SlideShare a Scribd company logo
Yogesh Y. Shinde et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 3), April 2014, pp.31-36
www.ijera.com 31 | P a g e
Energy–Efficient Sleep Scheduling For Critical Event Monitoring
To Improve Performanceof Wireless Sensor Network
Yogesh Y. Shinde, Dr. Santosh S. Sonavane
Electronics and Telecommunication Dr. D. Y. Patil S.O.E. Pune, India
Director Dr. D. Y. Patil S.O.E. Pune, India
Abstract
A sensor networked applications can be formed for critical applications where it could send the detected
information to the user or to the other sink node. This message is often called as alarm message where it is
indicating the current operational state of the system. An alarm needs to be broadcast to the other nodes as soon
as possible,when a critical event (e.g., gas leak or fire) occurs in the monitoring area and is detected by a sensor
node, then, sensor nodes can inform users nearby to take some response to the event. The life of sensor nodes
for event monitoring are expected to work for a long time without recharging their batteries, sleep scheduling
method is always preferred during the monitoring process. Sleep scheduling could cause transmission delay
because sender nodes should wait until receiver nodes are active and ready to receive the message. The delay
could be important as the network scale increases. Hence, a delay-efficient sleep scheduling method needs to be
designed to ensure low broadcasting delay from any node in the WSN.Only a small number of packets need to
be transmitted during most of the time in the critical event monitoring,. When a critical event is detected, the
alarm packet should broadcast to the entire network as soon as possible. Hence, broadcasting delay is an
important issue for the application of the critical event monitoring. It is needed to minimize the time wasted for
waiting during the broadcasting to minimize the broadcasting delay. The ideal scenario is the destination nodes
wake up immediately when the source nodes obtain the broadcasting packets. Hence, the broadcasting delay is
definitely reduced. The objective of the project is to reduce the delay of the packet transmitted from the source
to destination by a scheduling mechanism. This method is also increasing the lifetime of a node in the network.
Index Terms—Broadcasting Delay, Critical event monitoring, Lifetime of nodes, sleep scheduling, Wireless
Sensor Network (WSN),
I. INTRODUCTION
The wireless sensor network (WSN) consists
of spatially distributed Autonomous sensors to
monitor physical or environmental conditions to
cooperatively pass their data through the network to a
main location. The target area is covered by large no
of nodes. Nodes in wireless sensor network
communicate with each other for a given task. The
development of wireless sensor networks was
motivated by military applications such as battlefield
surveillance; today such networks are used in many
industrial and consumer applications, such as
machine health monitoring, industrial control and
process monitoring, etc.
A projecting feature of WSN is that its
wireless sensor nodes (devices) are powered by
batteries. Sensor nodes are expected to work for a
long time without recharging their batteries. Hence
energy saving is most fundamental important issue.
In mission –critical application, such as
battlefield reconnaissance, fire detection in forest, gas
monitoring in coal mines, wireless sensor network is
arranged in wide ranges of areas, with a large number
of sensor nodes detecting and reporting some
information of urgencies to the end users As there
maybe be no communication infrastructure, users are
usually prepared with communicating devices to
communicate with sensor nodes as soon as possible.
Then sensor nodes for event monitoring are expected
to work for a long time without recharging their
batteries.
Sleep scheduling methods are always used
for event monitoring as WSN are expected to operate
for a long time without recharging their batteries.
Sleep scheduling could cause transmission delay
because node should wait until receiver nodes are
active and ready to receive the message. The delay
goes on increases with network scale hence delay
efficient sleep scheduling methods needs to be design
to ensure low broadcasting delay from any node in
network.A sensor networks makes the best possible
use of their initial energy resources. There are some
protocols that focus on reducing energy at data
link/MAC layer
Sleep scheduling: One of the most common methods
to reduce the energy consumption of nodes is to put
them to sleep when their workload is not heavy.
Putting nodes to sleep may be done in various layers
RESEARCH ARTICLE OPEN ACCESS
Yogesh Y. Shinde et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 3), April 2014, pp.31-36
www.ijera.com 32 | P a g e
and unit of the sensor nodes and have different
effects on how the network operates. Positioning the
transmitter unit can save a lot of energy but may have
longer delay or increase the data loss. Turning off the
sensing unit would also save a great deal of energy
but may cause lower coverage,higher response time,
lower accuracy. Since usually sensor networks are
supposed to work many times more than a sensor
nodes life in active mode there is no choice but to put
sensor nodes into sleep. In such cases we have to find
methods to reduce the problems that arise due to this
fact. These methods try to improve the way network
operates in different layers. Maximum energy saving
is possible through putting transmitter unit to sleep.
MAC protocol manages the operation of this unit.
Several MAC protocols have been designed
specifically for WSNs. SMAC (Synchronous MAC)
is one of well-known MAC protocols specifically
designed for WSNs. In this MAC nodes use
Sleep/Active periods to save energy. This approach
increases the data transmission delay in network and
makes it unusable for delay sensitive applications.
Several routing protocols have been proposed for
multi hop sensor networks that try to reduce the
energy consumption if the node saves the ability to
control the sensing unit’s operation separately by
scheduling its activity energy savings is achieved.
II. LITERATURE SURVEY
The S-MAC medium access protocol [1] introduces
synchronized periodic duty cycling of sensor nodes as
a mechanism to reduce the ideal listening energy cost.
In S-MAC each node follows a periodic active/sleep
schedule, synchronized with its neighboring nodes.
During sleep periods the radios are completely turn
off, and during active period, they are turn back on to
transmit and receive messages. Although the
synchronized low duty cycle operation of a sensor
network is energy efficient, it has one major
deficiency it introduces sleep latency. At a source
node, a sampling reading may occur during the sleep
period and has to be queued until the active period
Anintermediate node may have to wait until receiver
wake up before it can forward a packet received from
its previous hop this is called as sleep latency.
In Adaptive Listening energy-efficient duty
cycling may be maintained while reducing sleep
latency where nodes that lie one or more step ahesd in
the path of transmission can be kept awake for
additional length of time to the basic S-MAC. This
approach provides some reduction in sleep latency but
its energy expense becomes greater due to extended
activation and overhearing hence it is not sufficient
for long paths. [2] .this paper addresses the important
problem sleep latency each sensor has to awake for
1/k fraction of time slots on an average where each
sensor has to wake one of the k slots. This paper
derives and analyzes optimal solution for tree
topologies and ring topologies. This paper suggests
that distributed heuristics may perform poorly because
of the global nature of the constraints involved.
Algorithm of this paper offers a desirable bound of
d+o(k) on the delay for tree and greed topology and
weaker guarantee od o((d+k)log n) for arbitary
graphs. Where d is the shortest path between 2 nodes
in the underlying topology and n is the total number
of nodes. Idle listening, frame collisions, protocol
overhead, and message overhearing these are the main
sources of energy loss in WSNs
Most existing contention-based WSN MAC
protocols reduce idle listening, but they fail to avoid
the nodes from actively monitoring channel
contention periods and reservation protocol (RTS-
CTS) packets before transitioning to sleep [1][4][5].
Sensor MAC (S-MAC) [1]and Timeout MAC (T-
MAC) [6] are contention-based protocols focused on
reducing idle radio listening by concentrating the
network’s data transmissions into a smaller active
period and then transitioning to sleep for the
remainder of the cycle. SMAC establishes a fixed
active cycle (i.e. 10% active), and T-MAC allows the
traffic to adjust the duration of the active period
dynamically by transitioning nodes to sleep only after
listening to an idle channel for a timeout period
equivalent to a transmitting node’s worst-case
contention back off. Concentrating the transmissions
into a smaller active period reduces idle listening, but
it also increases the probability of collisions, thus
wasting precious bandwidth and energy. Berkeley-
MAC (B-MAC) [5] is another contention-based
protocol that saves energy by having radios
periodically wake up to sample the medium.
Transmitting nodes extend the duration of message
preambles to cover the entire range of the wakeup
period to ensure all nodes receive the preamble and
remain awake to accept the message. Time division
multiple access (TDMA) reservation based protocols
create fixed time periods for nodes to communicate to
eliminate the channel contention and idle listening
energy costs [7] [8]. G-MAC similarly gathers traffic
demands during a contention period, but saves
additional energy since only transmitting nodes wake
up to send their traffic requirements for consolidation
by a centralized gateway.
Current wakeup methods can be divided into
two main categories:
1) Scheduled wakeups: In this class, the nodes follow
deterministic (or possibly random) wakeup patterns.
Time synchronization among the nodes in the network
is generally assumed however, asynchronous wakeup
mechanisms. Which do not require synchronization
among the different nodes is also categorized in this
class. Although asynchronous methods are simpler to
implement, they are not as efficient as synchronous
Yogesh Y. Shinde et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 3), April 2014, pp.31-36
www.ijera.com 33 | P a g e
schemes, and in the worst case their guaranteed delay
can be very long.
2) Wakeup on-demand (out-of-band wakeup): It is
assumed that the nodes can be signaled and
awakened at any point of time and then a message is
sent to the node. This is usually implemented by
employing two wireless interfaces. The first radio is
used for data communication and is triggered by the
second ultra-low-power (or possibly passive) radio
which is used only for paging and signaling. [9], and
passive radio triggered solutions [10] are examples of
this class of wakeup methods. Although these
methods can be optimal in terms of both delay and
energy, they are not yet practical. The cost issues,
currently limited available hardware options which
results in limited range and poor reliability, and
stringent system requirements prohibit the widespread
use and design of such wakeup techniques.
Consequently, there is a need for efficient scheduled
wakeup schemes which are reliable and cost-effective
and can also guarantee the delay and lifetime
constraints. [11] Paper proposes a new Sleep schedule
(Q-MAC) for Query based sensor networks that
provide minimum end-to-end latency with energy
efficient data transmission. The radios of the nodes
sleep more whenever there is no query using a static
schedule. The sleep schedule is changed
dynamicallywhenever a query is initiated. Based on
the destination’s location and packet transmission
time, we calculate the data arrival time and hold
theradio of a particular node, which has forwarded the
query packet, in the active state till the data packets
are forwarded.
The types of queries can be categorized as
follows based on the applications:
• Continuous queries • Aggregate queries, versus
Non-aggregate Queries • Complex queries, versus
Simple queries• Queries for unique data and Queries
for replicated data
This paper [12] refers to this technique as the CM
based on an Event- Driven Reporting (CM-EDR)
philosophy. In particular, our proposed CM-EDR
mechanism can be viewed as a particular type of EDD
applications, where an event is defined as an
important change in the supervised phenomenon
compared to the last reading sent to the sink node.
However, the main difference with typical EDD
applications is that with CM-EDR, the user would
have a continuous reading of the phenomenon of
interest, which is not the case with EDD
applications.This paperemphasizes the difference in
terms of goals and produced traffic between CM-EDR
applications and classical event detection- driven
(EDD) applications
A novel time synchronization protocol-
Physical layer integrated synchronization protocol
(PLISP). [13] This protocol accepts a method of
adding timestamp in physical layer to reduce
uncertainty of message exchange process. Results
proved that 1µs require for single hop time
synchronization but its consumption is higher than
TPSN (Timing sync protocol for sensor networks)
mechanism
A voltage and sleep effective scheduling
algorithm [14] in terms of Dynamic frequency/voltage
scaling and Dynamic energy management, namely,
DV/FS RM and DV/FS2-EDF algorithm which can
expands the lifetime of WSN. [15] Presented a new
scheduling method for WSN called VBS (Virtual
Backbone Scheduling) .VBS combine sleep
scheduling and virtual backbone. This paper defines
the MLBS (maximum lifetime backbone scheduling)
problem for WSNs to find the optimal schedule for
VBS. To solve the problem two approximation
solutions based on STG (schedule transition graph)
and VSG (virtual scheduling graph) are proposed.
Self-learning scheduling approach (SSG) [16] this
approach mixes sleep scheduling together with packet
transmission scheduling to reduce energy
consumption. It enable nodes to learn continuous
transmission parameters is achieved by Q- learning
method and the transmission parameter is used to
calculate sleep parameter.[17] In this paper proposed
protocol is compared with LEACH (low energy
adaptive clustering hierarchy) . In the node scheduling
scheme (sleep and active mode) energy efficiency is
increased near to 50 % than LEACH protocol also
lifetime increased. Boundary energy scheduling
method [18] with proper distribution of active nodes
and rapid convergence towards activating optimum
number of nodes also improves BES by Virtual
Clustering based Boundary Energy Scheduling
(VCBES)
III. WORK UNDERTAKEN
Alarm could be originated by any node
which detects a critical event in wireless sensor
network. To reduce broadcasting delay the
scheduling methods includes two phases:
UPLINK: Initially, when a node detects a critical
event, it originates an alarm message and quickly
transmits it to acenter node along a pre- determined
path with a level-by-leveloffset way.
Yogesh Y. Shinde et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 3), April 2014, pp.31-36
www.ijera.com 34 | P a g e
Fig 1: Send the Alarm to center node
DOWNLINK: Then, the center node broadcasts the
alarm message to the other nodes along another path
also with a level-by- level offset way.
Fig 2: Center node broadcast the alarm to all
IV. METHODOLOGY
It is known that the alarm could be
originated by any node which detects a critical event
in the WSN to essentially reduce the broadcasting
delay.
Each node needs to wake up properly for
both of the two traffics. Therefore, the focused
scheduling scheme should contain two parts
1) Breadth First Search (BFS):
Breadth-first search (BFS) is a scheme for
searching in a graph when search is limited to
basically two operations, in the graph theory:
(a) Visit and check a node of a graph;
(b) Gain access to visit the nodes that neighbour the
currently visited node.
First of all, we choose a sensor node as the
center node c. Then, we construct the BFS tree which
divides all nodes into layers H1, H2, H3; . . .; HD,
where Hn is the node set with minimum hop n to c in
the WSN. With the BFS tree, the uplink paths for
nodes can be easily obtained.
2) Connected Dominant Set (CDS):
Construct a maximum independent set
(MIS) in G.
In graph theory an independent set or
stable set is a set of vertices in a graph, no two of
which are adjacent. A maximum independent set is a
largest independent set for a given graph G and its
size is denoted α(G). The problem of finding such a
set is called the maximum independent set problem
Select connector nodes to form a connected
dominated set (CDS)
A connected dominating set of a graph G is
a set D of vertices with two properties:
i) Any node in D can reach any other node in D by a
path that stays entirely within D. That is, D induces a
connected sub graph of G.
ii) Every vertex in G either belongs to D or is
adjacent to a vertex in D. That is, D is a dominating
set of G.
3)Energy Scheduling Method (ESM)
This method consists of some periods. In
each period, the nodes send its remained energy to
their cluster head. Each cluster head has a list of their
member nodes. Each cluster head sorts its list
descending based on the remaining energy of their
nodes. The energy of K*TH
node is called Eb. After
that, it sends this energy value as boundary energy to
their nodes. If the receive nodes energy rate is equal
to or more than this rate, they will send data at next
cycle with probability α.(that is a value near 1),
otherwise, send data with probability β. If the nodes
don’t send until next period, they will become
inactive and in the next cycle will decide according to
the same probability. The nodes which their
remaining energy is less than the boundary energy
should be sleep. Regarding to different number of
nodes (N), the relationship between N and K*
is
shown in (1).
α
β



Therefore the optimum probability βis calculated
as (2)
βα


Yogesh Y. Shinde et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 3), April 2014, pp.31-36
www.ijera.com 35 | P a g e
V. EXPERIMENTAL RESULTS
Fig 3: Performance analysis of packet delivery
ratio
Fig 4: Performance analysis of energy
Fig 5: Performance analysis of end to end delay
VI. CONCLUSION AND FUTURE WORK
This work focus on Critical event monitoring
in WSNs with novel sleep scheduling scheme.
Collision free environment is achieved by specifically
determining two traffic paths .This work get very
good result as compare to SMAC. Work is going to
improve throughput, end to end delay, and energy
consumption to improve Quality of Service of WSN.
REFERENCES
[1] Wei Ye, John Heidemann, Deborah Estrin,
―An energy efficient MAC protocol for
wireless sensor network,‖ IEEE INFOCOM,
pp. 1567-1576,2002
[2] Gang Lu, NrayananSadagopan,
BhaskarKrishnamachari, AshishGoel, ―
Delay efficient sleep scheduling in wireless
sensor networks‖ IEEEpp.2470-2481,
Mar.2005
[3] J.Heidemann, Y .D. ―An energy efficient
MAC protocol for wireless sensor networks‖
INFOCOMM.2005
[4] K. Langendoen, ―energy efficient MAC:An
adaptive energy efficient MAC protocol for
wireless sensor networks.‖ ACM
SENSYS.2004
[5] J.Polstre, J. D. ―Versatile low power media
access for wireless sensor networks.‖ ACM
SENSYS 2004
[6] T. Van Dam, K. Langendoen, ―An Adaptive
Energy- Efficient MAC Protocol for
Wireless Sensor Networks," Proc. Of ACM
SenSys , Nov 2003.
[7] Wendi RabinerHeinzelman,
AnanthaChandrakasan,HariBalakrishanan
―Energy efficient communication protocol
for wireless microsensor networks,‖ IEEE
2000.
[8] Guangyu Pei, CharlrsChien, ―Low power
TDMA in large wireless sensor network,‖
IEEE pp.347-351 2001
[9] Matthew J Miller, Nitin H
Vaidya,‖Minimizing energy consumption in
sensor networks using a wake up radio‖,
IEEE communication society,pp.2335-
2340,WCNC 2004
[10] L. Gu and J. A. Stankovic, ―Radio-Triggered
Wake-Up Capability for Sensor Networks,"
10th IEEE Real-Time and
EmbededTehcnology and Application
Symposium (RTAS'04), Toronto, May 2004.
[11] N.A. Vasanthi and S.Annadurai., ―Energy
Efficient Sleep Schedule for Achieving
Minimum Latency in Query Based Sensor
Networks,‖ Proc. IEEE Int’l Conf. Sensor
Networks, Ubiquitous, and Trustworthy
Computing, pp. 214-219, June 2006
[12] N. Bouabdallah, M.E. Rivero-Angeles, and
B. Sericola, ―Continuous Monitoring Using
Event-Driven Reporting for Cluster-Based
Wireless Sensor Networks,‖ IEEE Trans.
Vehicular Technology, vol. 58, no. 7, pp.
3460-3479, Sept. 2009.
[13] Ping Song,Xiaodong Shan, Kejie Li,
Guangping Qi,‖ Multi hop based highly
Yogesh Y. Shinde et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 3), April 2014, pp.31-36
www.ijera.com 36 | P a g e
precise time synchronization protocol for
ZigBeenetworks‖ IEEE 2009.
[14] Wei Wei,Xiao-ying Wang, ―Diverse-rate
based dual energy aware efficiency task
scheduling scheme in WSNs‖IEEE 2009
[15] Yaxiong Zhao, Jie Wu, Feng Li, Sanglu Lu,
― VBS: maximum life time sleep scheduling
for wireless sensor networks using virtual
backbones‖ IEEE 2010
[16] JinjunNilu, ― Self- learning scheduling for
wireless sensor network‖, IEEE 2010
[17] R. Saravanakumar, S.G.Susila, J.Raja, ― An
energy efficient cluster based node
scheduling protocol for wireless sensor
networks ‖ IEEE 2010
[18] Seyed Mahdi Jamei, ArashNikdel, Hagar
Noori, ― A scheduling method based on
virtual clustering and boundary energy for
wireless sensor networks‖ IEEE 2011

More Related Content

What's hot

Energy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksEnergy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networks
Spandan Spandy
 
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksSpread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
IDES Editor
 
Energy efficient node deployment for target coverage in wireless sensor network
Energy efficient node deployment for target coverage in wireless sensor networkEnergy efficient node deployment for target coverage in wireless sensor network
Energy efficient node deployment for target coverage in wireless sensor network
Gaurang Rathod
 
A04560105
A04560105A04560105
A04560105
IOSR-JEN
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
Habibur Rahman
 
An algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkAn algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor network
eSAT Publishing House
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEEC
Yogesh Fulara
 
Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & Pegasis
ReenaShekar
 
iPGCON14_134
iPGCON14_134iPGCON14_134
iPGCON14_134
Prafull Maktedar
 
ENERGY AWARE INFORMATION DISSEMINATION STRATEGIES TO IMPROVE LIFETIME OF A WSN
ENERGY AWARE INFORMATION DISSEMINATION STRATEGIES TO IMPROVE LIFETIME OF A WSNENERGY AWARE INFORMATION DISSEMINATION STRATEGIES TO IMPROVE LIFETIME OF A WSN
ENERGY AWARE INFORMATION DISSEMINATION STRATEGIES TO IMPROVE LIFETIME OF A WSN
International Journal of Technical Research & Application
 
Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1Leach wireless sensor ntwrk aa1
Issues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networksIssues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networks
eSAT Publishing House
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
Yara Ali
 
Leach
LeachLeach
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Sigma web solutions pvt. ltd.
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Ali Habeeb
 
Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...
eSAT Journals
 
Throughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocolThroughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocol
eSAT Publishing House
 
BeeSensor routing protocol for wireless sensor network
BeeSensor routing protocol for wireless sensor networkBeeSensor routing protocol for wireless sensor network
BeeSensor routing protocol for wireless sensor network
Sonam Jain
 
Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network
dilip pareek
 

What's hot (20)

Energy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksEnergy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networks
 
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksSpread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
 
Energy efficient node deployment for target coverage in wireless sensor network
Energy efficient node deployment for target coverage in wireless sensor networkEnergy efficient node deployment for target coverage in wireless sensor network
Energy efficient node deployment for target coverage in wireless sensor network
 
A04560105
A04560105A04560105
A04560105
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
 
An algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor networkAn algorithm for fault node recovery of wireless sensor network
An algorithm for fault node recovery of wireless sensor network
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEEC
 
Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & Pegasis
 
iPGCON14_134
iPGCON14_134iPGCON14_134
iPGCON14_134
 
ENERGY AWARE INFORMATION DISSEMINATION STRATEGIES TO IMPROVE LIFETIME OF A WSN
ENERGY AWARE INFORMATION DISSEMINATION STRATEGIES TO IMPROVE LIFETIME OF A WSNENERGY AWARE INFORMATION DISSEMINATION STRATEGIES TO IMPROVE LIFETIME OF A WSN
ENERGY AWARE INFORMATION DISSEMINATION STRATEGIES TO IMPROVE LIFETIME OF A WSN
 
Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1
 
Issues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networksIssues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networks
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
Leach
LeachLeach
Leach
 
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
 
Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...Throughput analysis of energy aware routing protocol for real time load distr...
Throughput analysis of energy aware routing protocol for real time load distr...
 
Throughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocolThroughput analysis of energy aware routing protocol
Throughput analysis of energy aware routing protocol
 
BeeSensor routing protocol for wireless sensor network
BeeSensor routing protocol for wireless sensor networkBeeSensor routing protocol for wireless sensor network
BeeSensor routing protocol for wireless sensor network
 
Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network
 

Similar to E044033136

Modified LAEEBA Routing in WBAN
Modified LAEEBA Routing in WBANModified LAEEBA Routing in WBAN
Modified LAEEBA Routing in WBAN
ijsrd.com
 
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
International Journal of Technical Research & Application
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
IJCNCJournal
 
[IJET-V1I3P13] Authors :Aishwarya Manjunath, Shreenath K N, Dr. Srinivasa K G.
[IJET-V1I3P13] Authors :Aishwarya Manjunath, Shreenath K N, Dr. Srinivasa K G.[IJET-V1I3P13] Authors :Aishwarya Manjunath, Shreenath K N, Dr. Srinivasa K G.
[IJET-V1I3P13] Authors :Aishwarya Manjunath, Shreenath K N, Dr. Srinivasa K G.
IJET - International Journal of Engineering and Techniques
 
Proposed mac protocol for reduce energy consumption over wsn network
Proposed mac protocol for reduce energy consumption over wsn networkProposed mac protocol for reduce energy consumption over wsn network
Proposed mac protocol for reduce energy consumption over wsn network
eSAT Publishing House
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
ijwmn
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
ijwmn
 
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORKAN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
ijceronline
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
ijsrd.com
 
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
Editor IJCATR
 
Ijetr021229
Ijetr021229Ijetr021229
Ijetr021229
Ijetr021229Ijetr021229
Ijetr021229
ER Publication.org
 
The Design A Fuzzy System in Order to Schedule Sleep and Waking Of Sensors in...
The Design A Fuzzy System in Order to Schedule Sleep and Waking Of Sensors in...The Design A Fuzzy System in Order to Schedule Sleep and Waking Of Sensors in...
The Design A Fuzzy System in Order to Schedule Sleep and Waking Of Sensors in...
IJERA Editor
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor network
ijcsa
 
I018135565
I018135565I018135565
I018135565
IOSR Journals
 
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
IJEEE
 
Adhoc and Sensor Networks - Chapter 09
Adhoc and Sensor Networks - Chapter 09Adhoc and Sensor Networks - Chapter 09
Adhoc and Sensor Networks - Chapter 09
Ali Habeeb
 
Data retrieval in sensor networks
Data retrieval in sensor networksData retrieval in sensor networks
Data retrieval in sensor networks
Acad
 
2 ijcse-01208
2 ijcse-012082 ijcse-01208
2 ijcse-01208
Shivlal Mewada
 

Similar to E044033136 (20)

Modified LAEEBA Routing in WBAN
Modified LAEEBA Routing in WBANModified LAEEBA Routing in WBAN
Modified LAEEBA Routing in WBAN
 
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
 
[IJET-V1I3P13] Authors :Aishwarya Manjunath, Shreenath K N, Dr. Srinivasa K G.
[IJET-V1I3P13] Authors :Aishwarya Manjunath, Shreenath K N, Dr. Srinivasa K G.[IJET-V1I3P13] Authors :Aishwarya Manjunath, Shreenath K N, Dr. Srinivasa K G.
[IJET-V1I3P13] Authors :Aishwarya Manjunath, Shreenath K N, Dr. Srinivasa K G.
 
Proposed mac protocol for reduce energy consumption over wsn network
Proposed mac protocol for reduce energy consumption over wsn networkProposed mac protocol for reduce energy consumption over wsn network
Proposed mac protocol for reduce energy consumption over wsn network
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORKAN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
Proactive Data Reporting of Wireless sensor Network using Wake Up Scheduling ...
 
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
 
Ijetr021229
Ijetr021229Ijetr021229
Ijetr021229
 
Ijetr021229
Ijetr021229Ijetr021229
Ijetr021229
 
The Design A Fuzzy System in Order to Schedule Sleep and Waking Of Sensors in...
The Design A Fuzzy System in Order to Schedule Sleep and Waking Of Sensors in...The Design A Fuzzy System in Order to Schedule Sleep and Waking Of Sensors in...
The Design A Fuzzy System in Order to Schedule Sleep and Waking Of Sensors in...
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor network
 
I018135565
I018135565I018135565
I018135565
 
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
 
Adhoc and Sensor Networks - Chapter 09
Adhoc and Sensor Networks - Chapter 09Adhoc and Sensor Networks - Chapter 09
Adhoc and Sensor Networks - Chapter 09
 
Data retrieval in sensor networks
Data retrieval in sensor networksData retrieval in sensor networks
Data retrieval in sensor networks
 
2 ijcse-01208
2 ijcse-012082 ijcse-01208
2 ijcse-01208
 

Recently uploaded

Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 

Recently uploaded (20)

Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 

E044033136

  • 1. Yogesh Y. Shinde et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 3), April 2014, pp.31-36 www.ijera.com 31 | P a g e Energy–Efficient Sleep Scheduling For Critical Event Monitoring To Improve Performanceof Wireless Sensor Network Yogesh Y. Shinde, Dr. Santosh S. Sonavane Electronics and Telecommunication Dr. D. Y. Patil S.O.E. Pune, India Director Dr. D. Y. Patil S.O.E. Pune, India Abstract A sensor networked applications can be formed for critical applications where it could send the detected information to the user or to the other sink node. This message is often called as alarm message where it is indicating the current operational state of the system. An alarm needs to be broadcast to the other nodes as soon as possible,when a critical event (e.g., gas leak or fire) occurs in the monitoring area and is detected by a sensor node, then, sensor nodes can inform users nearby to take some response to the event. The life of sensor nodes for event monitoring are expected to work for a long time without recharging their batteries, sleep scheduling method is always preferred during the monitoring process. Sleep scheduling could cause transmission delay because sender nodes should wait until receiver nodes are active and ready to receive the message. The delay could be important as the network scale increases. Hence, a delay-efficient sleep scheduling method needs to be designed to ensure low broadcasting delay from any node in the WSN.Only a small number of packets need to be transmitted during most of the time in the critical event monitoring,. When a critical event is detected, the alarm packet should broadcast to the entire network as soon as possible. Hence, broadcasting delay is an important issue for the application of the critical event monitoring. It is needed to minimize the time wasted for waiting during the broadcasting to minimize the broadcasting delay. The ideal scenario is the destination nodes wake up immediately when the source nodes obtain the broadcasting packets. Hence, the broadcasting delay is definitely reduced. The objective of the project is to reduce the delay of the packet transmitted from the source to destination by a scheduling mechanism. This method is also increasing the lifetime of a node in the network. Index Terms—Broadcasting Delay, Critical event monitoring, Lifetime of nodes, sleep scheduling, Wireless Sensor Network (WSN), I. INTRODUCTION The wireless sensor network (WSN) consists of spatially distributed Autonomous sensors to monitor physical or environmental conditions to cooperatively pass their data through the network to a main location. The target area is covered by large no of nodes. Nodes in wireless sensor network communicate with each other for a given task. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance; today such networks are used in many industrial and consumer applications, such as machine health monitoring, industrial control and process monitoring, etc. A projecting feature of WSN is that its wireless sensor nodes (devices) are powered by batteries. Sensor nodes are expected to work for a long time without recharging their batteries. Hence energy saving is most fundamental important issue. In mission –critical application, such as battlefield reconnaissance, fire detection in forest, gas monitoring in coal mines, wireless sensor network is arranged in wide ranges of areas, with a large number of sensor nodes detecting and reporting some information of urgencies to the end users As there maybe be no communication infrastructure, users are usually prepared with communicating devices to communicate with sensor nodes as soon as possible. Then sensor nodes for event monitoring are expected to work for a long time without recharging their batteries. Sleep scheduling methods are always used for event monitoring as WSN are expected to operate for a long time without recharging their batteries. Sleep scheduling could cause transmission delay because node should wait until receiver nodes are active and ready to receive the message. The delay goes on increases with network scale hence delay efficient sleep scheduling methods needs to be design to ensure low broadcasting delay from any node in network.A sensor networks makes the best possible use of their initial energy resources. There are some protocols that focus on reducing energy at data link/MAC layer Sleep scheduling: One of the most common methods to reduce the energy consumption of nodes is to put them to sleep when their workload is not heavy. Putting nodes to sleep may be done in various layers RESEARCH ARTICLE OPEN ACCESS
  • 2. Yogesh Y. Shinde et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 3), April 2014, pp.31-36 www.ijera.com 32 | P a g e and unit of the sensor nodes and have different effects on how the network operates. Positioning the transmitter unit can save a lot of energy but may have longer delay or increase the data loss. Turning off the sensing unit would also save a great deal of energy but may cause lower coverage,higher response time, lower accuracy. Since usually sensor networks are supposed to work many times more than a sensor nodes life in active mode there is no choice but to put sensor nodes into sleep. In such cases we have to find methods to reduce the problems that arise due to this fact. These methods try to improve the way network operates in different layers. Maximum energy saving is possible through putting transmitter unit to sleep. MAC protocol manages the operation of this unit. Several MAC protocols have been designed specifically for WSNs. SMAC (Synchronous MAC) is one of well-known MAC protocols specifically designed for WSNs. In this MAC nodes use Sleep/Active periods to save energy. This approach increases the data transmission delay in network and makes it unusable for delay sensitive applications. Several routing protocols have been proposed for multi hop sensor networks that try to reduce the energy consumption if the node saves the ability to control the sensing unit’s operation separately by scheduling its activity energy savings is achieved. II. LITERATURE SURVEY The S-MAC medium access protocol [1] introduces synchronized periodic duty cycling of sensor nodes as a mechanism to reduce the ideal listening energy cost. In S-MAC each node follows a periodic active/sleep schedule, synchronized with its neighboring nodes. During sleep periods the radios are completely turn off, and during active period, they are turn back on to transmit and receive messages. Although the synchronized low duty cycle operation of a sensor network is energy efficient, it has one major deficiency it introduces sleep latency. At a source node, a sampling reading may occur during the sleep period and has to be queued until the active period Anintermediate node may have to wait until receiver wake up before it can forward a packet received from its previous hop this is called as sleep latency. In Adaptive Listening energy-efficient duty cycling may be maintained while reducing sleep latency where nodes that lie one or more step ahesd in the path of transmission can be kept awake for additional length of time to the basic S-MAC. This approach provides some reduction in sleep latency but its energy expense becomes greater due to extended activation and overhearing hence it is not sufficient for long paths. [2] .this paper addresses the important problem sleep latency each sensor has to awake for 1/k fraction of time slots on an average where each sensor has to wake one of the k slots. This paper derives and analyzes optimal solution for tree topologies and ring topologies. This paper suggests that distributed heuristics may perform poorly because of the global nature of the constraints involved. Algorithm of this paper offers a desirable bound of d+o(k) on the delay for tree and greed topology and weaker guarantee od o((d+k)log n) for arbitary graphs. Where d is the shortest path between 2 nodes in the underlying topology and n is the total number of nodes. Idle listening, frame collisions, protocol overhead, and message overhearing these are the main sources of energy loss in WSNs Most existing contention-based WSN MAC protocols reduce idle listening, but they fail to avoid the nodes from actively monitoring channel contention periods and reservation protocol (RTS- CTS) packets before transitioning to sleep [1][4][5]. Sensor MAC (S-MAC) [1]and Timeout MAC (T- MAC) [6] are contention-based protocols focused on reducing idle radio listening by concentrating the network’s data transmissions into a smaller active period and then transitioning to sleep for the remainder of the cycle. SMAC establishes a fixed active cycle (i.e. 10% active), and T-MAC allows the traffic to adjust the duration of the active period dynamically by transitioning nodes to sleep only after listening to an idle channel for a timeout period equivalent to a transmitting node’s worst-case contention back off. Concentrating the transmissions into a smaller active period reduces idle listening, but it also increases the probability of collisions, thus wasting precious bandwidth and energy. Berkeley- MAC (B-MAC) [5] is another contention-based protocol that saves energy by having radios periodically wake up to sample the medium. Transmitting nodes extend the duration of message preambles to cover the entire range of the wakeup period to ensure all nodes receive the preamble and remain awake to accept the message. Time division multiple access (TDMA) reservation based protocols create fixed time periods for nodes to communicate to eliminate the channel contention and idle listening energy costs [7] [8]. G-MAC similarly gathers traffic demands during a contention period, but saves additional energy since only transmitting nodes wake up to send their traffic requirements for consolidation by a centralized gateway. Current wakeup methods can be divided into two main categories: 1) Scheduled wakeups: In this class, the nodes follow deterministic (or possibly random) wakeup patterns. Time synchronization among the nodes in the network is generally assumed however, asynchronous wakeup mechanisms. Which do not require synchronization among the different nodes is also categorized in this class. Although asynchronous methods are simpler to implement, they are not as efficient as synchronous
  • 3. Yogesh Y. Shinde et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 3), April 2014, pp.31-36 www.ijera.com 33 | P a g e schemes, and in the worst case their guaranteed delay can be very long. 2) Wakeup on-demand (out-of-band wakeup): It is assumed that the nodes can be signaled and awakened at any point of time and then a message is sent to the node. This is usually implemented by employing two wireless interfaces. The first radio is used for data communication and is triggered by the second ultra-low-power (or possibly passive) radio which is used only for paging and signaling. [9], and passive radio triggered solutions [10] are examples of this class of wakeup methods. Although these methods can be optimal in terms of both delay and energy, they are not yet practical. The cost issues, currently limited available hardware options which results in limited range and poor reliability, and stringent system requirements prohibit the widespread use and design of such wakeup techniques. Consequently, there is a need for efficient scheduled wakeup schemes which are reliable and cost-effective and can also guarantee the delay and lifetime constraints. [11] Paper proposes a new Sleep schedule (Q-MAC) for Query based sensor networks that provide minimum end-to-end latency with energy efficient data transmission. The radios of the nodes sleep more whenever there is no query using a static schedule. The sleep schedule is changed dynamicallywhenever a query is initiated. Based on the destination’s location and packet transmission time, we calculate the data arrival time and hold theradio of a particular node, which has forwarded the query packet, in the active state till the data packets are forwarded. The types of queries can be categorized as follows based on the applications: • Continuous queries • Aggregate queries, versus Non-aggregate Queries • Complex queries, versus Simple queries• Queries for unique data and Queries for replicated data This paper [12] refers to this technique as the CM based on an Event- Driven Reporting (CM-EDR) philosophy. In particular, our proposed CM-EDR mechanism can be viewed as a particular type of EDD applications, where an event is defined as an important change in the supervised phenomenon compared to the last reading sent to the sink node. However, the main difference with typical EDD applications is that with CM-EDR, the user would have a continuous reading of the phenomenon of interest, which is not the case with EDD applications.This paperemphasizes the difference in terms of goals and produced traffic between CM-EDR applications and classical event detection- driven (EDD) applications A novel time synchronization protocol- Physical layer integrated synchronization protocol (PLISP). [13] This protocol accepts a method of adding timestamp in physical layer to reduce uncertainty of message exchange process. Results proved that 1µs require for single hop time synchronization but its consumption is higher than TPSN (Timing sync protocol for sensor networks) mechanism A voltage and sleep effective scheduling algorithm [14] in terms of Dynamic frequency/voltage scaling and Dynamic energy management, namely, DV/FS RM and DV/FS2-EDF algorithm which can expands the lifetime of WSN. [15] Presented a new scheduling method for WSN called VBS (Virtual Backbone Scheduling) .VBS combine sleep scheduling and virtual backbone. This paper defines the MLBS (maximum lifetime backbone scheduling) problem for WSNs to find the optimal schedule for VBS. To solve the problem two approximation solutions based on STG (schedule transition graph) and VSG (virtual scheduling graph) are proposed. Self-learning scheduling approach (SSG) [16] this approach mixes sleep scheduling together with packet transmission scheduling to reduce energy consumption. It enable nodes to learn continuous transmission parameters is achieved by Q- learning method and the transmission parameter is used to calculate sleep parameter.[17] In this paper proposed protocol is compared with LEACH (low energy adaptive clustering hierarchy) . In the node scheduling scheme (sleep and active mode) energy efficiency is increased near to 50 % than LEACH protocol also lifetime increased. Boundary energy scheduling method [18] with proper distribution of active nodes and rapid convergence towards activating optimum number of nodes also improves BES by Virtual Clustering based Boundary Energy Scheduling (VCBES) III. WORK UNDERTAKEN Alarm could be originated by any node which detects a critical event in wireless sensor network. To reduce broadcasting delay the scheduling methods includes two phases: UPLINK: Initially, when a node detects a critical event, it originates an alarm message and quickly transmits it to acenter node along a pre- determined path with a level-by-leveloffset way.
  • 4. Yogesh Y. Shinde et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 3), April 2014, pp.31-36 www.ijera.com 34 | P a g e Fig 1: Send the Alarm to center node DOWNLINK: Then, the center node broadcasts the alarm message to the other nodes along another path also with a level-by- level offset way. Fig 2: Center node broadcast the alarm to all IV. METHODOLOGY It is known that the alarm could be originated by any node which detects a critical event in the WSN to essentially reduce the broadcasting delay. Each node needs to wake up properly for both of the two traffics. Therefore, the focused scheduling scheme should contain two parts 1) Breadth First Search (BFS): Breadth-first search (BFS) is a scheme for searching in a graph when search is limited to basically two operations, in the graph theory: (a) Visit and check a node of a graph; (b) Gain access to visit the nodes that neighbour the currently visited node. First of all, we choose a sensor node as the center node c. Then, we construct the BFS tree which divides all nodes into layers H1, H2, H3; . . .; HD, where Hn is the node set with minimum hop n to c in the WSN. With the BFS tree, the uplink paths for nodes can be easily obtained. 2) Connected Dominant Set (CDS): Construct a maximum independent set (MIS) in G. In graph theory an independent set or stable set is a set of vertices in a graph, no two of which are adjacent. A maximum independent set is a largest independent set for a given graph G and its size is denoted α(G). The problem of finding such a set is called the maximum independent set problem Select connector nodes to form a connected dominated set (CDS) A connected dominating set of a graph G is a set D of vertices with two properties: i) Any node in D can reach any other node in D by a path that stays entirely within D. That is, D induces a connected sub graph of G. ii) Every vertex in G either belongs to D or is adjacent to a vertex in D. That is, D is a dominating set of G. 3)Energy Scheduling Method (ESM) This method consists of some periods. In each period, the nodes send its remained energy to their cluster head. Each cluster head has a list of their member nodes. Each cluster head sorts its list descending based on the remaining energy of their nodes. The energy of K*TH node is called Eb. After that, it sends this energy value as boundary energy to their nodes. If the receive nodes energy rate is equal to or more than this rate, they will send data at next cycle with probability α.(that is a value near 1), otherwise, send data with probability β. If the nodes don’t send until next period, they will become inactive and in the next cycle will decide according to the same probability. The nodes which their remaining energy is less than the boundary energy should be sleep. Regarding to different number of nodes (N), the relationship between N and K* is shown in (1). α β    Therefore the optimum probability βis calculated as (2) βα  
  • 5. Yogesh Y. Shinde et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 3), April 2014, pp.31-36 www.ijera.com 35 | P a g e V. EXPERIMENTAL RESULTS Fig 3: Performance analysis of packet delivery ratio Fig 4: Performance analysis of energy Fig 5: Performance analysis of end to end delay VI. CONCLUSION AND FUTURE WORK This work focus on Critical event monitoring in WSNs with novel sleep scheduling scheme. Collision free environment is achieved by specifically determining two traffic paths .This work get very good result as compare to SMAC. Work is going to improve throughput, end to end delay, and energy consumption to improve Quality of Service of WSN. REFERENCES [1] Wei Ye, John Heidemann, Deborah Estrin, ―An energy efficient MAC protocol for wireless sensor network,‖ IEEE INFOCOM, pp. 1567-1576,2002 [2] Gang Lu, NrayananSadagopan, BhaskarKrishnamachari, AshishGoel, ― Delay efficient sleep scheduling in wireless sensor networks‖ IEEEpp.2470-2481, Mar.2005 [3] J.Heidemann, Y .D. ―An energy efficient MAC protocol for wireless sensor networks‖ INFOCOMM.2005 [4] K. Langendoen, ―energy efficient MAC:An adaptive energy efficient MAC protocol for wireless sensor networks.‖ ACM SENSYS.2004 [5] J.Polstre, J. D. ―Versatile low power media access for wireless sensor networks.‖ ACM SENSYS 2004 [6] T. Van Dam, K. Langendoen, ―An Adaptive Energy- Efficient MAC Protocol for Wireless Sensor Networks," Proc. Of ACM SenSys , Nov 2003. [7] Wendi RabinerHeinzelman, AnanthaChandrakasan,HariBalakrishanan ―Energy efficient communication protocol for wireless microsensor networks,‖ IEEE 2000. [8] Guangyu Pei, CharlrsChien, ―Low power TDMA in large wireless sensor network,‖ IEEE pp.347-351 2001 [9] Matthew J Miller, Nitin H Vaidya,‖Minimizing energy consumption in sensor networks using a wake up radio‖, IEEE communication society,pp.2335- 2340,WCNC 2004 [10] L. Gu and J. A. Stankovic, ―Radio-Triggered Wake-Up Capability for Sensor Networks," 10th IEEE Real-Time and EmbededTehcnology and Application Symposium (RTAS'04), Toronto, May 2004. [11] N.A. Vasanthi and S.Annadurai., ―Energy Efficient Sleep Schedule for Achieving Minimum Latency in Query Based Sensor Networks,‖ Proc. IEEE Int’l Conf. Sensor Networks, Ubiquitous, and Trustworthy Computing, pp. 214-219, June 2006 [12] N. Bouabdallah, M.E. Rivero-Angeles, and B. Sericola, ―Continuous Monitoring Using Event-Driven Reporting for Cluster-Based Wireless Sensor Networks,‖ IEEE Trans. Vehicular Technology, vol. 58, no. 7, pp. 3460-3479, Sept. 2009. [13] Ping Song,Xiaodong Shan, Kejie Li, Guangping Qi,‖ Multi hop based highly
  • 6. Yogesh Y. Shinde et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 4( Version 3), April 2014, pp.31-36 www.ijera.com 36 | P a g e precise time synchronization protocol for ZigBeenetworks‖ IEEE 2009. [14] Wei Wei,Xiao-ying Wang, ―Diverse-rate based dual energy aware efficiency task scheduling scheme in WSNs‖IEEE 2009 [15] Yaxiong Zhao, Jie Wu, Feng Li, Sanglu Lu, ― VBS: maximum life time sleep scheduling for wireless sensor networks using virtual backbones‖ IEEE 2010 [16] JinjunNilu, ― Self- learning scheduling for wireless sensor network‖, IEEE 2010 [17] R. Saravanakumar, S.G.Susila, J.Raja, ― An energy efficient cluster based node scheduling protocol for wireless sensor networks ‖ IEEE 2010 [18] Seyed Mahdi Jamei, ArashNikdel, Hagar Noori, ― A scheduling method based on virtual clustering and boundary energy for wireless sensor networks‖ IEEE 2011