These PPT's are very useful (as some basic parameters are also included) for the Research Scholars who want to work or working on the Energy Efficiency concept in Wireless Sensor Networks. I am sure that this short information is very helpful to all
IRJET- Wearable Antenna for Medical ApplicationIRJET Journal
This document discusses the design and simulation of a wearable antenna for medical applications using polydimethylsiloxane (PDMS) and glass as the substrate material. PDMS is a flexible, biocompatible polymer commonly used for medical devices. Glass is added to PDMS to control its flowing properties while maintaining flexibility. A circular patch antenna with slots and strips is designed and simulated. Simulation results show the antenna resonates at 2.8 GHz with a return loss of -19.0073 dB and VSWR of 1.2525 using the PDMS+glass substrate, meeting requirements for medical applications. The antenna is compact, flexible, and provides good performance, making it suitable for wearable medical devices.
Wireless communications is a type of data communication that is performed and delivered wirelessly. This is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Ad hoc wireless networks allow devices to connect and communicate with each other without a centralized access point. Nodes in an ad hoc network relay messages through intermediate hops to reach destinations. Examples include Bluetooth networks and wireless mesh networks. Issues in ad hoc networks include medium access control, routing with mobility and bandwidth constraints, and providing quality of service guarantees.
The document discusses wireless sensor networks and describes their key characteristics. It notes that wireless sensor networks consist of low-power smart sensor nodes distributed over a large field to enable wireless sensing and data networking. The sensor nodes contain sensors, processors, memory, and radios. Wireless sensor networks can be either unstructured with dense node distribution or structured with few scattered nodes.
- GPRS is an upgrade to GSM that allows packet-based data services and efficient use of network bandwidth. It provides higher data rates than GSM and constant connectivity.
- The GPRS network architecture introduces new network elements like the SGSN and GGSN to route data packets. The SGSN manages packet data in its service area while the GGSN connects the GPRS network to external packet networks.
- Session management in GPRS includes establishing PDP contexts for data transfer sessions and location management tracks the routing area of mobile devices through routing area updates.
Design Issues and Challenges in Wireless Sensor NetworksKhushbooGupta145
Wireless Sensor Networks (WSNs) are composed self-organized wireless ad hoc networks which comprise of a large number of resource constrained sensor nodes. The major areas of research in WSN is going on hardware, and operating system of WSN, deployment, architecture, localization, synchronization, programming models, data aggregation and dissemination, database querying, architecture, middleware, quality of service and security. This paper study highlights ongoing research activities and issues that affect the design and performance of Wireless Sensor Network.
Wireless communication technologies allow for mobility and flexibility through radio signals rather than wired connections. They include technologies like Bluetooth, WiFi, wireless LANs and MANs that enable applications such as video conferencing, telemedicine, and distance learning. Common wireless standards are IEEE 802.11 for WiFi and IEEE 802.16 for WiMax. Wireless networks face challenges of limited spectrum availability, lower bandwidth and higher delays compared to wired networks. Emerging wireless technologies are expanding connectivity and access to services for more users.
IRJET- Wearable Antenna for Medical ApplicationIRJET Journal
This document discusses the design and simulation of a wearable antenna for medical applications using polydimethylsiloxane (PDMS) and glass as the substrate material. PDMS is a flexible, biocompatible polymer commonly used for medical devices. Glass is added to PDMS to control its flowing properties while maintaining flexibility. A circular patch antenna with slots and strips is designed and simulated. Simulation results show the antenna resonates at 2.8 GHz with a return loss of -19.0073 dB and VSWR of 1.2525 using the PDMS+glass substrate, meeting requirements for medical applications. The antenna is compact, flexible, and provides good performance, making it suitable for wearable medical devices.
Wireless communications is a type of data communication that is performed and delivered wirelessly. This is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Ad hoc wireless networks allow devices to connect and communicate with each other without a centralized access point. Nodes in an ad hoc network relay messages through intermediate hops to reach destinations. Examples include Bluetooth networks and wireless mesh networks. Issues in ad hoc networks include medium access control, routing with mobility and bandwidth constraints, and providing quality of service guarantees.
The document discusses wireless sensor networks and describes their key characteristics. It notes that wireless sensor networks consist of low-power smart sensor nodes distributed over a large field to enable wireless sensing and data networking. The sensor nodes contain sensors, processors, memory, and radios. Wireless sensor networks can be either unstructured with dense node distribution or structured with few scattered nodes.
- GPRS is an upgrade to GSM that allows packet-based data services and efficient use of network bandwidth. It provides higher data rates than GSM and constant connectivity.
- The GPRS network architecture introduces new network elements like the SGSN and GGSN to route data packets. The SGSN manages packet data in its service area while the GGSN connects the GPRS network to external packet networks.
- Session management in GPRS includes establishing PDP contexts for data transfer sessions and location management tracks the routing area of mobile devices through routing area updates.
Design Issues and Challenges in Wireless Sensor NetworksKhushbooGupta145
Wireless Sensor Networks (WSNs) are composed self-organized wireless ad hoc networks which comprise of a large number of resource constrained sensor nodes. The major areas of research in WSN is going on hardware, and operating system of WSN, deployment, architecture, localization, synchronization, programming models, data aggregation and dissemination, database querying, architecture, middleware, quality of service and security. This paper study highlights ongoing research activities and issues that affect the design and performance of Wireless Sensor Network.
Wireless communication technologies allow for mobility and flexibility through radio signals rather than wired connections. They include technologies like Bluetooth, WiFi, wireless LANs and MANs that enable applications such as video conferencing, telemedicine, and distance learning. Common wireless standards are IEEE 802.11 for WiFi and IEEE 802.16 for WiMax. Wireless networks face challenges of limited spectrum availability, lower bandwidth and higher delays compared to wired networks. Emerging wireless technologies are expanding connectivity and access to services for more users.
This document provides an overview of microstrip patch antennas, also known as patch antennas. It defines patch antennas as consisting of a metal patch on top of a grounded dielectric substrate, which are useful at microwave frequencies above 1 GHz. The document discusses the geometry, advantages, disadvantages, feeding techniques, basic properties including resonance frequency and bandwidth, radiation pattern, and applications of microstrip patch antennas. The main applications mentioned are in mobiles, satellites, GPS, WiMAX, medical devices, and radar.
The document summarizes a seminar presentation on wireless sensor networks. It discusses the architecture of WSNs, including sensor nodes, gateways, base stations, and networking topologies. It also covers the advantages and disadvantages of WSNs, their applications in fields like environmental monitoring and medical monitoring, and their future potential to bridge the physical and digital worlds.
Optical networking technologies provide high-speed, high-bandwidth data transmission over long distances using fiber optic cables. Key technologies include passive optical networks (PON) for access networks, SONET/SDH for metro networks, and dense wavelength division multiplexing (DWDM) for long-haul transport networks. DWDM works by transmitting multiple optical signals simultaneously on different wavelengths over the same fiber, vastly increasing network capacity. Proper layer-2 encapsulation is required to transport layer-3 protocols like IP over DWDM.
The document discusses beamforming antennas and their applications. It begins by outlining beamforming concepts and configurations like phased arrays and adaptive arrays. It then discusses applications of beamforming antennas in areas like radar, sonar, communications and imaging. Specific examples covered include phased array radar, neuronal spike sorting, and smart antenna systems for wireless networks. Vector antennas and their advantages over phased arrays are also summarized. Finally, the document discusses potential uses and challenges of beamforming antennas for wireless ad hoc networks.
EC8702 adhoc and wireless sensor networks iv eceGOWTHAMMS6
This document outlines the syllabus for a course on Adhoc and Wireless Sensor Networks. It covers five units: (1) Introduction to Adhoc Networks and routing protocols, (2) Introduction to sensor networks and architectures, (3) Networking concepts and protocols for sensor networks, (4) Security issues in sensor networks, and (5) Sensor network platforms and tools. Some key topics discussed include characteristics of adhoc networks, challenges in routing, components and applications of wireless sensor networks, and medium access schemes. The objectives are for students to learn the fundamentals and apply their knowledge to identify suitable protocols based on network requirements and understand security and transport layer issues in these networks.
Millimeter waves is considered as a key enabling technology for the future wireless networks, 5G network.
To that end, these simple slides go further in the motivation, characteristics, applications, and many others related to the mmWaves.
enjoy .. :)
This document provides an overview of wireless sensor networks. It discusses wireless communication technologies, the need for wireless communication, and defines wireless sensor networks. It describes the characteristics, architecture, operating systems, applications, and technical challenges of wireless sensor networks. Finally, it discusses some companies that manufacture wireless sensor network products, including Cisco, IBM, and Libelium.
Vijayanand Metri presented a seminar on wireless sensor networks under the guidance of Prof. Surekha of the computer science and engineering department at GEC Haveri. The presentation covered the introduction, architecture, types, characteristics, features, issues, applications, advantages, and disadvantages of wireless sensor networks. It discussed sensor nodes, ad hoc deployment, unattended operation, environmental monitoring, health monitoring, and concluded that WSNs consist of small sensor nodes that can solve many open issues practically and cost-effectively.
Design & Study of Microstrip Patch Antenna.The project here provides a detailed study of how to design a probe-fed Square Micro-strip Patch Antenna using HFSS, v11.0 software and study the effect of antenna dimensions Length (L), and substrate parameters relative Dielectric constant (εr), substrate thickness (t) on the Radiation parameters of Bandwidth and Beam-width.
This document provides an overview of wireless communication. It discusses why wireless communication is useful by allowing freedom from wires and global coverage. Wireless communication transmits voice and data using electromagnetic waves without physical connections. Common wireless technologies like Wi-Fi, Bluetooth, and cellular networks operate at different frequency bands. The document also covers advantages and disadvantages of wireless communication, current wireless systems including cellular, WLAN, satellite, and paging systems.
Millimeter wave mobile communication has several advantages over traditional cellular frequencies. It utilizes the 30-300GHz spectrum which has much larger channel bandwidths available, enabling significantly higher data rates. Key benefits include multi-Gbps speeds, narrow beams allowing frequency reuse, and inherent security. However, mm-waves also have challenges including higher attenuation over distance, difficulty passing through walls, and interference from rain and oxygen. Potential applications include small cell 5G networks, wireless backhaul between small cells, and outdoor coverage up to 300 meters using beamforming.
This document discusses different types of sensor node hardware: augmented general-purpose computers, dedicated embedded sensor nodes, and system-on-chip devices. It notes that Berkley motes have gained popularity due to their small size, open source software, and commercial availability. The document also outlines challenges in sensor network programming like event-driven execution and low-level hardware controls. It describes node-level software platforms and simulators as well as state-centric programming approaches.
The document discusses outage probability in wireless communication. It introduces communication systems and challenges like bandwidth, latency, and interference. It then defines outage as the signal strength falling below a threshold at the receiver. The key factors that affect outage probability are discussed, including distance, path loss, shadowing, and noise. Equations are provided to calculate outage probability based on these parameters. Graphs are also used to illustrate the relationship between received power and outage probability.
This document discusses multiple access techniques for wireless communications, including FDMA, TDMA, and CDMA. It provides details on how each technique works and its advantages and disadvantages. FDMA divides the frequency band into channels that can be assigned to individual users. TDMA divides each channel into time slots that can be assigned to users. CDMA allows all users to use the whole available bandwidth simultaneously by using unique codes to distinguish users.
Routing protocols in wireless sensor networks face several unique challenges compared to other wireless networks. The document discusses these challenges and provides an overview of common routing protocol approaches in WSNs, including flat routing protocols like SPIN and Directed Diffusion, hierarchical routing protocols like LEACH, and location-based routing protocols. It also covers routing design issues specific to WSNs such as energy efficiency, data delivery models, fault tolerance, and quality of service.
A wireless sensor network consists of spatially distributed sensor nodes that monitor physical conditions and communicate wirelessly. Nodes sense data, process it, and transmit it to other nodes or a central gateway. The gateway provides a connection to the wired world to collect, process, analyze and present measurement data. Routers can extend the communication range between nodes and the gateway. Sensor nodes are small, require little power, are programmable and cost-effective to purchase and maintain.
MicroStrip Antenna
Introduction .
Micro-Strip Antennas Types .
Micro-Strip Antennas Shapes .
Types of Substrates (Dielectric Media) .
Comparison of various types of flat profile printed antennas .
Advantages & DisAdvantages of MSAs .
Applications of MSAs .
Radiation patterns of MSAs .
How to Optimizing the Substrate Properties for Increased Bandwidth ?
Comparing the different feed techniques .
This document provides an overview of ultra-wideband (UWB) technology. It discusses what UWB is, its principles and characteristics in both the time and frequency domains. Key advantages of UWB include high data rates over short ranges, multipath immunity, low power and cost. Applications discussed include wireless personal area networks, military communications, ground penetrating radar and sensors. Challenges of UWB are also noted, as well as its future potential and comparison to other technologies.
This document provides an overview of wireless ad-hoc networks. It discusses the definition and types of multi-hop wireless networks. Some key technical challenges for ad-hoc networks are limited wireless range, mobility, and energy constraints. The document reviews several media access and routing protocols used in ad-hoc networks, including MACA, DSDV, AODV and DSR. It also discusses providing quality of service in ad-hoc networks and some of the challenges in routing, maintenance and variable resources. In conclusion, the document states that flexibility, low cost and applications make ad-hoc networks an essential part of future pervasive computing environments.
The document summarizes a PhD student's research proposal on developing an energy-efficient routing protocol for wireless sensor networks. It outlines the objectives to compute high-energy forwarding paths, find non-congested nodes, and determine sink mobility. It then reviews related work on routing protocols and identifies gaps regarding energy and buffer residual status. The literature review covers 18 publications and their applications and limitations. Finally, it provides an outline of the proposed methodology, models, conclusions and future work.
The document summarizes a research paper on an Energy Efficient Parallel LEACH Protocol for Underwater Wireless Sensor Networks. It proposes EEPLEACH, which improves on the popular LEACH protocol by implementing it in parallel across multiple CPU cores and GPUs. The paper presents the EEPLEACH algorithm and simulation results showing it improves network performance metrics like lifetime and reduces dead nodes compared to serial LEACH. Evaluation on dual-core through octa-core machines demonstrated faster execution times with more cores. The research contributes an energy-efficient routing protocol for underwater sensor networks that harnesses parallel processing.
This document provides an overview of microstrip patch antennas, also known as patch antennas. It defines patch antennas as consisting of a metal patch on top of a grounded dielectric substrate, which are useful at microwave frequencies above 1 GHz. The document discusses the geometry, advantages, disadvantages, feeding techniques, basic properties including resonance frequency and bandwidth, radiation pattern, and applications of microstrip patch antennas. The main applications mentioned are in mobiles, satellites, GPS, WiMAX, medical devices, and radar.
The document summarizes a seminar presentation on wireless sensor networks. It discusses the architecture of WSNs, including sensor nodes, gateways, base stations, and networking topologies. It also covers the advantages and disadvantages of WSNs, their applications in fields like environmental monitoring and medical monitoring, and their future potential to bridge the physical and digital worlds.
Optical networking technologies provide high-speed, high-bandwidth data transmission over long distances using fiber optic cables. Key technologies include passive optical networks (PON) for access networks, SONET/SDH for metro networks, and dense wavelength division multiplexing (DWDM) for long-haul transport networks. DWDM works by transmitting multiple optical signals simultaneously on different wavelengths over the same fiber, vastly increasing network capacity. Proper layer-2 encapsulation is required to transport layer-3 protocols like IP over DWDM.
The document discusses beamforming antennas and their applications. It begins by outlining beamforming concepts and configurations like phased arrays and adaptive arrays. It then discusses applications of beamforming antennas in areas like radar, sonar, communications and imaging. Specific examples covered include phased array radar, neuronal spike sorting, and smart antenna systems for wireless networks. Vector antennas and their advantages over phased arrays are also summarized. Finally, the document discusses potential uses and challenges of beamforming antennas for wireless ad hoc networks.
EC8702 adhoc and wireless sensor networks iv eceGOWTHAMMS6
This document outlines the syllabus for a course on Adhoc and Wireless Sensor Networks. It covers five units: (1) Introduction to Adhoc Networks and routing protocols, (2) Introduction to sensor networks and architectures, (3) Networking concepts and protocols for sensor networks, (4) Security issues in sensor networks, and (5) Sensor network platforms and tools. Some key topics discussed include characteristics of adhoc networks, challenges in routing, components and applications of wireless sensor networks, and medium access schemes. The objectives are for students to learn the fundamentals and apply their knowledge to identify suitable protocols based on network requirements and understand security and transport layer issues in these networks.
Millimeter waves is considered as a key enabling technology for the future wireless networks, 5G network.
To that end, these simple slides go further in the motivation, characteristics, applications, and many others related to the mmWaves.
enjoy .. :)
This document provides an overview of wireless sensor networks. It discusses wireless communication technologies, the need for wireless communication, and defines wireless sensor networks. It describes the characteristics, architecture, operating systems, applications, and technical challenges of wireless sensor networks. Finally, it discusses some companies that manufacture wireless sensor network products, including Cisco, IBM, and Libelium.
Vijayanand Metri presented a seminar on wireless sensor networks under the guidance of Prof. Surekha of the computer science and engineering department at GEC Haveri. The presentation covered the introduction, architecture, types, characteristics, features, issues, applications, advantages, and disadvantages of wireless sensor networks. It discussed sensor nodes, ad hoc deployment, unattended operation, environmental monitoring, health monitoring, and concluded that WSNs consist of small sensor nodes that can solve many open issues practically and cost-effectively.
Design & Study of Microstrip Patch Antenna.The project here provides a detailed study of how to design a probe-fed Square Micro-strip Patch Antenna using HFSS, v11.0 software and study the effect of antenna dimensions Length (L), and substrate parameters relative Dielectric constant (εr), substrate thickness (t) on the Radiation parameters of Bandwidth and Beam-width.
This document provides an overview of wireless communication. It discusses why wireless communication is useful by allowing freedom from wires and global coverage. Wireless communication transmits voice and data using electromagnetic waves without physical connections. Common wireless technologies like Wi-Fi, Bluetooth, and cellular networks operate at different frequency bands. The document also covers advantages and disadvantages of wireless communication, current wireless systems including cellular, WLAN, satellite, and paging systems.
Millimeter wave mobile communication has several advantages over traditional cellular frequencies. It utilizes the 30-300GHz spectrum which has much larger channel bandwidths available, enabling significantly higher data rates. Key benefits include multi-Gbps speeds, narrow beams allowing frequency reuse, and inherent security. However, mm-waves also have challenges including higher attenuation over distance, difficulty passing through walls, and interference from rain and oxygen. Potential applications include small cell 5G networks, wireless backhaul between small cells, and outdoor coverage up to 300 meters using beamforming.
This document discusses different types of sensor node hardware: augmented general-purpose computers, dedicated embedded sensor nodes, and system-on-chip devices. It notes that Berkley motes have gained popularity due to their small size, open source software, and commercial availability. The document also outlines challenges in sensor network programming like event-driven execution and low-level hardware controls. It describes node-level software platforms and simulators as well as state-centric programming approaches.
The document discusses outage probability in wireless communication. It introduces communication systems and challenges like bandwidth, latency, and interference. It then defines outage as the signal strength falling below a threshold at the receiver. The key factors that affect outage probability are discussed, including distance, path loss, shadowing, and noise. Equations are provided to calculate outage probability based on these parameters. Graphs are also used to illustrate the relationship between received power and outage probability.
This document discusses multiple access techniques for wireless communications, including FDMA, TDMA, and CDMA. It provides details on how each technique works and its advantages and disadvantages. FDMA divides the frequency band into channels that can be assigned to individual users. TDMA divides each channel into time slots that can be assigned to users. CDMA allows all users to use the whole available bandwidth simultaneously by using unique codes to distinguish users.
Routing protocols in wireless sensor networks face several unique challenges compared to other wireless networks. The document discusses these challenges and provides an overview of common routing protocol approaches in WSNs, including flat routing protocols like SPIN and Directed Diffusion, hierarchical routing protocols like LEACH, and location-based routing protocols. It also covers routing design issues specific to WSNs such as energy efficiency, data delivery models, fault tolerance, and quality of service.
A wireless sensor network consists of spatially distributed sensor nodes that monitor physical conditions and communicate wirelessly. Nodes sense data, process it, and transmit it to other nodes or a central gateway. The gateway provides a connection to the wired world to collect, process, analyze and present measurement data. Routers can extend the communication range between nodes and the gateway. Sensor nodes are small, require little power, are programmable and cost-effective to purchase and maintain.
MicroStrip Antenna
Introduction .
Micro-Strip Antennas Types .
Micro-Strip Antennas Shapes .
Types of Substrates (Dielectric Media) .
Comparison of various types of flat profile printed antennas .
Advantages & DisAdvantages of MSAs .
Applications of MSAs .
Radiation patterns of MSAs .
How to Optimizing the Substrate Properties for Increased Bandwidth ?
Comparing the different feed techniques .
This document provides an overview of ultra-wideband (UWB) technology. It discusses what UWB is, its principles and characteristics in both the time and frequency domains. Key advantages of UWB include high data rates over short ranges, multipath immunity, low power and cost. Applications discussed include wireless personal area networks, military communications, ground penetrating radar and sensors. Challenges of UWB are also noted, as well as its future potential and comparison to other technologies.
This document provides an overview of wireless ad-hoc networks. It discusses the definition and types of multi-hop wireless networks. Some key technical challenges for ad-hoc networks are limited wireless range, mobility, and energy constraints. The document reviews several media access and routing protocols used in ad-hoc networks, including MACA, DSDV, AODV and DSR. It also discusses providing quality of service in ad-hoc networks and some of the challenges in routing, maintenance and variable resources. In conclusion, the document states that flexibility, low cost and applications make ad-hoc networks an essential part of future pervasive computing environments.
The document summarizes a PhD student's research proposal on developing an energy-efficient routing protocol for wireless sensor networks. It outlines the objectives to compute high-energy forwarding paths, find non-congested nodes, and determine sink mobility. It then reviews related work on routing protocols and identifies gaps regarding energy and buffer residual status. The literature review covers 18 publications and their applications and limitations. Finally, it provides an outline of the proposed methodology, models, conclusions and future work.
The document summarizes a research paper on an Energy Efficient Parallel LEACH Protocol for Underwater Wireless Sensor Networks. It proposes EEPLEACH, which improves on the popular LEACH protocol by implementing it in parallel across multiple CPU cores and GPUs. The paper presents the EEPLEACH algorithm and simulation results showing it improves network performance metrics like lifetime and reduces dead nodes compared to serial LEACH. Evaluation on dual-core through octa-core machines demonstrated faster execution times with more cores. The research contributes an energy-efficient routing protocol for underwater sensor networks that harnesses parallel processing.
This document summarizes research on energy efficient multipath routing techniques in wireless sensor networks. It reviews 24 related works that propose and evaluate various multipath routing protocols to increase network lifetime and balance energy consumption. The routing protocols are categorized based on path establishment, network structure, and protocol operation. Key goals of multipath routing include minimizing total energy consumption, extending network lifetime, improving load balancing, and providing reliable and efficient data transmission.
Energy-aware strategy for data forwarding in IoT ecosystem IJECEIAES
The Internet of Things (IoT) is looming technology rapidly attracting many industries and drawing research attention. Although the scale of IoT-applications is very large, the capabilities of the IoT-devices are limited, especially in terms of energy. However, various research works have been done to alleviate these shortcomings, but the schemes introduced in the literature are complex and difficult to implement in practical scenarios. Therefore, considering the energy consumption of heterogeneous nodes in IoT eco-system, a simple energy-efficient routing technique is proposed. The proposed system has also employed an SDN controller that acts as a centralized manager to control and monitor network services, there by restricting the access of selfish nodes to the network. The proposed system constructs an analytical algorithm that provides reliable data transmission operations and controls energy consumption using a strategic mechanism where the path selection process is performed based on the remaining energy of adjacent nodes located in the direction of the destination node. The proposed energy-efficient data forwarding mechanism is compared with the existing AODV routing technique. The simulation result demonstrates that the protocol is superior to AODV in terms of packet delivery rate, throughput, and end-to-end delay.
Energy Optimization in Heterogeneous Clustered Wireless Sensor NetworksIRJET Journal
1) The document discusses energy optimization in heterogeneous clustered wireless sensor networks. It proposes a new method called Energy optimized heterogeneous clustered wireless sensor networks (EEHC) to improve network lifetime by reducing energy consumption.
2) The EEHC method selects cluster heads based on node energy levels and connectivity to balance energy usage. It uses different transmission techniques within and between clusters to minimize energy usage.
3) Simulation results show the EEHC method improves network lifetime compared to LEACH and AEEC clustering protocols for wireless sensor networks.
The paper presents a technique called as Mobility-enabled Multi Level Optimization (MeMLO) that addressing the existing problem of clustering in wireless sensor net-work (WSN). The technique enables selection of aggregator node based on multiple optimi-zation attribute which gives better decision capability to the clustering mechanism by choosing the best aggregator node. The outcome of the study shows MeMLO is highly capable of minimizing the halt time of mobile node that significantly lowers the transmit power of aggregator node. The simulation outcome shows negligible computational com-plexity, faster response time, and highly energy efficient for large scale WSN for longer simulation rounds as compared to conventional LEACH algorithm.
Multi Objective Salp Swarm based Energy Efficient Routing Protocol for Hetero...IJCNCJournal
Routing is a persistent concern in wireless sensor networks (WSNs), as getting data from sources to destinations can be a tricky task. Challenges include safeguarding the data being transferred, ensuring network longevity, and preserving energy in harsh environmental conditions. Consequently, this study delves into the suitability of using multi-objective swarm optimization to route heterogeneous WSNs in the hope of mitigating these issues while boosting the speed and accuracy of data transmission. In order to achieve better performance in terms of load balancing and reducing energy expenditure, the MOSSA-BA algorithm was developed. This algorithm combines the Multi-Objective Salp Swarm Algorithm (MOSSA) with the exploiting strategy of the artificial bee colony (BA) in the neighbourhood of Salps. Inspired by the SEP and EDEEC protocols, the integrated solutions of MOSSA-BA were used to route two and three levels of heterogeneous networks. The embedded solutions provided outstanding performance in regards to FND, HND, LND, percentage of remaining energy, and the number of packages delivered to the base station. Compared to SEP, EDEEC, and other competitors based on MOSSA and a modified multi-objective particle swarm optimization (MOPSO), the MOSSA-BA-based protocols demonstrated energy-saving percentages of more than 34% in medium-sized areas of interest and over 22% in large-sized areas of detection.
Multi Objective Salp Swarm based Energy Efficient Routing Protocol for Hetero...IJCNCJournal
The document proposes using multi-objective swarm optimization algorithms to route data in heterogeneous wireless sensor networks. Specifically, it develops the MOSSA-BA algorithm, which combines the Multi-Objective Salp Swarm Algorithm (MOSSA) with the artificial bee colony algorithm (BA). Testing shows the MOSSA-BA based routing protocols improve energy efficiency over 34% in medium areas and over 22% in large areas compared to SEP, EDEEC, and other competitors.
This document discusses performance evaluation of sensor node scalability using a reactive modified I-LEACH protocol. It begins with an abstract that introduces the challenges of wireless sensor networks including limited power, computing, and storage capacity of sensor nodes. It then reviews related work on improving the LEACH protocol. The paper aims to increase network lifetime by using a reactive I-LEACH protocol and compares its performance to LEACH and I-LEACH based on power usage and lifetime. It finds that the proposed technique shows more effective results, even with increased node scalability.
A New Method for Reducing Energy Consumption in Wireless Sensor Networks usin...Editor IJCATR
Nowadays, wireless sensor networks, clustering protocol based on the neighboring nodes into separate clusters and fault
tolerance for each cluster exists for sensors to send information to the base station, to gain the best performance in terms of increased
longevity and maintain tolerance than with other routing methods. However, most clustering protocols proposed so far, only
geographical proximity (neighboring) cluster formation is considered as a parameter. In this study, a new clustering protocol and fault
tolerance based on the fuzzy algorithms are able to clustering nodes in sensor networks based on fuzzy logic and fault tolerance. This
protocol uses clustering sensor nodes and fault tolerance exist in the network to reduce energy consumption, so that faulty sensors
from neighboring nodes are used to cover the errors, work based on the most criteria overlay neighbor sensors with defective sensors,
distance neighbor sensors from fault sensor and distance neighbor sensors from central station is done. Superior performance of the
protocol can be seen in terms of increasing the network lifetime and maintain the best network tolerance in comparison with previous
protocols such as LEACH in the simulation results.
Review Paper on Energy Efficient Protocol in Wireless Sensor NetworkIJERA Editor
Wireless sensor network (WSN) is a system composed of a large number of low-cost micro-sensors. This network is used to collect and send various kinds of messages to a base station (BS). WSN consists of low-cost nodes with limited battery power, and the battery replacement is not easy for WSN with thousands of physically embedded nodes, which means energy efficient routing protocol should be employed to offer a long network life time. The lifetime of Wireless Sensor Networks (WSN) is crucial. To achieve the aim, we need not only to minimize total energy consumption but also to balance WSN load. Hence, this paper aims to study different energy balance routing protocols of WSNs. In this paper, we have compared different protocols of WSN, ensuring maximum network lifetime by balancing the load as equally as possible
Wireless sensor networks have recently come into prominence because they hold the
potential to revolutionize many segments. The Wireless Sensor Network (WSN) is made up of a
collection of sensor nodes, which were small energy constrained devices. Routing technique is one of
the research area in wireless sensor network. So by designing an efficient routing protocol for
reducing energy consumption is the important factor. In this paper, a brief introduction to routing
challenges in WSN have been mentioned. This paper also provides the basic classification of routing
protocols in WSNs along with the most energy efficient protocol named LEACH along with its
advantages and disadvantages. This paper also focus on some of the improved version of LEACH
protocol.
Exploring Wireless A Comprehensive Review on Sensor Node Integration and Ener...ijtsrd
WSNs encompass a multitude of spatially distributed sensor nodes or devices employing radio signals for communication. Positioned strategically in a geographical area, these sensor nodes operate independently to collect information from their surroundings. Given their often remote and inaccessible locations, human interaction with deployed sensor nodes is limited. The core function of sensor nodes in WSNs involves sensing environmental data and transmitting it to a centralized base station or sink node. Subsequently, the collected data undergoes analysis, demonstrating the vital role of WSNs in facilitating data driven insights within the realm of computer science. In this paper review of different research paper on the based of wireless sensor networks technology and different sensors for optimization of energy dissipation. Vijay Malviya | Dr. Sachin Patel "Exploring Wireless: A Comprehensive Review on Sensor Node Integration and Energy Optimization Strategies for Enhanced Environmental Data Collection" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd62401.pdf Paper Url: https://www.ijtsrd.com/computer-science/other/62401/exploring-wireless-a-comprehensive-review-on-sensor-node-integration-and-energy-optimization-strategies-for-enhanced-environmental-data-collection/vijay-malviya
LOAD BALANCING AND ENERGY EFFICIENCY IN WSN BY CLUSTER JOINING METHODIAEME Publication
In any WSN life of network is depending on life of sensor node. Thus, proper load balancing is very useful for improving life of network. The tree-based routing protocols like GSTEB used dynamic tree structures for routing without any formation of collections. In cases of larger networks, the scheme is not always feasible. In this proposed work cluster-based routing method is used. Cluster head is selected such that it should be close to the base station and should have maximum residential energy than other nodes selected for cluster formation. Size of cluster is controlled by using location-based cluster joining method such that nodes selects their nearest collection head based on the signal strength from cluster head and distance between node and cluster head. Nodes connect to head having the highest signal strength and closest to the base station, this minimizes size of cluster and reduces extra energy consumption. In addition to this cluster formation process starts only after availability of data due to an event. So proposed protocol performs better than existing tree based protocols like GSTEB in terms of energy efficiency
LOAD BALANCING AND ENERGY EFFICIENCY IN WSN BY CLUSTER JOINING METHODIAEME Publication
In any WSN life of network is depending on life of sensor node. Thus, proper load balancing is very useful for improving life of network. The tree-based routing protocols like GSTEB used dynamic tree structures for routing without any formation of collections. In cases of larger networks, the scheme is not always feasible. In this proposed work cluster-based routing method is used. Cluster head is selected such that it should be close to the base station and should have maximum residential energy than other nodes selected for cluster formation. Size of cluster is controlled by using location-based cluster joining method such that nodes selects their nearest collection head based on the signal strength from cluster head and distance between node and cluster head. Nodes connect to head having the highest signal strength and closest to the base station, this minimizes size of cluster and reduces extra energy consumption. In addition to this cluster formation process starts only after availability of data due to an event. So proposed protocol performs better than existing tree based protocols like GSTEB in terms of energy efficiency
Lifetime enhanced energy efficient wireless sensor networks using renewable e...IJECEIAES
In this paper, we consider a remote environment with randomly deployed sensor nodes, with an initial energy of E0 (J) and a solar panel. A hierarchical clustering technique is implemented. At each round, the normal nodes send the sensed data to the nearest cluster head (CH) which is chosen on the probability value. Data after aggregation at CHs is sent to the base station (BS). CH requires more energy than normal nodes. Here, we energize only CHs if their energy is less than 5% of its initial value with the use of solar energy. We evaluate parameters like energy consumption, the lifetime of the network, and data packets sent to CH and BS. The obtained results are compared with existing techniques. The proposed protocol provides better energy efficiency and network lifetime. The results show increased stability with delayed death of the first node. The network lifetime of the proposed protocol is compared to the multi-level hybrid energy efficient distributed (MLHEED) technique and low-energy adaptive clustering hierarchy (LEACH) variants. Network lifetime is enhanced by 13.35%. Energy consumption is reduced with respect to MLHEED-4, 5, and 6 by 7.15%, 12.10%, and 14.975% respectively. The no. of packets transferred to the BS is greater than the MLHEED protocol by 39.03%.
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...IJECEIAES
This document summarizes a research paper that proposes a novel optimization framework to minimize power drainage in mobile devices using multicarrier-based communication. The framework aims to maintain equilibrium between maximizing data delivery and minimizing transmit power. An analytical model considers multiple radio antennas in mobile devices and includes constraints for data quality and threshold power. The outcome is evaluated based on the amount of power conserved. Testing found the approach offers maximum energy conservation while being compatible with existing mobile network systems.
Novel Optimization to Reduce Power Drainage in Mobile Devices for Multicarrie...IJECEIAES
With increasing adoption of multicarrier-based communications e.g. 3G and 4G, the users are significantly benefited with impressive data rate but at the cost of battery life of their mobile devices. We reviewed the existing techniques to find an open research gap in this regard. This paper presents a novel framework where an optimization is carried out with the objective function to maintain higher level of equilibrium between maximized data delivery and minimized transmit power. An analytical model considering multiple radio antennae in the mobile device is presented with constraint formulations of data quality and threshold power factor. The model outcome is evaluated with respect to amount of power being conserved as performance factor. The study was found to offer maximum energy conservation and the framework also suits well with existing communication system of mobile networks.
Similar to Energy efficient routing protocol for enhancing network lifetime and performance in wireless sensor networks----by dr. a. k. lodhi (20)
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMHODECEDSIET
Time Division Multiplexing (TDM) is a method of transmitting multiple signals over a single communication channel by dividing the signal into many segments, each having a very short duration of time. These time slots are then allocated to different data streams, allowing multiple signals to share the same transmission medium efficiently. TDM is widely used in telecommunications and data communication systems.
### How TDM Works
1. **Time Slots Allocation**: The core principle of TDM is to assign distinct time slots to each signal. During each time slot, the respective signal is transmitted, and then the process repeats cyclically. For example, if there are four signals to be transmitted, the TDM cycle will divide time into four slots, each assigned to one signal.
2. **Synchronization**: Synchronization is crucial in TDM systems to ensure that the signals are correctly aligned with their respective time slots. Both the transmitter and receiver must be synchronized to avoid any overlap or loss of data. This synchronization is typically maintained by a clock signal that ensures time slots are accurately aligned.
3. **Frame Structure**: TDM data is organized into frames, where each frame consists of a set of time slots. Each frame is repeated at regular intervals, ensuring continuous transmission of data streams. The frame structure helps in managing the data streams and maintaining the synchronization between the transmitter and receiver.
4. **Multiplexer and Demultiplexer**: At the transmitting end, a multiplexer combines multiple input signals into a single composite signal by assigning each signal to a specific time slot. At the receiving end, a demultiplexer separates the composite signal back into individual signals based on their respective time slots.
### Types of TDM
1. **Synchronous TDM**: In synchronous TDM, time slots are pre-assigned to each signal, regardless of whether the signal has data to transmit or not. This can lead to inefficiencies if some time slots remain empty due to the absence of data.
2. **Asynchronous TDM (or Statistical TDM)**: Asynchronous TDM addresses the inefficiencies of synchronous TDM by allocating time slots dynamically based on the presence of data. Time slots are assigned only when there is data to transmit, which optimizes the use of the communication channel.
### Applications of TDM
- **Telecommunications**: TDM is extensively used in telecommunication systems, such as in T1 and E1 lines, where multiple telephone calls are transmitted over a single line by assigning each call to a specific time slot.
- **Digital Audio and Video Broadcasting**: TDM is used in broadcasting systems to transmit multiple audio or video streams over a single channel, ensuring efficient use of bandwidth.
- **Computer Networks**: TDM is used in network protocols and systems to manage the transmission of data from multiple sources over a single network medium.
### Advantages of TDM
- **Efficient Use of Bandwidth**: TDM all
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
Energy efficient routing protocol for enhancing network lifetime and performance in wireless sensor networks----by dr. a. k. lodhi
1. Energy-Efficient Routing Protocol for enhancing network
lifetime and performance in Wireless Sensor Networks
Amairullah Khan Lodhi (121PG05201)
Research Scholar
Under the Esteemed Guidance of
Dr. M. S. S. Rukmini (Supervisor)
Prof. ECE, VFSTR, Vadlamudi, Guntur.(A.P.)
(Deemed to be University)
Dr. Syed Abdul Sattar (Co-Supervisor)
Principal & Prof. ECE,
Nawab Shah Alam Khan College of Engineering & Technology, Hyderabad.
2. Year of Registration April 2013
Pre-Ph.D. Pass Percentage 67
No. of DRCs completed 10
No. of Research publications 18
Journals 07
Conferences 07
Communicated (Journals/Conferences) 04
Workshops/Seminars
Attended
08
11/28/2020 2
Ph.D. Details
3. Outline
• Introduction
• Objectives and scope of the Research
• Literature review
• Research gaps identification based on literature review
• Proposed Methodology
• Proposed models and results
• Conclusions
• Future Scope of research
• Details of publications in journals, conferences and seminars
• References
311/28/2020
6. It is all about that, how well the sensor field be monitored
• Worst-case: In which path is avoided by the sensors detection
• Best-case : In which path is best monitored by the sensors.
Introduction
Routing Path Cases
611/28/2020
8. Objectives & Scope of the Work
Objective1 (a):- Computing high energy packet forwarding path: - It is achieved by the
computation of routing path which is free from packet drop due to constrained
energy.
Objective1 (b):- Finding non-congest node for communication: - It is achieved by the
selection of neighbor node which were free from packet drop due to buffer
overflow.
Objective 1 (a) + Objective 1 (b) = EBRS ( It removes the Bottleneck Issue)
Objective2:- Determining sink mobility: - It is achieved by selecting the neighbor node
to the sink in such a way that the packet drop due to constrained energy and buffer
from the neighbor node should not happen.
811/28/2020
9. Literature Review
Energy & Buffer Residual Status
9
Authors Title Work Applications/Limitations
Nikolaos A.
Pantazis, Stefanos A.
Nikolidakis and
Dimitrios D.
Vergados, Senior
Member, IEEE
“Energy-Efficient Routing
Protocols in Wireless Sensor
Networks: A Survey.”
IEEE Communications
Surveys & Tutorials, Vol. 15,
No. 2, Second Quarter 2013.
An analytical survey on energy efficient
routing protocols for WSNs is provided.
The classification initially proposed by Al-
Karaki, is expanded, in order to enhance all
the proposed papers since 2004.
It better describes which operations is to be
used in each protocol to enhance the energy
efficiency issues.
It uses a mobile agent
which migrates among the
nodes of a network to
perform a task based on the
environment conditions
autonomously and
intelligently.
Not discuss about the
mobile agents energy &
Buffer Status.
DiTang, Tongtong
Li, Jian Ren,
SeniorMember,
IEEE, and Jie Wu,
Fellow, IEEE
“Cost-Aware SEcure
Routing(CASER) Protocol
Design for Wireless Sensor
Networks”
IEEE Transactions On Parallel
And Distributed Systems, Vol.
26, No. 4, April 2015 1045-
9219.
Presented a secure and efficient Cost-Aware
SEcure Routing (CASER) protocol for WSNs.
It balance the energy consumption and
increase network lifetime.
Have to investigate the
impact of node buffer.
11/28/2020
11. Literature Review
Energy & Buffer Residual Status
Authors Title Work Applications/Limitations
Jian Shen,
Member, IEEE,
Anxi Wang,
Chen Wang,
Patrick C. K.
Hung, Member,
IEEE, and Chin-
Feng Lai, Senior
Member, IEEE
“An Efficient Centroid-based
Routing Protocol for Energy
Management in WSN-
Assisted IoT”
IEEE Access 2017
It gives the cluster formation technique that
enables the self-organization of local nodes.
A new series of algorithms for adapting clusters
and rotating the cluster head (CH) based on the
centroid position to evenly distribute the energy &
load among all sensor nodes
A new mechanism to reduce the energy
consumption for long-distance communications.
Residual energy of nodes is considered in EECRP
for calculating the centroids position.
Can be improve further by
finding the multi-hop path
from the CH nodes to BS.
We hope that our protocol
can perform well when the
BS is located outside of the
network.
Halil Yetgin,
Kent Tsz Kan
Cheung,
Mohammed El-
Hajjar, Senior
Member, IEEE,
and Lajos
Hanzo, Fellow,
IEEE
“A Survey of Network
Lifetime Maximization
Techniques in Wireless
Sensor Networks”.
IEEE Communications
Surveys & Tutorials, Vol. 19,
No. 2, Second Quarter 2017
It reviews the recent developments in WSNs,
including their applications, design constraints, and
lifetime estimation models.
Commencing with the portrayal of rich variety
definitions of NL design objective used for WSNs
The family of NL maximization techniques is
introduced and some design guidelines with
examples are provided to show the potential
improvements of the different design criteria.
Robust optimization can
be used for mitigating the
effects of unavoidable
errors imposed.
1111/28/2020
12. Literature Review
Energy & Buffer Residual Status
Authors Title Work Applications/Limitations
Gaukhar
Yestemirova, Sain
Saginbekov
“Efficient Data Aggregation
in Wireless Sensor Networks
with Multiple Sinks”
2018 IEEE 32nd
International Conference on
Advanced Information
Networking and Applications
It defines the data aggregation problem in
WSNs with multiple sinks.
It proposes two data aggregation algorithms
for a WSN with multiple sinks that minimize
the number of data packet transmissions
during data collection.
Not focusing on developing
node-failure tolerant
algorithms that solve the above
problem .
Have to conduct experiments
on real test beds.
Ahc`ene Bounceur,
Madani Bezoui,
Massinissa Lounis,
Reinhardt Euler,
Ciprian Teodorov
“A New Dominating Tree
Routing Algorithm for
Efficient Leader Election in
IoT Networks”
15th IEEE Annual Consumer
Communications &
Networking Conference
(CCNC) 2018
Presents a new algorithm, which is based
on a tree routing protocol.
This algorithm turns out to be low energy
consuming with reduction rates that can
exceed 85%.
It is efficient and fault-tolerant since it
works in the case where any node can fail
and in the case where the network is
disconnected.
It talks about the Leader
selection but bottleneck issues
were not dealt.
1211/28/2020
13. Literature Review
Energy & Buffer Residual Status
Authors Title Work Applications/Limitations
Salim EL KHEDIRI,
Adel THALJAOUI,
Adel Dallali, Souli
HARAKTI,
Abdennaceur
KACHOURI
“A novel connectivity
algorithm based on
shortest path for wireless
sensor networks”
IEEE 2018
A new centralized hierarchical cluster-
based routing algorithm is proposed.
It aims to mitigate energy consumption
and prolong the lifetime of WSN’s.
There remains a great need
for further research for buffer
for the nodes having high
energy capacity.
Niwat
Thepvilojanapong,
Yoshito Tobe, Kaoru
Sezaki
“On the Construction of
Efficient Data Gathering
Tree in Wireless Sensor
Networks”
2005 IEEE.
Proposed an Efficient Data GathEring
(EDGE) protocol which satisfies
requirement by avoiding both flooding and
periodic updation of the routing packets.
Tree created by EDGE will be
reconstructed upon node failures or adding
of new nodes.
It is more robust against high
offered loads than the existing
solutions.
Application in sensor
networks that incurs high traffic
load is structure health
monitoring (SHM).
1311/28/2020
14. Literature Review
Energy & Buffer Residual Status
Authors Title Work Applications/Limitations
Millad Ghane, Amir
Rajabzadeh
“Remaining Energy
Based Routing Protocol
for wireless sensor
networks” IEEE 2010
Presents an energy efficient routing
protocol called as Remaining Energy
Based Routing (REB-R).
The idea behind REB-R is to broadcast
the remaining energy of the node along
with the data in the data packet instead of
calculating a parameter related to
remaining energy.
Many protocols were offered
for minimizing the networks
total dissipation of energy.
This work will effect the
application of wireless sensor
networks.
1411/28/2020
15. Literature Review
Mobile Sink Node
Authors Title Work Applications/Limitations
Kyung Tae Kim,
Man Youn Kim, Ji
Hyeon Choi, Hee
Yong Youn
“An Energy Efficient
and Optimal
Randomized Clustering
for Wireless Sensor
Networks”
2015 IEEE
The proposed scheme decides optimal number of
clusters by employing a new approach for setting
threshold value, including the probability of optimum
number of cluster heads and residual energy of the
nodes.
It also introduce a new approach for maximize the
network lifetime by tree construction in each cluster.
Mobility in sensor
network is an ever-growing
requirement in recent
applications.
Extension of the proposed
scheme to cope with the
mobility and the related
challenges is yet another
important issue remaining as
future work.
Hiren Kumar
Deva Sarma,
Member, IEEE,
RajibMall, Senior
Member, IEEE,
and Avijit Kar
“E2R2: Energy-
Efficient and Reliable
Routing for Mobile
Wireless Sensor
Networks”
IEEE Systems Journal,
Vol. 10, No. 2, June
2016
Ensures a specified throughput level at the BS.
Depending on Considering the reliability aspect of the
protocol.
It puts best effort for the topology of the network.
The data transmission from the CH node to the BS is
carried out either directly or in multi-hop fashion.
Moreover, alternate paths are used for data
transmission between a CH node and the BS.
This work can be
extended to improve the
throughput even in the high-
data-rate situation.
The proposed protocol can
be also tested under the
influence of highly mobile
sensor nodes.
1511/28/2020
16. Literature Review
Mobile Sink Node
Authors Title Work Applications/Limitations
Z. Maria Wang,
Stefano Basagni,
Emanuel
Melachrinoudis
and Chiara
Petrioli
“Exploiting Sink
Mobility for
Maximizing Sensor
Networks Lfetime”
Proceedings of 38th
Hawaii International
Conference on System
Sciences-2005.
The objective is to maximize the overall lifetime of
the network rather than minimizing the energy
consumption at the nodes.
This model presents sink movement patterns and
simulation time leading to a network lifetime up to
almost five times that obtained with a static Sink.
Have to investigate the
impact of mobile sink on
network performance such
as network lifetime
enhancement.
1611/28/2020
17. Research gap identification
1. None of the existing protocols consider the Bottleneck issue.
What is Bottleneck ?
Case I: If nodes residual energy is less than threshold value, Then
i. Node will drop the packet and unable to process the packet
ii. Node becomes bottleneck node.
Case II: If a node is accepting heavy traffic due to its high current energy, it will drop
the packets because of its limited buffer and processing capacity and hence lose its
energy instantly and becomes bottleneck.
2. None of the existing protocol calculates the Packet processing capacity of the node
with respect to residual energy and the buffer.
3. None of the existing protocol discusses about the EBRS of the mobility sink and its
EBRS.
1711/28/2020
20. Problem Formulation
The Performance of the Existing work can be enhanced by following improvements.
1. Mitigating the Packet drop due to energy and buffer.
2. Detecting the Intermediate nodes becoming bottleneck node.
3. Exploiting sink mobility
The aim is to combine prevention of bottleneck and sink mobility in a single
process to design the proposed routing protocol “
Energy-Efficient Routing Protocol for enhancing network lifetime and
performance in Wireless Sensor Networks
” to enhance the Network Lifetime and improve the Performance in WSNs.
2011/28/2020
24. Proposed Algorithm-1(a) for Node Residual Energy
24
Parameters for computing Node Residual Energy for high
packet forwarding path are (E, )
Algorithm:
Packet must in process == true
If ( )
Compute ( )
If ( )
Include the Node in routing process
Else
Node can not participate in routing process
11/28/2020
25. Proposed Model-1(b)
This model is used to control the input traffic of an intermediate node
and to decide the node to become part of the route or not
It will also give,
i. The Average queue length at the input buffer
ii. The Average waiting time in the buffer
2511/28/2020
26. Proposed Algorithm1(b): Prevent Packet Drop Due to Buffer
The average packet waiting time at buffer can be computed as follows
Where,
1. Preventing Packet Drop due to buffer overflow ( Qavrg, Qthre, Tavrg )
2. If ( ))
3. Node is not allowed for communication
4. If ( )
5. Node is not allowed for communication
6. Else
7. Node is allowed for communication
2611/28/2020
27. Calculating Node Current Residual Status
By combining the Models 1 (a & b) we are calculating the EBRS value
of the node to meet our Objective1 that is avoid the packet loss.
“EBRS of the node” with respect to
Current Traffic at Node Buffer
Residual Energy of the Node
2711/28/2020
28. Proposed Algorithm 2 (1(a)+1(b)) for Node Selection
Based on Current Residual Status
2811/28/2020
Procedure for the Calculation of the Current Residual Condition of
the Node
( CR, CRmax, CRmin )
{
Compute the CR from the Previous Algorithm
If ( CR > CR max)
Node will participate in Routing
else if
( CRmax < CR < CRmin )
Node acts as a backup node
else
(CR < CRmin )
Node does not participate in routing
}
29. Simulator & Metrics Used
The Comparison is done for Performance Outcomes by considering the following
metrics
All these metrics are related to the performance and lifetime of the WSNs [Nikolaos
A. Pantazis, et. all.]
The Improvement in these metrics leads to Networks Lifetime Enhancement
[DiTang, Tongtong Li, et.all.]
1. Throughput:
2. Packet Delivery Fraction:
3. Remaining Energy:
4. Overhead:
5. Lifetime:
Implemented the Proposed Work on Network Simulator (Version NS-2.34 / 2.35).
2911/28/2020
30. Simulation Parameters
30
Simulation parameters are shown in table
Network Parameters Values
Simulation Duration 1000 s
Number of Nodes 10 to 90
Link Layer Logical Link
MAC 802.11
Mobility
Network layer
Communication
Random way point
SKA, ACK, Proposed
Two-Ray Ground
Queuing Drop-Tail priority
Battery 10j
Traffic Constant bit rate
Area of Network 1000m x1000m
11/28/2020
31. Performance Analysis
Packet Delivery Fraction: It is the percentage ratio of packets successfully received at
the destination to the total packets sent by the source.
Table 1: PDF analysis of existing & proposed methods
31
Number
of nodes
Existing-1
(Nikolaos et. all.)
Existing-2
(Di Tang et. all.)
Proposed-1
with Bottleneck
Proposed-2
without Bottleneck
10 14.1400 45.4950 90.0693 91.091
20 18.5024 50.4950 92.0396 93.042
30 25.8514 52.0752 93.9901 96.009
40 30.148 75.247 96.0604 99.640
11/28/2020
32. Performance Analysis
Throughput : It is the number of data packets processed within a specified amount of
time.
Table 2: Throughput analysis of existing & proposed methods
32
Number
of nodes
Existing-1
(Nikolaos et. all.)
Existing-2
(Di Tang et. all.)
Proposed-1
with Bottleneck
Proposed-2
without Bottleneck
10 0.1178 0.2311 0.3466 0.3910
20 0.1834 0.2923 0.3672 0.4351
30 0.2248 0.3154 0.4178 0.5311
40 0.3560 0.4865 0.5697 0.7910
11/28/2020
33. Performance Analysis
Overhead: It is the ratio of amount of the control packets transmitted for routing to the
actual data packets transmitted in the network.
33
Number of
nodes
Existing-1
(Nikolaos et. all.)
Existing-2
(Di Tang et. all.)
Proposed-1
with Bottleneck
Proposed-2
without Bottleneck
10 520 359 48 17
20 785 483 55 28
30 807 929 70 41
40 1075 1142 92 50
11/28/2020
Table 3: Overhead analysis of existing & proposed methods
34. Performance Analysis
Energy Efficiency: It is the ratio between total amount of data delivered and
total energy consumed.
34
Number of
nodes
Existing-1
(Nikolaos et. all.)
%
Existing-2
(Di Tang et. all.)
%
Proposed-1
with Bottleneck
%
Proposed-2
without Bottleneck
%
10 77.372 51.236 79.711 96.9583
20 51.6144 47.316 72.089 89.9108
30 34.8575 31.4207 68.124 82.4479
40 26.7283 20.6939 66.2662 78.6497
11/28/2020
Table 4: Overhead analysis of existing & proposed methods
35. Simulation Results
35
Packet Delivery Fraction: It is the percentage ratio of packets successfully
received at the destination to the total packets sent by the source.
11/28/2020
43. Performance Analysis
Packet Delivery Fraction: It is the percentage ratio of packets successfully received at
the destination to the total packets sent by the source.
Table 5: PDF analysis of existing & proposed methods
43
Number of
nodes
Existing
(Kyung et. all.)
Proposed-1
EBRS
Proposed-2
Mobile Sink
10 45.4950 91.091 93.01
20 50.4950 93.042 95.202
30 52.0752 96.009 98.23
40 75.247 99.640 99.863
11/28/2020
44. Performance Analysis
Throughput : It is the number of data packets processed within a specified amount of
time.
Table 6: Throughput analysis of existing & proposed methods
44
Number of
nodes
Existing
(Kyung et. all.)
Proposed-1
EBRS
Proposed-2
Mobile Sink
10 0.2311 0.3910 0.421
20 0.2923 0.4351 0.741
30 0.3154 0.5311 0.610
40 0.4865 0.7910 0.8134
11/28/2020
45. Performance Analysis
Overhead: It is the ratio of amount of the control packets transmitted for routing to the
actual data packets transmitted in the network.
Table 7: Overhead analysis of existing & proposed methods
45
Number of
nodes
Existing
(Kyung et. all.)
Proposed-1
EBRS
Proposed-2
Mobile Sink
10 159 17 13
20 283 28 21
30 329 41 37
40 442 50 42
11/28/2020
46. Performance Analysis
Energy Efficiency: It is the ratio between total amount of data delivered successfully
and total energy consumed.
Table 8: Energy Efficiency analysis of existing & proposed methods
46
Number of nodes Existing
(Kyung et. all.)
%
Proposed-1
EBRS
%
Proposed-2
Mobile Sink
%
10 79.711 96.9583 97.583
20 72.089 89.9108 90.9108
30 68.124 82.4479 84.4479
40 66.2662 78.6497 81.6497
11/28/2020
49. Simulation Results
49
Overhead: It is the ratio of amount of the control packets transmitted for
routing to the actual data packets transmitted in the network.
11/28/2020
53. Simulation Results
53
Over Head: It is the ratio of amount of the control packets transmitted for routing to
the actual data packets transmitted in the network.
11/28/2020
55. Conclusion I
Our proposed work improves the network performance and reduces the packet loss by
removing the congested and constrained nodes from the routing path.
It works on Energy as well as Buffer Residual status of the node.
5511/28/2020
56. Conclusion II
In this work, a routing protocol is designed for lifetime enhancement in WSN with
mobility consideration.
It improves the network performance and reduces the packet loss by removing the
congested and constrained nodes from the routing path.
Moreover, it elaborates network performance by making sink node mobile based on
the load status of its neighbor node.
5611/28/2020
57. FUTURE SCOPE Of The WORK
57
This work may be used in Intrusion Detection And Prevention Systems to
enhance the security in WSN.
In future by doing Battery-less Sensing this work can improve the performance of
WSN with Energy Harvesting Concept.
It can be implemented with Nano-scale Wireless Nodes in future due to which it
can Elaborate The Networks Lifetime and Minimize The Power Consumption
in broadways.
11/28/2020
58. Papers Published in International Journals
1. Amairullah Khan Lodhi, M. S. S. Rukmini, Syed Abdulsattar “Lifetime and
Performance Enhancement in WSN by Energy-Buffer Residual Status of Nodes and
The Multiple Mobile Sink” TEST Engineering and Management (Unpaid Scopus),
Vol.82, pp. 3835-3845 on 20th January2020.
2. Amairullah Khan Lodhi, M. S. S. Rukmini, Syed Abdulsattar “Energy efficient
Routing Protocol for Life Enhancement in Wireless Sensor Networks” Recent
Patents on Computer Science (Unpaid Scopus), Vol.12, no.1. pp. 01-10, 2019.
DOI : 10.2174/2213275912666190619115304.
3. Amairullah Khan Lodhi, M. S. S. Rukmini, Syed Abdulsattar “Energy-Efficient
Routing Protocol Based on Mobile Sink Node in Wireless Sensor Networks”
International Journal of Innovative Technology and Exploring Engineering
(Scopus), Vol.8, Issue-7, pp 1788-1792, 2019.
4. Amairullah Khan Lodhi, M. S. S. Rukmini “Energy-Efficient Routing Protocol for
Node Lifetime Enhancement in Wireless Sensor Networks” International Journal of
Advanced Trends in Computer Science and Engineering (Scopus), Vol. 8. no.1.3. pp.
24-28, 2019.
5811/28/2020
59. Papers Published in International Journals
5. Amairullah Khan Lodhi, M. S. S. Rukmini, Syed Abdulsattar “ Efficient Energy
Routing Protocol Based on Energy & Buffer Residual Status (EBRS) for Wireless
Sensor Networks” International Journal of Engineering and Advanced Technology
(Scopus), Vol. 9. Issue no. 1S5 pp. 33-37, in December 2019.
6. Amairullah Khan Lodhi, M. S. S. Rukmini, Syed Abdulsattar “Design technique for
head selection in WSNS to enhance the network performance based on nodes
residual status: An extension to EBRS method” International Journal of Advanced
Science and Technology (Unpaid Scopus), Vol. 9. Issue no. 1S5 pp. 33-37, in
December 2020.
7. Amairullah Khan Lodhi, M. S. S. Rukmini, Syed Abdulsattar “Performance
improvement in wireless sensor networks by removing the packet drop from the
node buffer ” Materials Today: Proceedings, 2019
5911/28/2020
60. Papers Published in International Conferences
1. Amairullah Khan Lodhi, M. S. S. Rukmini, Syed Abdulsattar “Energy Efficient
Wireless Sensor Networks: A Survey on Energy-Based Routing Techniques” IEEE
3rd International Conference on Electrical, Electronics, Communication,
Computation Technologies and Optimization Techniques (ICEECCOT), conducted
by GSSSIETW, Mysuru, on14th & 15th Dec 2018.
2. Amairullah Khan Lodhi, M. S. S. Rukmini “Energy-Efficient Routing Protocol for
Node Lifetime Enhancement in Wireless Sensor Networks” International
Conference on Modern Technology in Engineering Research & Management
(ICMTERM–2019), conducted by Siddhartha Institute of Engineering and
Technology, Hyderabad, on 1st & 2nd May’ 2019.
3. Amairullah Khan Lodhi, Syed Abdulsattar “Energy and Security Aware Reactive
Routing for Wireless Sensor” 73rd International Conference on Science,
Engineering & Technology (ICSET), Medina, Saudi Arabia, conducted by
Researchfora on 25th & 26th September 2017.
4. Amairullah Khan Lodhi, Syed Abdulsattar “Cluster Head Selection by optimized
ability to restrict packet drop in Wireless Sensor Networks” 1stInternational
Conference on Soft Computing in Data Analytics(SCDA 2018), conducted by
SSCE, Srikakulam.
6011/28/2020
61. Papers Published in National / International Conferences
5. Amairullah Khan Lodhi, Syed Abdulsattar “Energy Efficient and Secure Intrusion
Detection Algorithm for Maximum Coverage in WSN” in CAS Ph.D. forum,
Organized by CAS IEEE / EDS Societies, Hyderabad Section, on 16th July 2016.
6. Amairullah Khan Lodhi, Syed Abdulsattar “Performance Improvement In Wireless
Sensor Networks By Removing The Packet Drop From The Node Buffer” is
accepted in ICMPC-2020 (GLA University).
11/28/2020 61
62. Papers Published in National Conferences
1. Amairullah Khan Lodhi, M. S. S. Rukmini, Syed Abdulsattar “ Efficient Energy
Routing Protocol Based on Energy & Buffer Residual Status (EBRS) for Wireless
Sensor Networks” National Conference on Vlsi, Signal Processing &
Communications (NCVSCOMS-2019), conducted by ECE Dept, VFSTRU,
Vadlamudi, Guntur, on 6th & 7th Sept’ 2019.
11/28/2020 62
63. Papers Accepted/Communicated in International Journals
1. Amairullah Khan Lodhi, M. S. S. Rukmini, Syed Abdulsattar “Performance
Enhancement by Cluster Head Selection Based On Residual Status of Energy and
Buffer in WSNs” is accepted in INTERSCIENCIA (SCIE Journal) on 16th
December 2019.
2. Amairullah Khan Lodhi, M. S. S. Rukmini “Network Lifetime Enhancement in
WSN Using Energy and Buffer Residual Status with Efficient Mobile Sink
Location Placement” is accepted in Solid State Technology (Unpaid Scopus
Journal) on 2nd August 2020.
11/28/2020 63
64. Papers Accepted/Communicated in International Conferences
1. Amairullah Khan Lodhi, M.S.S. Rukmini, Syed Abdulsattar
“Lifetime Enhancement Based On Energy And Buffer Residual
Status Of Intermediate Node In Wireless Sensor Networks” is
accepted and presented in iCASIC-2020 (VIT, Vellore).
2. Amairullah Khan Lodhi, M.S.S. Rukmini “Lifetime Enhancement in
Bio-Sensor Networks with Efficient Placement of Mobile Sink Node
for Bio-medical Applications” is accepted in ACCES-2020 (GRIET,
Hyderabad).
11/28/2020 64
65. ENHANCEMENT OF THE WORK
1. Amairullah Khan Lodhi, M.S.S Rukmini, Syed Abdulsattar, Sayyad Ajij, Mazher Khan
“A Feasible Model for a Smart Transportation System using a
Vehicular Ad-Hoc Network” Published in TEST Engineering & Management
(Unpaid Scopus), Volume, 83, Issue, March-April 2020, Pages, 7341-7348,
Publication date, 7th April 2020.
LEAD GUEST EDITOR
1. Machine Learning, Artificial Intelligence and Data Sciences for
Securing Information System, Amairullah Khan Lodhi, Science PG Journal
Special Issue
11/28/2020 65
66. Courses Attended
1. National Level Workshop on “Simulation and Emulation of Self
Organized Networks (SEASON-2015)” conducted in association with
IIPC from 10th to 12th Sep., 2015 at Kongu Engineering College,
Perundurai, Erode.
2. Five Days Course on “Opportunities, Challenges and Research Trends
in Wireless Sensor Networks” Sponsored by MHRD, Govt. of India
under ‘GIAN’ from 11th to 15th Dec 2015 organized by Dept. of ECE,
University College of Engineering, O.U., Hyderabad.
3. Two Days State Level STTP on “WSN Fundamentals and Protocol
Design using NS-2 & 3 (WPN-16), hin 20eld at SIT, Lonavala, during
Jan 23rd & 24th 2016.
4. One Week National Level FDP on “Network Simulator (NS2 & NS3)”
conducted by SKSSITS, Lonavala, held on 7th to 11th October 2016.
6611/28/2020
67. Courses Attended
5. A Two Weeks Course on “Wireless Sensor Networks and Underlying
Characteristics” Conducted by GIAN, MHRD, at JNTU, Hyderabad,
during 14th to 23rd Dec, 2016.
6. Three days hands on workshop on “ Set up of Internet of Things (IoT)
Lab” conducted by ECE Dept., MJCET , Hyderabad from 25th to 27th
March 2019.
7. Two Days National Level FDP on Network Simulator (“NS2 &
NS3”), conducted Dept., of ECE, SCET, Hyderabad on 19th & 20th
July 2019.
8. DST Sponsored National Level Seminar on “ Sensor Networks,
Internet of Things (IoT) & Internet of Everything” Organized by dept.
of ECE, VJIT, from 8th to 10th Aug 2019.
11/28/2020 67
68. References
[1] Pantazis, Nikolaos A., Stefanos A. Nikolidakis, and Dimitrios D. Vergados.
"Energy-efficient routing protocols in wireless sensor networks: A survey." IEEE
Communications surveys & tutorials 15, no. 2 (2012): 551-591.
[2] Tang, Di, Tongtong Li, Jian Ren, and Jie Wu. "Cost-aware secure routing (CASER)
protocol design for wireless sensor networks." IEEE Transactions on Parallel and
Distributed Systems 26, no. 4 (2014): 960-973.
[3] Saranya, R., and R. Dhanalakshmi. "Balancing Energy Consumption to Maximize
Network Lifetime Using Particle Swarm Optimization in Wireless Sensor
Networks." Middle-East Journal of Scientific Research 23 (2015): 309-313.
[4] Zhou, Biyu, Fa Zhang, Lin Wang, Chenying Hou, Antonio Fernández Anta,
Athanasios V. Vasilakos, Youshi Wang, Jie Wu, and Zhiyong Liu. "HDEER: A
distributed routing scheme for energy-efficient networking." IEEE Journal on
Selected Areas in Communications 34, no. 5 (2016): 1713-1727.
[5] Shen, Jian, Anxi Wang, Chen Wang, Patrick CK Hung, and Chin-Feng Lai. "An
efficient centroid-based routing protocol for energy management in WSN-assisted
IoT." IEEE Access 5 (2017): 18469-18479.
11/28/2020 68
69. References
[6] Yetgin, Halil, Kent Tsz Kan Cheung, Mohammed El-Hajjar, and Lajos Hanzo
Hanzo. "A survey of network lifetime maximization techniques in wireless sensor
networks." IEEE Communications Surveys & Tutorials 19, no. 2 (2017): 828-854.
[7] Yestemirova, Gaukhar, and Sain Saginbekov. "Efficient data aggregation in wireless
sensor networks with multiple sinks." In 2018 IEEE 32nd International Conference
on Advanced Information Networking and Applications (AINA), pp. 115-119. IEEE,
2018.
[8] Bounceur, Ahcene, Madani Bezoui, Massinissa Lounis, Reinhardt Euler, and
Ciprian Teodorov. "A new dominating tree routing algorithm for efficient leader
election in IoT networks." In 2018 15th IEEE Annual Consumer Communications &
Networking Conference (CCNC), pp. 1-2. IEEE, 2018.
[9] El Khediri, Salim, Adel Thaljaoui, Adel Dallali, Souli Harakti, and Abdennaceur
Kachouri. "A Novel Connectivity Algorithm Based on Shortest Path for Wireless
Sensor Networks." In 2018 1st International Conference on Computer Applications
& Information Security (ICCAIS), pp. 1-6. IEEE, 2018.
[10] Thepvilojanapong, Niwat, Yoshito Tobe, and Kaoru Sezaki. "On the construction
of efficient data gathering tree in wireless sensor networks." In 2005 IEEE
International Symposium on Circuits and Systems, pp. 648-651. IEEE, 2005.
11/28/2020 69
70. References
[11] Ghane, Millad, and Amir Rajabzadeh. "Remaining-energy based routing protocol
for wireless sensor network." In 2010 15th CSI International Symposium on
Computer Architecture and Digital Systems, pp. 67-73. IEEE, 2010.
[12] Kim, Kyung Tae, Man Youn Kim, Ji Hyeon Choi, and Hee Yong Youn. "An energy
efficient and optimal randomized clustering for wireless sensor networks." In 2015
IEEE/ACIS 16th International Conference on Software Engineering, Artificial
Intelligence, Networking and Parallel/Distributed Computing (SNPD), pp. 1-6.
IEEE, 2015.
[13] Sarma, Hiren Kumar Deva, Rajib Mall, and Avijit Kar. "E 2 R 2: Energy-efficient
and reliable routing for mobile wireless sensor networks." IEEE Systems Journal 10,
no. 2 (2015): 604-616.
[14] Wang, Z. Maria, Stefano Basagni, Emanuel Melachrinoudis, and Chiara Petrioli.
"Exploiting sink mobility for maximizing sensor networks lifetime." In Proceedings
of the 38th annual Hawaii international conference on system sciences, pp. 287a-
287a. IEEE, 2005.
11/28/2020 70
71. References
71
[15] Bhargava, Peyakunta, and Singaraju Jyothi. "Big Data and Internet of Things for
Analysing and Designing Systems Based on Hyperspectral Images." In Environmental
Information Systems: Concepts, Methodologies, Tools, and Applications, pp. 621-641.
IGI Global, 2019.
[16] Cacciagrano, Diletta, Rosario Culmone, Matteo Micheletti, and Leonardo
Mostarda. "Energy-Efficient Clustering for Wireless Sensor Devices in the Internet of
Things." In Performability in the Internet of Things, pp. 59-80. Springer, Cham, 2019.
[17] Kharat, Prashant, and Muralidhar Kulkarni. "Congestion controlling schemes for
high-speed data networks: A survey." Journal of High-Speed Networks 25, no. 1 (2019):
41-60.
[18] Bhushan, Bharat, and G. Sahoo. "Routing Protocols in Wireless Sensor Networks."
In Computational Intelligence in Sensor Networks, pp. 215-248. Springer, Berlin,
Heidelberg, 2019.
[19] Begum, Shaik Rehana, G. Jaisankar, Suribabu Boyidi, B. Ravi Kumar, K. M.
Ganesh, T. Sridevi, N. C. Anil, U. Sailaja, and K. Dileep. "Road Network for Disaster
Guide in Rural Area, East Godavari District, AP, India—A Case Study of Spatial
Approach." In Proceedings of International Conference on Remote Sensing for Disaster
Management, pp. 683-691. Springer, Cham, 2019.
11/28/2020
72. References
[20] Linguaglossa, Leonardo, Dario Rossi, Salvatore Pontarelli, Dave Barach, Damjan
Marjon, and Pierre Pfister. "High-speed data plane and network function virtualization
by vectorizing packet processing." Computer Networks 149 (2019): 187-199.
[21] Al-Turjman, Fadi. "Cognitive routing protocol for disaster-inspired internet of
things." Future Generation Computer Systems 92 (2019): 1103-1115.
[22] Mehmood, Amjad, Nabil Alrajeh, Mithun Mukherjee, Salwani Abdullah, and
Housing Song. "A survey on proactive, active and passive fault diagnosis protocols for
wasns: network operation perspective." Sensors 18, no. 6 (2018): 1787.
[23] Salehi_Panahi, Morteza, and Mortaza Abbaszadeh. "Proposing a method to solve
energy hole problem in wireless sensor networks." Alexandria engineering journal 57,
no. 3 (2018): 1585-1590.
[24] Gomathi, R. M., and J. Martin Leo Manickam. "Energy efficient shortest path
routing protocol for underwater acoustic wireless sensor network." Wireless Personal
Communications 98, no. 1 (2018): 843-856.
[25] Rahim, Saqib Shahid, Sheeraz Ahmed, Nadeem Javaid, Adil Khan, Nouman
Siddiqui, Fazle Hadi, and M. Ayub Khan. "Scalability Analysis of Depth-Based Routing
and Energy-Efficient Depth-Based Routing Protocols in Terms of Delay, Throughput,
and Path Loss in Underwater Acoustic Sensor Networks." In Recent Trends and
Advances in Wireless and IoT-enabled Networks, pp. 171-185. Springer, Cham, 2019.
7211/28/2020
73. References
[26] Bhushan, Bharat, and G. Sahoo. "Routing Protocols in Wireless Sensor Networks."
In Computational Intelligence in Sensor Networks, pp. 215-248. Springer, Berlin,
Heidelberg, 2019.
[27] Arini, Arini. "EVALUASI KINERJA JARINGAN DMVPN MENGGUNAKAN
ROUTING PROTOCOL Ripv2, OSPF, EIGRP DENGAN BGP." JISKA (Jurnal
Informatika Sunan Kalijaga) 2, no. 3 (2018): 143-150.
[28] Ramezan, Gholamreza, Cyril Leung, and Zhen Jane Wang. "A Survey of Secure
Routing Protocols in Multi-Hop Cellular Networks." IEEE Communications Surveys &
Tutorials 20, no. 4 (2018): 3510-3541.
[29] Jan, Mian Ahmad, Syed Rooh Ullah Jan, Muhammad Alam, Adnan Akhunzada,
and Izaz Ur Rahman. "A comprehensive analysis of congestion control protocols in
wireless sensor networks." Mobile networks and applications 23, no. 3 (2018): 456-468.
[30] Yu, Wei, Fan Liang, Xiaofei He, William Grant Hatcher, Chao Lu, Jie Lin, and
Xinyu Yang. "A survey on the edge computing for the Internet of Things." IEEE
access 6 (2018): 6900-6919.
[31] Ilyas, Mohammad, and Imad Mahgoub. Smart Dust: Sensor network applications,
architecture, and design. CRC Press, 2018.
7311/28/2020
74. References
[32] Zafer, Murtaza, Anand Srinivas, S. M. S. Hossain, and Balachander
Chandrasekaran. "System and method for client network congestion detection, analysis,
and management." U.S. Patent Application 10/200,267, filed February 5, 2019.
[33] Menon, Abilash, Robert Penfield, Hadriel S. Kaplan, and Patrick Timmons. "Link
status monitoring based on packet loss detection." U.S. Patent Application 10/200,264,
filed February 5, 2019.
[34] Wong, David, Qian Chen, and Francois Chin. "Directional medium access control
(MAC) protocols in wireless ad hoc and sensor networks: a survey." Journal of Sensor
and Actuator Networks 4, no. 2 (2015): 67-153.
[35] Kim, Hyung-Sin, Hongchan Kim, Jeongyeup Paek, and Saewoong Bahk. "Load
balancing under heavy traffic in RPL routing protocol for low power and lossy
networks." IEEE Transactions on Mobile Computing 16, no. 4 (2017): 964-979.
[36] Ahc`ene Bounceur, Madani Bezoui, Massinissa Lounis, Reinhardt Euler, Ciprian
Teodorov "A New Dominating Tree Routing Algorithm for Efficient Leader Election in
IoT Networks". 15th IEEE Annual Consumer Communications & Networking
Conference (CCNC) 2018.
7411/28/2020
75. References
11/28/2020 75
[37] Darji, Harsh, and Hitesh B. Shah. "Genetic algorithm for energy harvesting
wireless sensor networks." In 2016 IEEE International Conference on Recent Trends
in Electronics, Information & Communication Technology (RTEICT), pp. 1398-
1402. IEEE, 2016.
[38] Hasan, Mohammed Zaki, Hussain Al-Rizzo, and Fadi Al-Turjman. "A survey on
multipath routing protocols for QoS assurances in real-time wireless multimedia
sensor networks." IEEE Communications Surveys & Tutorials 19, no. 3 (2017):
1424-1456.
[39] Wang, Jin, Yiquan Cao, Bin Li, Hye-jin Kim, and Sungyoung Lee. "Particle swarm
optimization based clustering algorithm with mobile sink for WSNs." Future
Generation Computer Systems 76 (2017): 452-457.
[40] Yetgin, Halil, Kent Tsz Kan Cheung, Mohammed El-Hajjar, and Lajos Hanzo
Hanzo. "A survey of network lifetime maximization techniques in wireless sensor
networks." IEEE Communications Surveys & Tutorials 19, no. 2 (2017): 828-854.
[41] Wang, Jin, Jiayi Cao, Sai Ji, and Jong Hyuk Park. "Energy-efficient cluster-based
dynamic routes adjustment approach for wireless sensor networks with mobile
sinks." The Journal of Supercomputing 73, no. 7 (2017): 3277-3290.
76. References
[42] Bhushan, Bharat, and G. Sahoo. "Routing Protocols in Wireless Sensor Networks."
In Computational Intelligence in Sensor Networks, pp. 215-248. Springer, Berlin,
Heidelberg, 2019.
[43] Pantazis, Nikolaos A., Stefanos A. Nikolidakis, and Dimitrios D. Vergados.
"Energy-efficient routing protocols in wireless sensor networks: A survey." IEEE
Communications surveys & tutorials 15, no. 2 (2012): 551-591.
[44] Yetgin, Halil, Kent Tsz Kan Cheung, Mohammed El-Hajjar, and Lajos Hanzo
Hanzo. "A survey of network lifetime maximization techniques in wireless sensor
networks." IEEE Communications Surveys & Tutorials 19, no. 2 (2017): 828-854.
11/28/2020 76
77. Action Taken Report On
Energy-Efficient Routing Protocol for enhancing network lifetime and
performance in Wireless Sensor Networks
Summary of the modifications:
There are no specific comments given by the Indian
examiner (Expert) to be incorporated in the thesis
report as well as at the time of defendant.
11/28/2020 77
78. Action Taken Report On
Energy-Efficient Routing Protocol for enhancing network lifetime and
performance in Wireless Sensor Networks
Specific comments given by the Foreign examiner (Expert) to be
incorporated in the thesis report and to be addressed at the time of
Defendant.
Summary of the modifications:
The dissertation has been substantially revised, taking adjudicator's
(Foreign examiner) comments into account. As suggested, we revised
the chapters to fulfil the dissertation's motivation. Care has been
taken to avoid typos in the entire dissertation. The page numbers and
section numbers are quite different from the previous submission. As
suggested, all the said chapters have been completely revised. We
think that the current dissertation report is very easy to understand
with the inclusion of the methodology flow chart about the proposed
work.
11/28/2020 78
79. Action Taken Report On
Energy-Efficient Routing Protocol for enhancing network lifetime and
performance in Wireless Sensor Networks
[A] Necessary recommendations need to be incorporated in the Thesis:
Chapter-1
1) There is a typographical mistake in pages 4 and 7 at the fig
numbers, modify them as fig1.1 and fig 1.2?
• Answer to the comment: The chapter-1 of the dissertation
has been substantially revised, taking adjudicator's
comments into account. As suggested, the figure numbers
are revised as figure 1.1 and figure 1.2. We put the revised
content in red colour for ease of finding (please refer to
page numbers 5 and 8).
11/28/2020 79
80. Action Taken Report On
Energy-Efficient Routing Protocol for enhancing network lifetime and
performance in Wireless Sensor Networks
Chapter-3
1) The repetition rate is high in the thesis, try to avoid the majority. On
page 56 references [71] repeated in the first paragraph as well as in
second. Remove either one?
Answer to the comment: The chapter-3 of the dissertation has been
substantially revised, taking adjudicator's comments into account. As
suggested, the repetition rate is reduced in the thesis to avoid the
majority. The references [71] on page 56 are removed in the second
paragraph. We put the revised content in red colour for ease of
finding.
11/28/2020 80
81. Action Taken Report On
Energy-Efficient Routing Protocol for enhancing network lifetime and
performance in Wireless Sensor Networks
2) On page 61, fig 3.5 is similar to fig 1.4 of page 15; hence the author
can quote the same fig1.4 in this chapter also instead of repeating.
Similarly on page 66, fig3.6 & fig3.7 both are similar, if there is any
reason give the justification if not remove anyone?
Answer to the comment: The chapter-3 of the dissertation has been
substantially revised, taking adjudicator's comments into account.
The figures presented at page numbers 61 & 15 explains about the
node’s buffer internal mechanism about packet operation. The figure
presented gives the idea about Packet loss due to Buffer overflow on
both pages (61 & 15), that’s why we presented the figure in both
sections. So as suggested, we quoted the same as figure 1.4 from
page 15 (Chapter-1) in this chapter also instead of repeating.
Similarly, on page 66, out of the figures 3.6 and 3.7, one figure is
removed (please refer page 61).
11/28/2020 81
82. Action Taken Report On
Energy-Efficient Routing Protocol for enhancing network lifetime and
performance in Wireless Sensor Networks
3) On page 67, the explanation is according to fig 3.8, need to correct
this instead of fig 3.7?
Answer to the comment: The chapter-3 of the dissertation has been
substantially revised, taking adjudicator's comments into account.
The explanation on page 67 is according to figure 3.8 (Now figure
3.6), it is corrected as recommended.
11/28/2020 82
83. Action Taken Report On
Energy-Efficient Routing Protocol for enhancing network lifetime and
performance in Wireless Sensor Networks
Chapter-4
1) The description of 4.2.2 on page 75 & 76 is the same as the description of 3.2.2
from page 63 & 64. Similarly equations 4.5, 4.7 are similar to equation 3.6 of page
65 also table 4.3 on page 80 is the same as table 3.1 from page 68, if there is any
justification author needs to incorporate or else repeated matter should be
removed?
Answer to the comment: The chapter-4 of the dissertation has been substantially
revised, taking adjudicator's comments into account. The description presented at
page numbers 75 and 76 explains the multi-objective mechanism about packet
operation which is removed. Similarly equations 4.5, 4.7 are similar to equation 3.6
which is also removed. The table presented at 4.3 also removed, because it seems
that the information given in that table is previously there in table 3.1 (from
Chapter-3). So as suggested, we quoted the same instead of repeating the content.
11/28/2020 83
84. Action Taken Report On
Energy-Efficient Routing Protocol for enhancing network lifetime and
performance in Wireless Sensor Networks
• Chapter-5
1) The description quoted from ref. [94] on page 91 is similar to ref. [82]
from page 74. Is both the references are the same or different?
Answer to the comment: The chapter-5 of the dissertation has been
substantially revised, taking adjudicator's comments into account.
The description presented at page numbers 91 and 74 explains about
the LEACH Protocol is the same. As suggested, the reference section
has been completely revised and arranged as per the comment given.
11/28/2020 84
85. Action Taken Report On
Energy-Efficient Routing Protocol for enhancing network lifetime and
performance in Wireless Sensor Networks
2) In equation 5.1 from page 91 the P = required percentage of for
becoming cluster head?
Answer to the comment: The chapter-5 of the dissertation has been
substantially revised, taking adjudicator's comments into account.
The description presented in equation 5.1 is mistakenly written as
“required percentage of for becoming cluster head” on page number
91. As suggested, it is corrected and written in the report as “ P =
required percentage of power for becoming cluster head” on page
number 91.
11/28/2020 85
86. Action Taken Report On
Energy-Efficient Routing Protocol for enhancing network lifetime and
performance in Wireless Sensor Networks
3) Need to correct the typographical mistake of fig 5.7 as fig 5.2, fig 5.8
as fig.5.3, and fig 5.9 as fig 5.4 on pages 99, 100, and 101
respectively?
Answer to the comment: The chapter-5 of the dissertation has been
substantially revised, taking adjudicator's comments into account. As
suggested, the figure numbers are revised as figure 5.2, figure 5.3,
and figure 5.4. We put the revised content on pages 100, and 101
respectively.
11/28/2020 86
87. Action Taken Report On
Energy-Efficient Routing Protocol for enhancing network lifetime and
performance in Wireless Sensor Networks
4) From fig 5.15 to 5.23 it is compulsory to indicate the y-axis (ordinate)
scale unit whether it is in sec or min or hrs or years so that it could
help the reader to understand the comparisons clearly?
Answer to the comment: The chapter-5 of the dissertation has been
substantially revised, taking adjudicator's comments into account. As
suggested, from fig 5.15 to 5.23 the y-axis (ordinate) scale units are
indicated as Seconds(S) and Joules(J), so that it could help the reader
to understand the comparisons clearly.
11/28/2020 87
88. Action Taken Report On
Energy-Efficient Routing Protocol for enhancing network lifetime and
performance in Wireless Sensor Networks
5) The methodology flow chart about the proposed work should be
included. So that the reader may go through the steps and analyzed
the work easily?
Answer to the comment: The chapter-5 of the dissertation has been
substantially revised, taking adjudicator's comments into account. As
suggested, the methodology flow chart about the proposed work is
included on page number 63 in chapter-3, so that the reader may go
through the steps and analyzed the work easily.
11/28/2020 88
89. Action Taken Report On
Energy-Efficient Routing Protocol for enhancing network lifetime and
performance in Wireless Sensor Networks
[B] Necessary recommendations need to be addressed at the time of
Defendant:
Chapter-3
1) According to which standardization, selection of various parameters
like a Packet lifetime as 200ms, departure & arrival rate as 0.02 and
0.0166, and average packet number arrived as 25-50 has made?
Answer to the comment: According to ITU G.114, acceptable real-time
traffic end to end delay is about 150ms and practically 200ms.To get a
better understanding of the proposed algorithm, we consider the
different attributes to each intermediate node such as battery power
and buffer capacity, input packet arrival rate, and output departure
rate. Other attributes such as receiving power and transmission
power kept as constant.
11/28/2020 89
90. Action Taken Report On
Energy-Efficient Routing Protocol for enhancing network lifetime and
performance in Wireless Sensor Networks
2) How can the power or energy of a proper intermediate node be computed or
determine, which is capable of handling the traffic without loss of data packet or
mitigation of packet loss throughout the transmission process?
Answer to the comment: A designed routing protocol, i.e., "Energy- Efficient Routing
Protocol for enhancing network lifetime and performance in Wireless Sensor
Networks.," is developed by considering some assumption and network model.
One of the assumptions that made are, the nodes in a network consisting of
hardware to provide its residual energy information at any given time. The working
process of the hardware is out of the scope of our work. Further, the hardware of
the node needs to support the information as follows:
– Provide remaining energy information
– Suitable low pass filter to compute the weighted moving average
– RED gateway provides queue information.
11/28/2020 90
91. Action Taken Report On
Energy-Efficient Routing Protocol for enhancing network lifetime and
performance in Wireless Sensor Networks
3) What is the reason behind, to compute the average queue size and
average waiting time to design a model for detecting the status of the
node regarding packet loss? Why not the maximum values?
Answer to the comment: Every node contains the RED gateway to
compute the average queue length of its buffer. It is a low pass filter
work on the principle of the exponential weighted moving average.
The algorithm for computing the average queue size determines the
degree of robustness that will be allowed in the gateway queue.
Instead of taking maximum values, we consider the average to
prevent the packet drop in advance by setting threshold value, as the
average queue size exceeds a preset threshold, the gateway drops
the packet.
11/28/2020 91
92. Action Taken Report On
Energy-Efficient Routing Protocol for enhancing network lifetime and
performance in Wireless Sensor Networks
Chapter-5
1) How can threshold value be provided or chosen, decide the node
priority while running the algorithm during the routing process?
Answer to the comment: Threshold values of the nodes are computed
based on the sensitivity of network and initial network distribution
condition. We computed this value under energy with less traffic and
under energy with fewer traffic conditions. The TTL value is decided
by the type of communication traffic, and we are considering the TTL
value as 200ms since we use CBR (constant bit rate) traffic in our
proposed network.
11/28/2020 92