SlideShare a Scribd company logo
By:
PRAJWAL PANCHMAHALKAR
NISHANTH REDDY KOMMIDI
    Wireless Sensor Network (WSN) consists of spatially distributed
    autonomous sensors which cooperatively pass their data through the
    network to a main location
   This work is motivated by SPMS (Shortest Path Minded SPIN) protocol
   Although SPMS was successful in achieving better latency
    and low power consumption compared to the SPIN protocol, it
    lacks in the following areas:
   Energy at the nodes is not considered:
   Relay nodes have additional overhead as they have to relay the
    data between source and destination
   If a node in shortest path fails and the SCONE is not in the
    range of the node sending the request then there is no solution
    provided.
    ◦ But the aim of SPMS was fault tolerance !
   We assume that the communication overhead is higher than the storage
    overhead
   We discuss the failure cases of SPMS to provide a solution for the SPMS
    protocol
   Here each node has the information of its neighbors zone along with its
    own zone
   A Node also maintains the routing table to each of its neighbors.
   Motivated from SPIN and SPMS protocols
C
                        E


D       A   B


                    F                            Routing Table of
                                                   Neighbor B


                        Routing Table of A   E
                Destination    Cost    Via   F
                B              1       -
                                             A
                C              1       -

                D              2       C
   Relay nodes (we call smart relay) are aware of its own residual energy and
    the energy it can spend the current communication
   Smart relays, when they get a REQ from a destination node estimates the
    cost in relaying the data and calculates the Energy,

   Er = Ep – (Erec + Et)

   Where,
   Er = Energy expected to remain after relaying
   Ep = Energy present at current time
   Erec = Energy spent in receiving the data from the source
   Et = Energy spent in transmitting the data to the destination
   Relay nodes then set a 3 energy bits in it’s REQ while sending to the
    secondary relay node. We call it En-bit
   This bit is a product which has the information of how much battery energy
    will be left in the relay node after the relay of data along with the cost.
   The secondary relay node based on the En-bit will go into a waiting state
    which will be inversely proportional to En-bit
   Trw α 1/En –bit
    ◦ Trw - Waiting time for the smart relay node.
   Meanwhile the nodes present in the zone of the relay node which over
    hears the REQ also analyze the En-bit and calculate their own En-bit if
    they have both the destination and secondary relay node in their routing
    table and sends to secondary relay node
E



    B            C


A                                      D
                      F

        source

        destination

        Relay nodes

        Nodes in zone of relay nodes
E



                                           REQ
              B                C


A                              F                          D

    Node C calculates the energy it will be left with after
                        the relaying
                      source

                     destination

                     Relay nodes

                      Nodes in zone of relay nodes
E
                         overhear


        REQ



    B                    C
                         overhear

A                    F                       D



          source

          destination

          Relay nodes                        REQ – Contains En-Bit

              Nodes in zone of relay nodes
E



    Trw                                       Calculate En-bit and is it
                                             Are B and D in my zone ?
                                                  higher than C ?

          B              C


A                    F                          D



              source

              destination

              Relay nodes

              Nodes in zone of relay nodes
F – has High En-bit
                             E




                      B              C


      A                          F                       D



                          source

                          destination

                          Relay nodes

                          Nodes in zone of relay nodes
F – has High En-bit
                             E




                                         SNIP
                      B              C
                                           DAT


      A                          F                       D



                          source

                          destination

                          Relay nodes

                          Nodes in zone of relay nodes
E          Works similar to energy
                                 aware case where nodes
                                in the zone of C – E and F
                                         take up
    B            C


A                                      D
                      F

        source

        destination

        Relay nodes

        Nodes in zone of relay nodes

More Related Content

Similar to Energy Aware Fault Tolerant SPMS Protocol in Wireless Sensor Networks

Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...ketaki19deshmukh
 
Cooperative Communication for a Multiple-Satellite Network
Cooperative Communication for a Multiple-Satellite NetworkCooperative Communication for a Multiple-Satellite Network
Cooperative Communication for a Multiple-Satellite Network
chiragwarty
 
Dsp U Lec02 Data Converters
Dsp U   Lec02 Data ConvertersDsp U   Lec02 Data Converters
Dsp U Lec02 Data Converters
taha25
 
Energy aware efficient geographic routing in lossy wireless Networks
Energy aware efficient geographic routing in lossy wireless NetworksEnergy aware efficient geographic routing in lossy wireless Networks
Energy aware efficient geographic routing in lossy wireless NetworksPrajwal Panchmahalkar
 
manet
manetmanet
manet
Neha Yadav
 
Iii Data Transmission Fundamentals
Iii  Data Transmission FundamentalsIii  Data Transmission Fundamentals
Iii Data Transmission FundamentalsDon Bosco BSIT
 
Wideband Complex Modulation Analysis Using a Real-Time Digital Demodulator
Wideband Complex Modulation Analysis Using a Real-Time Digital DemodulatorWideband Complex Modulation Analysis Using a Real-Time Digital Demodulator
Wideband Complex Modulation Analysis Using a Real-Time Digital Demodulator
Rohde & Schwarz North America
 

Similar to Energy Aware Fault Tolerant SPMS Protocol in Wireless Sensor Networks (10)

Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
 
Cooperative Communication for a Multiple-Satellite Network
Cooperative Communication for a Multiple-Satellite NetworkCooperative Communication for a Multiple-Satellite Network
Cooperative Communication for a Multiple-Satellite Network
 
Dsp U Lec02 Data Converters
Dsp U   Lec02 Data ConvertersDsp U   Lec02 Data Converters
Dsp U Lec02 Data Converters
 
Energy aware efficient geographic routing in lossy wireless Networks
Energy aware efficient geographic routing in lossy wireless NetworksEnergy aware efficient geographic routing in lossy wireless Networks
Energy aware efficient geographic routing in lossy wireless Networks
 
manet
manetmanet
manet
 
Iii Data Transmission Fundamentals
Iii  Data Transmission FundamentalsIii  Data Transmission Fundamentals
Iii Data Transmission Fundamentals
 
analysins aodv
analysins aodvanalysins aodv
analysins aodv
 
Wideband Complex Modulation Analysis Using a Real-Time Digital Demodulator
Wideband Complex Modulation Analysis Using a Real-Time Digital DemodulatorWideband Complex Modulation Analysis Using a Real-Time Digital Demodulator
Wideband Complex Modulation Analysis Using a Real-Time Digital Demodulator
 
8
88
8
 
Final
FinalFinal
Final
 

More from Prajwal Panchmahalkar

Matriux Leandros - BSidesLV 2013
Matriux Leandros - BSidesLV 2013Matriux Leandros - BSidesLV 2013
Matriux Leandros - BSidesLV 2013
Prajwal Panchmahalkar
 
Energy Aware Shortest Path Minded SPIN
Energy Aware Shortest Path Minded SPINEnergy Aware Shortest Path Minded SPIN
Energy Aware Shortest Path Minded SPINPrajwal Panchmahalkar
 
An analysis of a facebook spam exploited through browser addons
An analysis of a facebook spam exploited through browser addonsAn analysis of a facebook spam exploited through browser addons
An analysis of a facebook spam exploited through browser addons
Prajwal Panchmahalkar
 
[null] Iso 27001 a business view by Sripathi
[null] Iso 27001   a business view by Sripathi[null] Iso 27001   a business view by Sripathi
[null] Iso 27001 a business view by SripathiPrajwal Panchmahalkar
 
[null]Metapwn - Pwn at a puff by Prajwal Panchmahalkar
[null]Metapwn - Pwn at a puff by Prajwal Panchmahalkar[null]Metapwn - Pwn at a puff by Prajwal Panchmahalkar
[null]Metapwn - Pwn at a puff by Prajwal Panchmahalkar
Prajwal Panchmahalkar
 

More from Prajwal Panchmahalkar (14)

Matriux Leandros - BSidesLV 2013
Matriux Leandros - BSidesLV 2013Matriux Leandros - BSidesLV 2013
Matriux Leandros - BSidesLV 2013
 
Energy Aware Shortest Path Minded SPIN
Energy Aware Shortest Path Minded SPINEnergy Aware Shortest Path Minded SPIN
Energy Aware Shortest Path Minded SPIN
 
An analysis of a facebook spam exploited through browser addons
An analysis of a facebook spam exploited through browser addonsAn analysis of a facebook spam exploited through browser addons
An analysis of a facebook spam exploited through browser addons
 
Maanav Jugaad - Social Engineering
Maanav Jugaad - Social EngineeringMaanav Jugaad - Social Engineering
Maanav Jugaad - Social Engineering
 
[null]Iso 27001 a business view
[null]Iso 27001   a business view[null]Iso 27001   a business view
[null]Iso 27001 a business view
 
[null] Iso 27001 a business view by Sripathi
[null] Iso 27001   a business view by Sripathi[null] Iso 27001   a business view by Sripathi
[null] Iso 27001 a business view by Sripathi
 
[null]Metapwn - Pwn at a puff by Prajwal Panchmahalkar
[null]Metapwn - Pwn at a puff by Prajwal Panchmahalkar[null]Metapwn - Pwn at a puff by Prajwal Panchmahalkar
[null]Metapwn - Pwn at a puff by Prajwal Panchmahalkar
 
Facebook Attacks By dinesh
Facebook Attacks By dineshFacebook Attacks By dinesh
Facebook Attacks By dinesh
 
Brute force
Brute forceBrute force
Brute force
 
Network concepts
Network conceptsNetwork concepts
Network concepts
 
Matriux
MatriuxMatriux
Matriux
 
Security
SecuritySecurity
Security
 
Null who and_where (1)
Null who and_where (1)Null who and_where (1)
Null who and_where (1)
 
W3AF|null
W3AF|nullW3AF|null
W3AF|null
 

Recently uploaded

The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 

Recently uploaded (20)

The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 

Energy Aware Fault Tolerant SPMS Protocol in Wireless Sensor Networks

  • 2. Wireless Sensor Network (WSN) consists of spatially distributed autonomous sensors which cooperatively pass their data through the network to a main location  This work is motivated by SPMS (Shortest Path Minded SPIN) protocol
  • 3. Although SPMS was successful in achieving better latency and low power consumption compared to the SPIN protocol, it lacks in the following areas:  Energy at the nodes is not considered:  Relay nodes have additional overhead as they have to relay the data between source and destination  If a node in shortest path fails and the SCONE is not in the range of the node sending the request then there is no solution provided. ◦ But the aim of SPMS was fault tolerance !
  • 4. We assume that the communication overhead is higher than the storage overhead
  • 5. We discuss the failure cases of SPMS to provide a solution for the SPMS protocol  Here each node has the information of its neighbors zone along with its own zone  A Node also maintains the routing table to each of its neighbors.  Motivated from SPIN and SPMS protocols
  • 6. C E D A B F Routing Table of Neighbor B Routing Table of A E Destination Cost Via F B 1 - A C 1 - D 2 C
  • 7. Relay nodes (we call smart relay) are aware of its own residual energy and the energy it can spend the current communication  Smart relays, when they get a REQ from a destination node estimates the cost in relaying the data and calculates the Energy,  Er = Ep – (Erec + Et)  Where,  Er = Energy expected to remain after relaying  Ep = Energy present at current time  Erec = Energy spent in receiving the data from the source  Et = Energy spent in transmitting the data to the destination
  • 8. Relay nodes then set a 3 energy bits in it’s REQ while sending to the secondary relay node. We call it En-bit  This bit is a product which has the information of how much battery energy will be left in the relay node after the relay of data along with the cost.  The secondary relay node based on the En-bit will go into a waiting state which will be inversely proportional to En-bit  Trw α 1/En –bit ◦ Trw - Waiting time for the smart relay node.  Meanwhile the nodes present in the zone of the relay node which over hears the REQ also analyze the En-bit and calculate their own En-bit if they have both the destination and secondary relay node in their routing table and sends to secondary relay node
  • 9. E B C A D F source destination Relay nodes Nodes in zone of relay nodes
  • 10. E REQ B C A F D Node C calculates the energy it will be left with after the relaying source destination Relay nodes Nodes in zone of relay nodes
  • 11. E overhear REQ B C overhear A F D source destination Relay nodes REQ – Contains En-Bit Nodes in zone of relay nodes
  • 12. E Trw Calculate En-bit and is it Are B and D in my zone ? higher than C ? B C A F D source destination Relay nodes Nodes in zone of relay nodes
  • 13. F – has High En-bit E B C A F D source destination Relay nodes Nodes in zone of relay nodes
  • 14. F – has High En-bit E SNIP B C DAT A F D source destination Relay nodes Nodes in zone of relay nodes
  • 15. E Works similar to energy aware case where nodes in the zone of C – E and F take up B C A D F source destination Relay nodes Nodes in zone of relay nodes