tu
Lemma 1 shows that the properties of IDDR could be
derived by analyzing the centralized algorithm.
Ui½nŠ is the queue length of node i at time slot n. Define
the Lyapunov function Lð~U½nŠÞ as follows:
Lð~U½nŠÞ ,
1
2
XN
i¼1
ðUi½nŠÞ2
: (18)
Note that Lð~U½nŠÞ ¼ 0 if and only if all network queues are
empty at time slot n, and that Lð~U½nŠÞ is large whenever one
or more components of ~U½nŠ is large.
Dð~U½nŠÞ is defined as the one-step conditional Lyapunov
drift:
334 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 2, FEBRUARY 2015
8. Dð~U½nŠÞ , EfLð~U½n þ 1ŠÞ À Lð~U½nŠÞj~U½nŠg: (19)
In the following proofs of Lemma 2 and Theorem 1,
the subscripts b denotes b 2 ^Vi½nŠ and a denotes a 2
Vi½nŠ. For the sake of saving space, some subscripts are
not explained.
Lemma 2. The one-step conditional Lyapunov drift satisfies
the following constraint for all n and all ~U½nŠ,
Dð~U½nŠÞ M þ
X
i
À
Ui½nŠE
È
ðcÞ
i jUi½nŠ
É
À Ui½nŠE
X
b2^Vi½nŠ
mi;b½nŠ À
X
a2Vi½nŠ
ma;i½nŠÞjUi½nŠ
0
@
9
=
;
8
:
1
A:
(20)
With constant M , 1
2
P
i½ðmout
max;iÞ2
þ ðmin
max;i þ max
i Þ2
Š,
where mout
max;i; min
max;i and max
i are constants and represent the
upper bounds of the summation of outgoing traffic, incoming
traffic from neighbors and exterior incoming traffic in terms of
node i, respectively.
Proof. The queue length at slot n þ 1 at node i can be
bounded in terms of the current backlog at slot n as
follows:
Ui½n þ 1Š ¼ max Ui½nŠ À
X
b2^Vi½nŠ
mi;b½nŠ; 0
8
:
9
=
;
þ
X
a2Vi½nŠ
ma;i½nŠ þ Ai½nŠ;
where Ai½nŠ represents the exogenous arrival process at
node i during time slot n. Hence we have:
ðUi½n þ 1ŠÞ2
Ui½nŠ À
X
b
mi;b½nŠ
2
þ
Ai½nŠ þ
X
a
ma;i½nŠ
2
þ 2Ui½nŠ
Ai½nŠ þ
X
a
ma;i½nŠ
:
Because the arrival processes are i.i.d., we can get
limt!1
1
t
PtÀ1
t¼0 A
ðcÞ
i ½tŠ ¼
ðcÞ
i . Thus, the Lyapunov drift is
Dð~U½nŠÞ
1
2
X
i
X
b
mi;b½nŠ
2
þ
ðcÞ
i þ
X
a
ma;i½nŠ
2
À Ui½nŠE
X
b
mi;b½nŠ À
ðcÞ
i À
X
a
ma;i½nŠ
Á
jUi½nŠ
'!
:
With constant M , 1
2
P
i½ðmout
max;iÞ2
þ ðmin
max;i þ max
i Þ2
Š,
we can obtain Eq. (20). tu
Theorem 1. Given the arrival processes ~A½nŠ such that ðð1þ
Þ~A½nŠÞ 2 LG and the topology state ~S½nŠ is i.i.d. from slot to
slot, the network is stochastically stable under the IDDR
algorithm.
Proof. By adding and subtracting BaðcÞ
Di½nŠEfð
P
b2^Vi½nŠ
mi;b½nŠ À
ðcÞ
i À
P
a2Vi½nŠ ma;i½nŠ
Á
jUi½nŠg and noting that
Ui½nŠ ¼ BQi½nŠ, we get
Dð~U½nŠÞ M þ
X
i
B ðQi½nŠ þ aðcÞ
Di½nŠÞE
È
ðcÞ
i jUi½nŠ
É
À ðQi½nŠ þ aðcÞ
Di½nŠÞE
X
b
mi;b½nŠ À
X
a
ma;i½nŠ
Á
jUi½nŠ
'!
þ BaðcÞ
Di½nŠE
X
b
mi;b½nŠ À
ðcÞ
i À
X
a
ma;i½nŠ
jUi½nŠ
'
(21)
The IDDR algorithm maximizes
P
ði;bÞ2^L½nŠ Wi;b
½nŠmi;b½nŠ. Also, ðð1 þ Þ~A½nŠÞ 2 LG implies that there
exists ~m such that E
È P
b ~mi;b½nŠ À
P
a ~ma;i½nŠ
É
¼
ðcÞ
i þ .
Thus, we can get
X
i
ðQi½nŠ þ aðcÞ
Di½nŠÞ
E
X
b
mi;b½nŠ À
X
a
ma;i½nŠ
Á
jUi½nŠ
'!
¼
X
a
ðQa½nŠ þ aðcÞ
Da½nŠÞE
X
b
ma;b½nŠjUi½nŠ
'
½nŠ
À
X
b
ðQb½nŠ þ aðcÞ
Db½nŠÞE
X
a
ma;b½nŠjUi½nŠ
'
¼
X
ða;bÞ2^L½nŠ
Wa;b½nŠEfma;b½nŠjUi½nŠg
!
X
ða;bÞ2^L½nŠ
Wa;b½nŠEf~ma;b½nŠjUi½nŠg
¼
X
i
ðQi½nŠ þ aðcÞ
Di½nŠÞ
E
X
b
~mi;b½nŠ À
X
a
~ma;i½nŠ
Á
jUi½nŠ
'!
¼
X
i
½ðQi½nŠ þ aðcÞ
Di½nŠÞð
ðcÞ
i þ ÞŠ:
(22)
Furthermore, considering that ma;b 0 if and only if
when node a and node b are neighbors, i.e., jDa½nŠÀ
Db½nŠj 1, we can get
X
i
BaðcÞ
Di½nŠE
X
b
mi;b½nŠ À
X
a
ma;i½nŠ
jUi½nŠ
'
¼
X
a;b
BaðcÞ
ðDa½nŠ À Db½nŠÞEfma;b½nŠjUi½nŠg
X
i
Bamax
mout
i;max:
(23)
Combining Eqs. (21)-(23) and defining a constant
M1 , M þ
P
i Bamax
mout
max;i, we can obtain that
Dð~U½nŠÞ M1 À
X
i
À
Ui½nŠ þ aðcÞ
BDi½nŠ
Á
: (24)
Hence, 9Umax
such that when
P
i Ui½nŠ Umax
,
Dð~U½nŠÞ 0, i.e., the network is stable. tu
5 EXPERIMENTAL EVALUATION
IDDR is proved stable as long as the exogenous arrival
rates are interior in the network capacity region in last
ZHANG ET AL.: DYNAMIC ROUTING FOR DATA INTEGRITY AND DELAY DIFFERENTIATED SERVICES IN WIRELESS SENSOR... 335
9. section. In this section, we will evaluate whether IDDR can
provide high data-integrity and delay-differentiated serv-
ices using experiments.
5.1 Experimental Setup
The testbed is comprised of 10 sensors as shown in Fig. 4.
There are one data-integrity application App 1 with weight
of 0 and one delay-sensitive application App 2 with weight
of 200. Nodes 8 and 4 are the source nodes of Apps 1 and 2,
respectively. Both of the two types of packets have two
paths to the sink. One path has three hops while the other
one has four hops. The power of the sensor nodes except
from node 1 is set to five to allow node 4 and node 8 to reach
both of the two paths. To evaluate the effectiveness of IDDR,
we let node 9 generate background traffic that transmit
along the shorter path with three hops. Thus, the shorter
path will be more congested than the longer path. If IDDR
works normally, the high-integrity application App 1 will
choose the longer path if the shorter path is too congested,
while the delay-sensitive packets of App 2 will choose the
shorter path with three hops to achieve small end-to-end
delay. The parameter a in IDDR is set to 0.4.
Traffic generation. Source nodes 4, 8 and 9 generate packets
at interval of 20 ms. Both of App 1, App 2 and the back-
ground traffic start from 5 second and App 1 and the back-
ground traffic end at 25 second while App 2 ends at
45 second. The packet size is 25 Bytes. The buffer size in each
node is eight packets. The LUI of the depth and queue length
information is 200 milliseconds and the MUI is 20 seconds.
Performance metrics. To investigate whether IDDR can pro-
vide high integrity and low end-to-end delay, we use the
average drop ratio and packet delay as the performance met-
rics. To obtain the end-to-end delay suffered by a packet, the
sink needs to subtract the packet send time from the packet
receive time. Since the packet send time is assigned by the
sender, time synchronization is required among all the sensor
nodes to obtain accurate end-to-end delay. In our testbed, we
use node 1 to synchronize the clock of all the sensor nodes.
The power of node 1 is set to the maximum value, 31, to make
it can communicate with all the other sensors. At the start of
our experiments, node 1 sends a packet to all the other sen-
sors to restart their clock. The TinyOS’s standard routing
algorithm, MintRoute, is selected as the reference protocol.
5.2 Experimental Results
Figs. 5 and 6 show the drop ratio of the two applications
versus time with IDDR and MintRoute on our testbed,
respectively. We can see that both of App 1 and App 2 in
IDDR achieve smaller drop ratio than MintRoute. From 5
to 25 second, the drop ratio of App 1 is smaller than that of
App 2. This is because if the load difference of the shorter
path and the longer path is quite large, then the packets of
App 1 will choose the longer path since the longer path has
much smaller queue length potential field. Otherwise, the
packets of both of Apps 1 and 2 will be sent to node 3.
However, after some time, the queue length potential field
of node 3 will increase to a large enough value to force the
packets of App 1 to choose node 7 as the next hop to
achieve high fidelity according to Proposition 1. Therefore,
the congestion along the shorter path is always more severe
than the longer path. Correspondingly, App 2 has higher
drop ratio. While in MintRoute, App 1 and App 2 suffer
almost the same drop ratio, and the drop ratio is larger
than that in IDDR. Especially, the drop ratio of App 1 in
MintRoute is about twice of that in IDDR. This is because
all the packets are not differentiated in MintRoute, they
will choose the shorter path no matter whether it is con-
gested or not. From 25 to 45 second, App 2 does not gener-
ate more packets, the drop ratio of App 1 decreases in both
IDDR and MintRoute since App 1 takes up the shorter path
without contention with App 2. Fig. 7 shows the queue
length at node 3 and node 7. It shows that before 25 second,
node 3 has larger queue length since it is always more con-
gested than node 7. After 25 second, the queue length of
node 3 is quite small and node 7 is zero.
Figs. 8 and 9 depict the end-to-end delay with IDDR and
MintRoute, respectively. From 5 to 25 seconds, the end-to-
end delay of App 1 is quite larger since most packets of
App 1 are sent to the sink along the longer path. The
shorter path has three hops while the longer path has four
hops. The ratio of the end-to-end delay suffered by Apps 1
and 2 is accord with the ratio of the length of the two paths.
While in MintRoute, the packets of Apps 1 and 2 have
almost the same end-to-end delay. From 25 to 45 seconds,
Fig. 4. Testbed. Node 4 and 8 generate packets with weight of 200 and
0, respectively. Node 1 is used for clock synchronization. Node 9 gener-
ates background traffic along the shorter path. The others are intermedi-
ate nodes.
Fig. 5. Drop ratio of each application under IDDR on the testbed.
Fig. 6. Drop ratio of each application under MintRoute on the testbed.
336 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 2, FEBRUARY 2015
10. App 2 terminates. In IDDR, we can see that App 1 moves
traffic to the shorter path and thus achieves smaller end-to-
end delay. While in MintRoute, Since App 1 always choose
the shorter path, the end-to-end delay only decreases a lit-
tle. The reduction is caused by the smaller queuing delay
at the intermediate nodes.
6 SIMULATIONS
To evaluate the performance of IDDR in large-scale WSNs, a
series of simulations are conducted on the TOSSIM platform
built in TinyOS [1]. We specify IDDR with a ¼ 0:6 and
a ¼ 0:4 as the representative algorithms. As previously
stated after the remarks of Proposition 1 and 2, when
a ¼ 0:4, the packets are allowed to be sent to the neighbors
with the same or higher depth to bypass the hotspots,
whereas when a ¼ 0:6, the packets are only allowed to be
transmitted to the neighbors with the same depth. The per-
formance of IDDR with a ¼ 0:6 and a ¼ 0:4 is compared
with MintRoute and IDDR with a ¼ 0:1.
6.1 Simulation Setup
Fig. 10 shows a randomly deployed rectangular network
and three monitoring areas. 600 nodes spreading over a
100 Â 100 meters square form a flat multi-hop network.
There is only one sink residing at the center, and the
communication range is 6 meters. The detailed deployment
configuration is summarized in Table 1.
There are three applications running over the network
from 100 s to 160 s: APP 1 is one high-integrity application
generating packets with weight of 0 at the sampling rate of
4 Kbps. APP 2 and APP 3 are delay-sensitive applications
and generate packets with weights of 50 and 200, respec-
tively at the sampling rate of 8 Kbps. Fig. 10 indicates the
positions of the monitoring areas. and Table 2 describes
when and how these applications generate packets.
6.2 High-Integrity Services
In this subsection, we evaluate the ability of IDDR to provide
high integrity services. Only the basic Resource Discovery and
Implicit Hop-by-hop Rate Control (Rule 1) functions that are
designed to support high-integrity services are enabled, while
the delay differentiated service is shielded, that is, the packet
weight of all the applications are zero.
Table 3 shows the throughput under MintRoute and
IDDR with different a. The three applications have gener-
ated totally 3; 571 packets. IDDR (a ¼ 0:6) receives 2,893 of
them and IDDR (a ¼ 0:4) gets 3,142, but MintRoute and the
shortest path algorithm (IDDR with a ¼ 1:0) receive 1,599
and 2,106 packets, respectively. These results indicate IDDR
significantly improves the throughput.
Fig. 11 presents the receiving packet rate, i.e., the rate at
which the sink receives packets, which explains why IDDRs
have higher throughput. A lot of packets that are likely
dropped under other routing algorithms are cached for a
short time and eventually reach the sink in IDDR. Thus,
IDDR successfully smooths the bursts and prevents the
burst packets from dropping. On the contrary, MintRoute
drops most of the burst packets. Although the shortest path
algorithm (IDDR with a ¼ 1:0) performs much better than
MintRoute, both of them receive fewer packets at the sink
out of the bursting time (100 s $ 130 s), while IDDRs con-
tinue to receive a lot.
Rule 1 plays an important role in improving the
throughput. It ensures that the excessive packets are effi-
ciently cached and prevents them from dropping.
Another simulation experiment has confirmed this state-
ment: without Rule 1, the throughput of IDDR (a ¼ 0:6)
and IDDR (a ¼ 0:4) drops to 2,192 (from 2,893) and 2,333
(from 3,142), respectively. In addition, Rule 1 indeed
slows down the transmission rates in a hop-by-hop way.
When the paths between the source nodes and the sink
are full of packets, the source will be compelled to
Fig. 8. Average packet delay of each application under IDDR on the
testbed.
Fig. 7. Queue length of node 3 and node 7 under IDDR.
Fig. 9. Average packet delay of each application under MintRoute on the
testbed.
Fig. 10. Simulation topology: Randomly deployed network.
ZHANG ET AL.: DYNAMIC ROUTING FOR DATA INTEGRITY AND DELAY DIFFERENTIATED SERVICES IN WIRELESS SENSOR... 337
11. decrease its rate. Fig. 12 illustrates that the source node
does not inject all the packets generated by the applica-
tions into the network during the bursting time
(100 s $ 130 s), which confirms that the implicit source
rate control endowed by Rule 1 is effective.
To improve the fidelity required by high data integrity
applications, IDDR likely introduces some extra delay.
Table 4 shows the end-to-end delay of each application
under MintRoute and IDDRs with different a. As stated in
Section 2, this extra delay is unavoidable because of the
many-to-one traffic pattern of WSN.
Fortunately, IDDR can provide delay differentiated
services to decrease the end-to-end delay for real time
applications (App2 and APP3) by establishing multiple
potential fields with different slopes. A priority queue is
also used to shorten the queuing delay. In the next subsec-
tion, we will show how IDDR provides delay differentiated
services without affecting the fidelity of high integrity
applications.
6.3 Delay Differentiated Services
Table 5 shows the end-to-end delay of each application
under IDDR with a ¼ 0:6 and a ¼ 0:4. Compared with
Table 4, the full version of IDDR successfully decreases the
end-to-end delay for delay-sensitive applications (App2
and App3), while the throughput of the non-delay-sensitive
application remains relatively high, i.e., 1,171 packets are
generated and 1,042 packets are received.
Fig. 13 shows the receiving packet rate of each applica-
tion at the sink. IDDR caches most packets generated by
App1 in the intermediate nodes during the bursting time
(100 s $ 130 s) to give way to the delay-sensitive applica-
tions. After the burst period, all these packets are eventually
sent to the sink, which keeps high throughput for the high-
integrity application (App1). Thus, what IDDR has done is
to give higher priority to delay-sensitive packets, and at the
same time, cache non-delay-sensitive packets in the idle
and underloaded paths for later transmission to avoid
packet losses.
Fig. 14 plots the average end-to-end delay of each appli-
cation. We can see that both of the delay-sensitive applica-
tions gain a steady low delay while App 1 suffers much
larger delay. The reason is already shown in Fig. 13: most
packets from App 1 wait to be transmitted after the packets
from App 2 and 3. At 170 s, since most of the blocked pack-
ets have arrived at the sink, the end-to-end delay of App 1
becomes quite small.
As mentioned in Section 3.3, one important reason that
IDDR can decrease the delay is that IDDR shortens the
path of the heavy packets by building fields with different
slopes. Fig. 15 presents the distribution of hops experi-
enced by packets. Obviously, most of the packets from two
delay-sensitive applications have been received within
26 hops, which is close to the maximum depth in the net-
work, while the packets from App1 travel more hops
because they may be forwarded in non-shortest paths.
Priority queue is another mechanism used to decrease
the end-to-end delay. Two sets of simulations are conducted
to evaluate the impact of priority queue. One is only with
TABLE 1
Configuration of Parameters: Random Deployment
TABLE 2
Applications and Packet Bursts Description
TABLE 3
Integrity Services: Throughput of the Whole Network
TABLE 4
Integrity Services: End-to-End Delay
Fig. 11. Integrity services: The distribution of transmission over the time.
The RPR value is an average in every 10 seconds.
Fig. 12. The implicit source rate control of Rule 1.
338 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 2, FEBRUARY 2015
12. the priority queue, but without the support of the different
sloped fields, another has only the different sloped fields,
but without the priority queue. By comparing the data in
Tables 5 and 6, we can conclude that the priority queue sig-
nificantly influences the performance of IDDR. On one
hand, without the different sloped fields, delay-sensitive
packets will be driven out of the shortest path and com-
pelled to travel more hops before reaching the sink. On the
other hand, without the priority queue, they will be delayed
in the full queue or even be blocked by the non-delay-sensi-
tive packets. The combination of these two mechanisms
shows a nice performance (see Table 6).
6.4 Other Considerations
6.4.1 Energy Efficiency
Energy is the most critical resource for WSNs. The energy
efficiency of IDDR is investigated. In all simulations, we
use a simple linear energy model. Since sending a packet
needs more energy than receiving one [20], without loss
of generality, we assume that 3 units of energy consumed
for sending, and 2 units for receiving. Table 7 presents
the energy consumption per received packet which is
usually used to evaluate the energy efficiency. The result
show that IDDR with a ¼ 0:6 and a ¼ 0:4 have to spend
more energy to successfully transfer a packet than the
shortest path algorithm. The main reason is that the non-
delay-sensitive packets would have to travel more hops
(see Fig. 15) to be cached in the idle and/or underloaded
areas. However, it is worthy to better services with some
extra energy expenditure.
6.4.2 Reasonable Routing Loops
It is proved that the time-invariant potential field is loop-
free [17]. Unfortunately, the queue length field in IDDR
is a time-variant field, and we have indeed observed the
routing loops.
A typical routing loop is caused by a local minimal
potential, which is a hollow in our bowl model. At the
beginning, nodes around this minimal potential node may
send their packets to it, so this hollow will be filled up after
some time. Once the potential of this node goes higher than
that of any nodes around it, it will send back the packets
just received from the neighbors, which causes a routing
loop. We believe that this type of loops is reasonable
because the node with a locally minimal potential acts like a
packet pool to cache the excessive high-integrity packets.
Note that, a characteristic of this kind of loops is that they
just occur in two hops.
Fig. 16 presents the distribution of the number of radio
links in the loops under IDDR (a ¼ 0:6 and a ¼ 0:4). Most of
TABLE 5
Delay Differentiated Services: Throughput and
End-to-End Delay
Fig. 13. Receive packet rate of each application (a ¼ 0:4).
Fig. 14. Distribution of delay of each application (a ¼ 0:4).
Fig. 15. The distribution of hops received packets travels (a ¼ 0:4).
TABLE 6
Evaluate the Priority Queue: End-to-End Delay
TABLE 7
Energy Consumption per Received Packet
Fig. 16. The distribution of hops of loops.
ZHANG ET AL.: DYNAMIC ROUTING FOR DATA INTEGRITY AND DELAY DIFFERENTIATED SERVICES IN WIRELESS SENSOR... 339
13. the loops occur in two hops, which means most of them are
involved in a reasonable packet pool. Therefore, we con-
clude that IDDR just suffers a tiny routing loop problem.
6.4.3 Queue Oscillation
Generally, using the queue length as a routing metric pos-
sibly causes routing oscillation. However, IDDR does not
suffer from this problem. When a hot spot appears, the
flows carrying the lightest packets would be first deviate
this path, then the second lightest one, and so on. When a
large queue begins to fall, the relatively heavy packets
would firstly come back, and so on. Therefore, there are
always some flows passing through the hot spot, and the
oscillation may seldom happen because not all the flows
are driven out simultaneously, and also they do not switch
back at the same time. Fig. 17 illustrates the variation of
the queue length at node 173 which resides on the shortest
path of the application monitoring areas and near the sink.
The queue length does not exhibit obvious oscillation.
6.4.4 Overhead
The cost of detecting topology variation or queue length
information is unavoidable for IDDR. As stated in Section
3.4.3, when the queue length or depth changes or the MUI
timer fires, an update message will be sent. We called the
overhead caused by the depth or queue length variation as
Event Caused, and that caused by MUI timer fires as Timer
Caused. We measured the overhead caused by these opera-
tions. The overhead is defined as the ratio of the number of
bytes used to transmit update messages to that used to
transmit the sampled data. In the TOSSIM simulator, the
packet header size is 27 bytes, and the payload has 30 bytes.
While the update message includes depth and queue length
information, which takes 2 bytes. Besides, it should contain
the source address (generally 2 bytes) and type (1 bytes),
which take 3 bytes. Hence, each update message has 5 bytes.
Fig. 18 shows the overhead caused by the event or MUI
timer with different MUI values. We can see that the over-
head is between 0.5 and 4 percent, which is acceptable. As
the MUI becomes larger, the overhead of Timer Caused
decreases, while the overhead of Event Caused increases.
However, when MUI is larger than 50 s, the total overhead
almost keeps stable.
6.5 Parameter Analysis
6.5.1 Parameter of IDDR a
The parameter a plays a vital role in the proposed IDDR
algorithm. To evaluate the impact of it on the performance
of IDDR, a series of simulations with different a values are
conducted. Fig. 19 shows the drop ratio of the three applica-
tions versus different a values. We can see that as a
increases, the drop ratio increases. This is because the larger
is a, the smaller is the weights of the queue length potential
field. Then the probability of a packet being transmitted to a
node with lower depth but larger queue length grows.
Therefore, more packets will be dropped due to contention
for the congested buffer space.
Fig. 20 illustrates the end-to-end delay with standard
deviation. The end-to-end delay of App 1 decreases as a
increases. Similar to the analysis of Fig. 19, with larger a,
the packets of App 1 would select shorter paths to reach
the sink. However, the end-to-end delay of App 2 and 3
changes a little. This is because the weights of them are
larger and thus their packets are likely to be routed along
the shortest path even if a is small. For example, the pack-
ets of App 3 have the weight value of 200. Even if a ¼ 0:1,
a þ weight
0xff ¼ 0:88. What’s more, when a increases, more
packets of App 1 contend for the shortest path, leading to
larger queuing delay. Therefore, the end-to-end delay of
App 2 and 3 with different a change little.
Note that the results shown in Figs. 19 and 20 also indi-
cate that the performance of IDDR is not very sensitive to a.
Fig. 18. The overhead caused by update messages with different MUI.
Fig. 19. Drop ratio versus different a values.
Fig. 20. End-to-End delay with standard deviation versus different a
values.
Fig. 17. The variation of the queue length on node 173.
340 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 2, FEBRUARY 2015
14. Especially when a takes values between 0:1 and 0:7, the
drop ratio and end-to-end delay are almost invariant.
6.6 Other Scenarios
To evaluate whether IDDR works well in other scenarios,
we generate a circular topology with 700 nodes and three
applications as shown in Fig. 21. The diameter of the WSN
is 150 meters and the sink locates at the center of the circle.
App 1 requires high integrity while App 2 and 3 are delay-
sensitive applications.
Different communication range. In practice, the communi-
cation range of sensor nodes can be changed by adjusting
the power value. Since IEEE 802.15.4 with the communica-
tion range of around 10 meters is a widely used MAC proto-
col in WSNs, we conduct a series of simulations by varying
the communication range from 5 to 15 meters. Given that
the topology is unchanged, the node density grows as the
communication range increases.
Figs. 22 and 23 show the drop ratio and end-to-end
delay of the three applications with different communica-
tion ranges. We can see that Apps 2 and 3 achieve small
end-to-end delay and suffer higher drop ratio, while App
1 with high-integrity requirement suffers larger end-to-
end delay but has the smallest drop ratio. This is because
the packets of App 1 bypass the congested shortest path
and move along the longer and lighter paths to the sink.
The packets of App 1 do not contend the bandwidth of
the shortest paths with the packets of Apps 2 and 3, thus
Apps 2 and 3 loss fewer packets as well as achieve small
end-to-end delay.
We investigate the log in the scenario with the communi-
cation range of 10 meters and draw their route paths to intu-
itively explain why IDDR can provide differentiated
services. Figs. 24 and 25 show the route paths of the three
different applications under MintRoute and IDDR, respec-
tively. In MintRoute, three applications quickly converge to
the same path since MintRoute makes routing decisions
without considering the requirements of applications. While
in IDDR, the packets of App 3, which is the most sensitive to
delay, move along the shortest path to the sink. App 1,
which requires the highest data-integrity, bypasses the
shortest path to avoid contending bandwidth with App 3.
And the packets of App 2, whose delay requirement is
between that of Apps 1 and 3, move to the sink along one
shortest path and one longer path. We can see that IDDR
indeed differentiates different applications and select
proper paths based on their requirements.
7 CONCLUSION
In this paper, a dynamic multipath routing algorithm
IDDR is proposed based on the concept of potential in
physics to satisfy the two different QoS requirements,
high data fidelity and low end-to-end delay, over the
same WSN simultaneously. The IDDR algorithm is
proved stable using the Lyapunov drift theory. Moreover,
the experiment results on a small testbed and the simula-
tion results on TOSSIM demonstrate that IDDR can sig-
nificantly improve the throughput of the high-integrity
applications and decrease the end-to-end delay of delay-
sensitive applications through scattering different packets
from different applications spatially and temporally.
IDDR can also provide good scalability because only local
information is required, which simplifies the implementa-
tion. In addition, IDDR has acceptable communication
overhead.
Fig. 21. Circular topology with 700 randomly deployed nodes and
three events.
Fig. 23. Average End-to-End delay with different communication range.
Fig. 22. Drop ratio versus different communication ranges.
Fig. 24. Route paths of MintRoute.
Fig. 25. Route paths of IDDR.
ZHANG ET AL.: DYNAMIC ROUTING FOR DATA INTEGRITY AND DELAY DIFFERENTIATED SERVICES IN WIRELESS SENSOR... 341
15. ACKNOWLEDGMENTS
The authors gratefully acknowledge the anonymous
reviewers for their constructive comments. This work is
supported in part by National Basic Research Program of
China (973 Program) under Grant No. 2014CB347800 and
2012CB315803, and National Natural Science Foundation of
China (NSFC) under Grant No. 61225011.
REFERENCES
[1] P. Levis, N. Lee, M. Welsh, and D. Culler, “TOSSIM: Accurate
and scalable simulation of entire TinyOS applications,” in
Proc. 1st Int. Conf. Embedded Networked Sensor Syst., 2003,
pp. 126–137.
[2] T. Chen, J. Tsai, and M. Gerla, “QoS routing performance in multi-
hop multimedia wireless networks,” in Proc. IEEE Int. Conf. Uni-
versal Personal Commun., 1997, pp. 557–561.
[3] R. Sivakumar, P. Sinha, and V. Bharghavan, “CEDAR: Core
extraction distributed ad hoc routing algorithm,” IEEE J. Selected
Areas Commun., vol. 17, no. 8, pp. 1454–1465, Aug. 1999.
[4] S. Chen and K. Nahrstedt, “Distributed quality-of-service routing
in ad hoc networks,” IEEE J. Selected Areas Commun., vol. 17, no. 8,
pp. 1488–1505, Aug. 1999.
[5] B. Hughes and V. Cahill, “Achieving real-time guarantees in
mobile ad hoc wireless networks,” in Proc. IEEE Real-Time Syst.
Symp., 2003.
[6] E. Felemban, C.-G. Lee, and E. Ekici, “MMSPEED: Multipath
multi-speed protocol for QoS guarantee of reliability and timeli-
ness in wireless sensor networks,” IEEE Trans. Mobile Comput.,
vol. 5, no. 6, pp. 738–754, Jun. 2003.
[7] C. Lu, B. Blum, T. Abdelzaher, J. Stankovic, and T. He, “RAP: A
real-time communication architecture for large-scale wireless sen-
sor networks,” in Proc. IEEE 8th Real-Time Embedded Technol. Appl.
Symp., 2002, pp. 55–66.
[8] M. Caccamo, L. Zhang, L. Sha, and G. Buttazzo, “An implicit pri-
oritized access protocol for wireless sensor networks,” in Proc.
IEEE Real-Time Syst. Symp., 2002, pp. 39–48.
[9] T. He, J. Stankovic, C. Lu, and T. Abdelzaher, “SPEED: A
stateless protocol for real-time communication in sensor
networks,” in Proc. IEEE 23rd Int. Conf. Distrib. Comput. Syst.,
2003, pp. 46–55.
[10] P. T. A. Quang and D.-S. Kim, “Enhancing real-time delivery of
gradient routing for industrial wireless sensor networks,” IEEE
Trans. Ind. Inform., vol. 8, no. 1, pp. 61–68, Feb. 2012.
[11] S. Bhatnagar, B. Deb, and B. Nath, “Service differentiation in
sensor networks,” in Proc. Int. Symp. Wireless Pers. Multimedia
Commun., 2001.
[12] B. Deb, S. Bhatnagar, and B. Nath, “ReInForM: Reliable informa-
tion forwarding using multiple paths in sensor networks,” in
Proc. IEEE Intl Conf. Local Comput. Netw., 2003, pp. 406–415.
[13] M. Radi, B. Dezfouli, K. A. Bakar, S. A. Razak, and M. A.
Nematbakhsh, “Interference-aware multipath routing protocol for
QoS improvement in event-driven wireless sensor networks,”
Tsinghua Sci. Technol., vol. 16, no. 5, pp. 475–490, 2011.
[14] J. Ben-Othman and B. Yahya, “Energy efficient and QoS based
routing protocol for wireless sensor networks,” J. Parallel Distrib.
Comput., vol. 70, no. 8, pp. 849–857, 2010.
[15] M. Razzaque, M. M. Alam, M. MAMUN-OR-RASHID, and
C. S. Hong, “Multi-constrained QoS geographic routing for
heterogeneous traffic in sensor networks, ieice transactions on
communications,” IEICE Trans. Commun., vol. 91B, no. 8,
pp. 2589–2601, 2008.
[16] D. Djenouri and I. Balasingham, “Traffic-differentiation-based
modular qos localized routing for wireless sensor networks,”
IEEE Trans. Mobile Comput., vol. 10, no. 6, pp. 797–809, Jun.
2010.
[17] A. Basu, A. Lin, and S. Ramanathan, “Routing using poten-
tials: A dynamic traffic-aware routing algorithm,” in Proc.
Conf. Appl., Technol., Architectures, Protocols Comput. Commun.,
2003, pp. 37–48.
[18] C.-Y. Wan, S. B. Eisenman, and A. T. Campbell, “CODA: Conges-
tion detection and avoidance in sensor networks,” in Proc. 1st Int.
Conf. Embedded Netw. Sensor Syst., 2003, pp. 266–279.
[19] L. Georgiadis, M. J. Neely and L. Tassiulas, “Resource allocation
and cross-layer control in wireless networks,” Found. Trends
Netw., vol. 1, no. 1, pp. 1–144, 2006.
[20] A. Papadoulos and J. A. Mccann, “Towards the design of an
energy-efficient, location-aware routing protocol for mobile, ad-
hoc sensor networkFs,” in Proc. Int. Workshop Database Expert Syst.
Appl., 2004, pp. 705–709.
Jiao Zhang is currently an assistant professor in
the School of Information and Communication
Engineering at Beijing University of Posts and
Telecommunications (BUPT), Beijing, China. In
July 2014, she received her Ph.D degree from
the Department of Computer Science and Tech-
nology, Tsinghua University, China. Her supervi-
sor is Prof. Fengyuan Ren. From August 2012 to
August 2013, she was a visiting student in the
networking group of ICSI, UC Berkeley. In July
2008, she obtained her Bachelor’s Degree from
the School of Computer Science and Technology from BUPT. Her
research interests include traffic management in data center networks,
routing in wireless sensor networks and future Internet architecture. Until
now, she has (co)-authored more than 10 international journal and con-
ference papers. She is a member of the IEEE.
Fengyuan Ren received the BA and MSc
degrees in automatic control from Northwestern
Polytechnic University, China, in 1993 and 1996,
respectively, and the PhD degree in computer
science from Northwestern Polytechnic Univer-
sity in December 1999. He is a professor of the
Department of Computer Science and Technol-
ogy at Tsinghua University, Beijing, China. From
2000 to 2001, he worked at the Electronic Engi-
neering Department of Tsinghua University as a
post doctoral researcher. In January 2002, he
moved to the Computer Science and Technology Department of Tsing-
hua University. His research interests include network traffic manage-
ment and control, control in/over computer networks, wireless
networks, and wireless sensor networks. He authored and co-authored
more than 80 international journal and conference papers. He is a
member of the IEEE, and has served as a technical program commit-
tee member and local arrangement chair for various IEEE and ACM
international conferences.
Shan Gao received the BE degree in software
engineering from Southwest Jiaotong University,
Chengdu, China, in 2011, and is working toward
the master’s degree in the Department of Com-
puter Science and Technology of Tsinghua Uni-
versity, Beijing, China. He is supervised by
professor Fengyuan Ren now. His research
interests include wireless sensor networks and
routing protocol.
342 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 2, FEBRUARY 2015
16. Hongkun Yang received the BS and MS degrees
in computer science from Tsinghua University,
Beijing, in 2007 and 2010, respectively. He is cur-
rently working toward the PhD degree in the Com-
puter Science Department, the University of
Texas at Austin. His research interests include
wireless networks and network security.
Chuang Lin received the PhD degree in com-
puter science from Tsinghua University, China, in
1994. He is a professor of the Department of
Computer Science and Technology at Tsinghua
University, Beijing, China. He is an honorary visit-
ing professor, the University of Bradford, United
Kingdom. He has published more than 300
papers in research journals and IEEE conference
proceedings in these areas and has published
four books. He served as the technical program
vice chair, the 10th IEEE Workshop on Future
Trends of Distributed Computing Systems (FTDCS 2004); the general
chair, ACM SIGCOMM Asia workshop 2005, and the 2010 IEEE Interna-
tional Workshop on Quality of Service (IWQoS 2010). He is an associate
editor of IEEE Transactions on Vehicular Technology and an area editor
of Computer Networks and the Journal of Parallel and Distributed Com-
puting. His current research interests include computer networks, perfor-
mance evaluation, network security analysis, and Petri net theory and its
applications. He is a senior member of the IEEE and the Chinese Dele-
gate in TC6 of IFIP.
For more information on this or any other computing topic,
please visit our Digital Library at www.computer.org/publications/dlib.
ZHANG ET AL.: DYNAMIC ROUTING FOR DATA INTEGRITY AND DELAY DIFFERENTIATED SERVICES IN WIRELESS SENSOR... 343