SlideShare a Scribd company logo
1 of 6
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 485
ENHANCEMENT OF ENERGY EFFICIENCY AND THROUGHPUT
USING CSMA/CA DCF OPERATION FOR CIM
Puneeth Naik. S1
, JayanthiK.Murthy2
1
MTech-Student (Digital communications), Dept. of Electronics and communication, BMSCE, Bangalore Karnataka-
2013, India
2
Associate professor (PG Studies), Dept. of Electronics and communication, BMSCE, Bangalore Karnataka-2013, India
Abstract
Advancements in wireless sensor network technology (WSN) have lead researchers to work on wide variety of distributed sensing
applications. They have better potential to work without human attention after deployment in large physical environments. Out of all
large physical environments that sensing is dealt with, Critical infrastructure monitoring (CIM) emerges as a prominent application.
The Major requirements of CIM are reliable data transfer and long deployment life time. These networks are also expected to operate
in extremely low-cost communication environment. In this paper we propose a DCF integrated MAC (Medium access control)
protocol to cater CIM with better throughput. We have used an infrastructure based wireless sensor network in association with back
off algorithm. The simulation shows that DCF integrated channel access method would offer better throughput for CIM which
happens to be one of the major requirement.
Keywords: CIM (Critical infrastructure monitoring), WSN (Wireless sensor networks), MAC (Medium Access control),
DCF (Distributed Coordination function).CS (Carrier sensing).
-----------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
The Advantages and advancements of wireless
communication, networking and data processing techniques
have increased the potential of wireless sensor networks.
These sensor networks are robust enough to sense large
physical environments, process the data and route the same to
the desired destination. The applications of these sensor
networks have been consistently increasing and major one’s to
name are i) Disaster monitoring, ii)Surveillance, iii) Target
tracing and iv) Health monitoring [1].
When we review the large physical environments closely, we
see that critical infrastructure (CI) have received less attention
in terms of monitoring prospective.
Critical Infrastructures: Critical infrastructures are defines as
large physical environments which can run up to kilometers.
They are very much essential for better functioning of society
and economy. Just to list a few, i) Oil and Gas pipeline
monitoring, ii) Gas material detection, iii) Water leakage
detection. Predominantly CI’s are monitored using the
traditional techniques. Traditional techniques demands high
human attention more frequently and are not much
reliable.Monitoring CI’s would help in ensuring prevention,
maintenance, safety and reliability. It also helps in prevention
of catastrophic failures, damages due to leakages (Oil,
Gas)[2]. The same has been shown in the figure 1
Fig 1: Water leakage Monitoring, Power Monitoring
While Monitoring CI’s sensors would produce large amount
of data which can be basically categorized into 1) Normal
Data 2) Emergency data. These sensed data needs to be
transmitted reliably. In wireless sensor networks channel
access and energy of the nodes playa important role as all the
sensor nodes in the network needs to be treated in fair manner.
Improper assignment of channels would affect the throughput,
and leads to inefficient utilization of energy [3].
The most suitable and challenging area in networking to work
with is MAC Protocols. MAC basically works with channels
and helps in achieving the desired throughput and manages the
delay. In this article we first describe Distributed coordination
function (DCF) concept and its operation. We integrate this
concept with MAC protocol in order to enhance the
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 486
throughput for CI’s using proper channel management, after
which we simulate the same and analyze the results.
2. RELATED WORK
The handsome amount of research has been done by authors in
[4] on resources management in wireless sensor networks. The
IEEE 802.15.4e based CIM MAC which utilizes the time
slotted channel hopping concept. The authors in [5] have
investigated on the power consumption at end points. They
have proposed a low-energy link access for CIM by
distributing the access load on the slotted link. The author in
[6] has proposed “Low Energy MAC Proposal for
TG4kWSNIRI” based on Non Beacon mode, CSMA/CA and
ACK. Here the coordinator keeps listening to the channel and
the endpoints keep sleeping. If endpoint has data to transmit,
sends Data Request frame by using CSMA/CA, and waits for
payload frame from Coordinator, failing which the
retransmission of data request frame takes place. If the
coordinator wants to send a Multicast or broadcast frame then
sends a sequence of wakeup calls to make an appointment
about the desired frame transmission time. If it has a unicast
frame to a particular end point, theit broadcasts the wakeup
call and waits for the ACK from the intended receiver failing
which resends the wakeup frame. The authors [7] have
proposed an IEEE 802.15.4e based CIM MAC protocol which
consumes less energy and they do not consider the concept of
Coordinator. It uses the idea of batch transmission and
coordinated sleeping. In this concept the technique of buffer
management at the receiver plays a important role and also
uses the ACK concept. This concept y helps in conserving the
energy, However it difficult to implement the concept of
buffer in all the nodes. In this paper we have considered few
inputs from the literature referred above and have worked on
throughput and energy aspects of CIM
3. THROUGHPUT AND ENERGY ATTRIBUTES
OF WSN
Major sources of energy waste in wireless sensor network are
basically of four types [8] [9].
(i) Collision: The first one is the collision. When a transmitted
packet is corrupted due to interference, it has to be discarded
and the follow on Retransmissions increase energy
consumption. Collision increases latency also.
(ii) Overhearing: The second is overhearing, meaning that a
node picks up packets that are destined to other nodes.
(iii) Packet Overhead: The third source is control packet
overhead. Sending and receiving control packets consumes
energy too and less useful data packets can be transmitted.
(iv) Idle listening: The last major source of inefficiency is idle
listening i.e., listening to receive possible traffic that is not
sent. This is especially true in many sensor network
applications. If nothing is sensed, the sensor node will be in
idle state for most of the time.
The main goal of any MAC protocol for sensor network is to
minimize the energy waste due to idle listening, overhearing
and collision.
4. MEDIUM ACCESS CONTROL (MAC)
MAC protocol is responsible for reliable, error free data
transfer with minimum retransmissions. The MAC also caters
to meet performance requirements such as controlling
bandwidth, power awareness, contention resolution, minimize
interference and collision avoidance. Data collection in WSN
tends to suffer from heavy congestion which basically affects
the throughput and the energy consumption in the
network.[10] MAC protocols can be categorized as
Contention-free and Contention-based, as shown in figure 2.
Fig 2: Classification of MAC protocols.
Contention free Protocols: The contention free protocols do
not make the assumption that network traffic is intrinsically
random, instead traffic is ordered in a bounded channel
assignment. These schemes are generally based on TDMA,
FDMA or CDMA that utilizes the synchronization technique
and the channel access mechanism of the physical layer.
However, these schemes are more complex, specialized sensor
hardware and there is a dependency on the physical layer [11].
Contention Based Protocols: The contention based protocols
use Carrier Sense Multiple Access (CSMA) scheme, where for
a node to transmit, it must sense the medium to determine if
another node is transmitting. If the medium is busy, the node
will defer until the end of the current transmission. After
deferral or just before attempting to transmit again, the node
shall select a random back-off interval and shall decrement the
back-off interval counter while the medium is idle [11].
The MAC sub layer of the IEEE 802.11 defines the
Distributed Coordination Function (DCF), the Point
Coordination Function (PCF), and the Hybrid Coordination
Function (HCF). The focus will be on the DCF that allows
automatic medium sharing [12].
5. DISTRIBUTED COORDINATION FUNCTION
(DCF)
The basic access mechanism called DCF is a carrier senses
multiple access collision avoidance (CSMA/CA) mechanism.
The CSMA protocol allows a station wishing to transmit to
sense the medium, if the medium is busy it defer its
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 487
transmission but if the medium is free then the station is
allowed to transmit. CSMA is very effective when the medium
does not have high traffic, since all medium transmit with
minimum delay. Stations transmitting at the same time result
in collision as the protocol initially are designed for single
channel transmission. CA allows the medium that is busy and
defers to wait and allow the medium to be free for a specific
time called distributed inter frame space (DIFS) then the
station is allowed to transmit.[13]
Fig 3: DCF Operation.
Multiple collision occur more frequently after a busy period
when there are multiple stations waiting on the medium to
transmit their data. This situation necessitates a random
backoff procedure to resolve medium contention conflicts
through carrier sense (CS) functions [13, 14].
The IEEE 802.11 DCF protocol works in two different modes
1) infrastructure mode and 2)Ad hoc mode. In infrastructure
mode communication between modes must go through a
central node called coordinator node, while in Ad hoc mode
nodes communicate directly with each other. Infrastructure
mode fits for static large infrastructure applications [15, 16].
In this paper we focus on communication which is based on
infrastructure mode and we utilize IEEE 802.11 DCF
infrastructure mode along with MAC protocol for the CIM. By
enhancing throughput and maintaining channel access fairness
within the network, the quality of service is enhanced and
consequently the WSN information assurance is supported for
CIM.
6. COMMUNICATION PROCESS
The main motto of the CIM is to facilitate single point to
multi-thousands of point’s Communication for critical
infrastructure monitoring with low energy. The main
components of CIM network are coordinator or collector,
devices or end points, and repeater. Coordinator is generally
main powered, and endpoints are battery powered. Topology
used in CIM is star topology that supports one to multipoint
communication. CIM network consists of only one
coordinator that supports many devices. The present 802.15.1,
Bluetooth has a short range and cannot support thousands of
endpoints due to low capacity. The IEEE 802.15.3 also has a
short range and aimed high data rate applications. IEEE
802.15.4/4e MACs supports low data rate applications.
However, they need modifications to support such a large
network with very lossy channel. IEEE 802.15.4e supports
mainly TDMA approach which cannot work well for CIM
networks due to large number of endpoints as it leads to lot of
delay.
Flow Chart 1: Communication Process
Unlike traditional MAC protocols in this project we consider a
unique approach to satisfy the CIM demands. A IEEE 802.11
based MAC protocol and the concept of DCF are used. The
performance analysis is done based on the analysis of the
channel assignment to the endpoints and the throughput.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 488
Fig 4: Star topology
7. PERFORMANCE ANALYSIS
As we are dealing with infrastructure based wireless sensor
network, the coordinator dominates all the end points and
manages radio resources and power. When we consider uplink
communication i.e. from end pints to the coordinator, channel
access management needs to be handled by MAC protocol. In
this implementation we have considered the DCF operation
with standard IEEE 802.11 MAC protocol. Initially when we
deploy the nodes and initialize the network, we assume that all
these nodes have the monitored data with them and they are
ready to contend for the channel. The implementation of the
same has been shown in the figure
Now the MAC protocol with DCF operation would allocate
the backoff values to all the nodes which are deployed. Once
the nodes have the backoff value assigned , they start listening
to the channel and executes the CSMA/CA technique. If the
channel is busy it waits for a time called DIFS and still if it
hears the channel to be busy then it will backoff again. The
value of the back off counter would be reduced by 1 on every
successful transmission on the channel. Likewise all the
deployed nodes would be given with a particular frame for
transmission of its sensed data in a fair manner.
Special Case: If the back off values of two or more nodes n
the network becomes zero at the same time, then all the nodes
with same back off value would start there transmissions. This
situation would lead to losing a complete frame length
allocated to these nodes. To avoid this scenario, we have
included an additional algorithm in this implementation to
handle the case efficiently.
Fig 5: Network Deployment of CIM
When two nodes are assigned with the same back off values
and becomes zero (Upon CSMA), MAC protocol assigns
another pair of random values to them. They nodes would be
sorted in ascending order and the one with the least random
value will be given with a chance to transmit the information
over the channel.
Fig 6: successful assignment of channels.
The process will be repeated until all the nodes which had the
same back off value are given with an opportunity to transmit
the information. With this technique we were able to avoid
collisions and enhance the throughput, avoid energy
consumption and reduce the latency.
0 20 40 60 80 100 120 140
0
20
40
60
80
100
120
140
N1
N2
N3
N4
N5 N6
N7
N8
N9
N10
N11
N12
N13
N14
N15
N16
N17
N18
N19
N20
coverage range
Base station
Sensor nodes
0 20 40 60 80 100 120 140
0
20
40
60
80
100
120
140
N1
N2
N3
N4
N5 N6
N7
N8
N9
N10
N11
N12
N13
N14
N15
N16
N17
N18
N19
N20
coverage range
Base station
Sensor nodes
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 489
The Parameters that we had considered for the implementation
are as follows
Sl NO PARAMETER NAME VALUES
1 Number of Sensor
nodes
20(Random
Deployment)
2 SIFS 0.01sec
3 DIFS 0.05sec
4 Physical Area 140m x 140m
5 Frame length 10
6 Back off range 0 to 20(Random)
7 frequency 2.4 GHz
8 Threshold Noise 0.7(Random)
8. RESULTS AND DISCUSSIONS
We found that the throughput has been increased as per the
results plotted using the simulation values. We also see that
the network congestion has been intelligently handled by
using the DCF operation. All the nodes in the deployed
physical area are given with a chance in the fair manner. The
frames are also been utilized efficiently. The frame drops have
been reduced which basically happens due to inappropriate
planning of channel allocation. The drops which are shown in
plot are based on the noise parameter which we have assumed
and not because of the failing in handling the channel access.
Using the proposed technique we can aid the CIM in a
efficient and reliable approach. The plot of the same has been
shown in figure 7
Fig 7: Plot of throughput
9. CONCLUSIONS AND FUTURE WORK
We proposed a IEEE 802.11 based MAC protocol integrated
with CAMS/CA based DCF technique for CIM. We have used
a infrastructure based wireless sensor network which helps the
end points to have a minimal work assigned and the
coordinator which is main powered with the maximum work .
This prolongs the deployment life time of end points as they
are battery driven. We have showed the better throughput by
handling the channel access using CSMA/CA DCF operation.
The proposed protocol is simple implement and flexible in
terms of network size. In future we will extend our work to
include slotted aloha protocol in this implementation and do
the performance analysis in aiding CIM.
REFERENCES
[1]. S. Hayat, N. Javaid, Z. A. Khan, A. Shareef, A.
Mahmood, S. H. Bouk, “Energy Efficient MAC Protocols”
Http://arxiv.org/abs/1207.2567v1
[2]. Niamat Ullah, M. SanaullahChowdhury, Mosaddique Al
Ameen, andKyung SupKwak, “Energy Efficient MAC
Protocol for Low-Energy Critical Infrastructure Monitoring
Networks Using Wakeup Radio” International Journal of
Distributed Sensor Networks Volume 2012, Article ID
504946,15 pages doi:10.1155/2012/504946
[3]. J. Becker, M. Calcagno, and D. Howard, “Low Energy
Critical Infrastructure Monitoring, doc.: IEEE 802.15-10-
0053-00-wng0-,” 2010,
https://mentor.ieee.org/802.15/documents.
[4]. Schwoerer and N. Dejean, “Elster & France Telecom
proposal”, doc.: IEEE 802.15-11-0479-01-004k, 2011,
https://mentor.ieee.org/802.15/documents
[5]. S.S.Joo, J.A.Jun, and C.S.Pyo, “MAC Proposal for Low-
Energy Wide Area Monitoring, doc.: IEEE802.15-11-0597-
01-004k,” 2011, https://mentor.ieee.org/802.15/documents
[6]. Y. Yang et al., “Low Energy MAC Proposal for
TG4kWSNIRI, doc.: IEEE 802.15-11-0596-00-004k,” 2011,
https://mentor.ieee.org/802.15/documents.
[7]. H. Liu, G. Yao, and P. Xu, “Energy Efficient MAC
protocol for Low Energy Critical Infrastructure Networks”
Doc: IEEE802.15-11-0619-01-004k-2011,
hhts://mentor.ieee.org.
[8]. Wei Ye, J.Heidemann and D. Estrin: An Energy-Efficient
MAC Protocol for Wireless Sensor Networks, IEEE
INFOCOM, New York, Vol. 2, pp. 1567-1576 (June 2002).
[9]. Tijs van Dam, Koen Langendoen: An Adaptive Energy
Efficient MAC Protocol for Wireless Networks, in
Proceedings of the First ACM Conference on Embedded
Networked Sensor Systems (November 2003)v
[10]. Kumar, S. Raghavan, V. Deng, Medium Access Control
protocols for ad hoc wireless networks: A survey. Ad Hoc
Networks 4, 2006, pp. 326-358.
[11]. Urmila A. Patil, Smita V. Modi, Suma B.J. “Analysis
and Implementation of IEEE 802.11 MAC Protocol for
Wireless Sensor Networks “International Journal of
5 10 15 20 25
35
40
45
50
55
60
65
70
75
80
85
Throughput
number of nodes
Proposed DCF
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 490
Engineering Science and Innovative Technology (IJESIT)
Volume 2, Issue 5, September 2013.
[12]. V. Vitsas, P. Chatzimisios, A. C. Boucouvalas, P. Raptis,
K. Paparrizos and D. Kleftouris, “Enhancing performance of
the IEEE 802.11 Distributed Coordination Function via packet
bursting” IEEE Communications Society Globecom 2004
Workshops 0-7803-87 98-8/04/$20.00 ©2004 IEEE
[13]. J. Polastre, J. Hill, and D. Culler, “Versatile low power
media access for wireless sensor networks,” in Proceedings of
the 2nd
International Conference on Embedded Networked
Sensor Systems (SenSys ’04), pp. 95–107, Baltimore, Md,
USA, November2004.
[14]. J.Lopez, J.A.Montenegro, and R.Roman, “Service
oriented security architecture for CII based on sensor
networks,” in 2nd International Workshop on Security,
Privacy and Trust in Pervasive and Ubiquitous Computing
(SecPerU ’06), pp. 1–6, June 2006.
[15]. M. Albano, S. Chessa, and R. Di Pietro, “A model with
applications for data survivability in Critical Infrastructures, ”
International Journal of Information Assurance and Security,
vol. 4, pp. 629–639, 2009.
[16]. B. Rolfe,” Preliminary Fragmentation Proposal for
TG4k, doc. IEEE 802.15-11-0478-00-004k,”2011,
https://mentor.ieee.org/802.15/documents

More Related Content

What's hot

A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...IJCNCJournal
 
A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...
A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...
A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...Journal For Research
 
IRJET- Congestion Avoidance and Qos Improvement in Base Station with Femt...
IRJET-  	  Congestion Avoidance and Qos Improvement in Base Station with Femt...IRJET-  	  Congestion Avoidance and Qos Improvement in Base Station with Femt...
IRJET- Congestion Avoidance and Qos Improvement in Base Station with Femt...IRJET Journal
 
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS cscpconf
 
Protection Technique for Complex Distribution Smart Grid Using Wireless Token...
Protection Technique for Complex Distribution Smart Grid Using Wireless Token...Protection Technique for Complex Distribution Smart Grid Using Wireless Token...
Protection Technique for Complex Distribution Smart Grid Using Wireless Token...Power System Operation
 
Scheduling schemes for carrier aggregation in lte advanced systems
Scheduling schemes for carrier aggregation in lte advanced systemsScheduling schemes for carrier aggregation in lte advanced systems
Scheduling schemes for carrier aggregation in lte advanced systemseSAT Publishing House
 
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...IJCNCJournal
 
Performance analysis of massive multiple input multiple output for high speed...
Performance analysis of massive multiple input multiple output for high speed...Performance analysis of massive multiple input multiple output for high speed...
Performance analysis of massive multiple input multiple output for high speed...IJECEIAES
 
ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEY
ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEYENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEY
ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEYijwmn
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...IJCNCJournal
 
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking network
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking networkQuality of Service in bandwidth adapted hybrid UMTS/WLAN interworking network
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking networkTELKOMNIKA JOURNAL
 
Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...IJECEIAES
 
A small vessel detection using a co-located multi-frequency FMCW MIMO radar
A small vessel detection using a co-located multi-frequency FMCW MIMO radar A small vessel detection using a co-located multi-frequency FMCW MIMO radar
A small vessel detection using a co-located multi-frequency FMCW MIMO radar IJECEIAES
 
Integrating device to device network with internet of health things: Towards ...
Integrating device to device network with internet of health things: Towards ...Integrating device to device network with internet of health things: Towards ...
Integrating device to device network with internet of health things: Towards ...journalBEEI
 
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...ijcncs
 
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKSDYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKSpharmaindexing
 
A novel optimal small cells deployment for next-generation cellular networks
A novel optimal small cells deployment for next-generation cellular networks A novel optimal small cells deployment for next-generation cellular networks
A novel optimal small cells deployment for next-generation cellular networks IJECEIAES
 
DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS
DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS
DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS pijans
 

What's hot (19)

A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...
 
A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...
A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...
A SURVEY ON DIFFERENT TYPES OF CLUSTERING BASED ROUTING PROTOCOLS IN WIRELESS...
 
J011137479
J011137479J011137479
J011137479
 
IRJET- Congestion Avoidance and Qos Improvement in Base Station with Femt...
IRJET-  	  Congestion Avoidance and Qos Improvement in Base Station with Femt...IRJET-  	  Congestion Avoidance and Qos Improvement in Base Station with Femt...
IRJET- Congestion Avoidance and Qos Improvement in Base Station with Femt...
 
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
GLOBAL FRONTRUNNER ROUTING ALGORITHM (GFRA) FOR V2V COMMUNICATION IN VANETS
 
Protection Technique for Complex Distribution Smart Grid Using Wireless Token...
Protection Technique for Complex Distribution Smart Grid Using Wireless Token...Protection Technique for Complex Distribution Smart Grid Using Wireless Token...
Protection Technique for Complex Distribution Smart Grid Using Wireless Token...
 
Scheduling schemes for carrier aggregation in lte advanced systems
Scheduling schemes for carrier aggregation in lte advanced systemsScheduling schemes for carrier aggregation in lte advanced systems
Scheduling schemes for carrier aggregation in lte advanced systems
 
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
 
Performance analysis of massive multiple input multiple output for high speed...
Performance analysis of massive multiple input multiple output for high speed...Performance analysis of massive multiple input multiple output for high speed...
Performance analysis of massive multiple input multiple output for high speed...
 
ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEY
ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEYENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEY
ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEY
 
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
 
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking network
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking networkQuality of Service in bandwidth adapted hybrid UMTS/WLAN interworking network
Quality of Service in bandwidth adapted hybrid UMTS/WLAN interworking network
 
Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...Performance evaluation of interference aware topology power and flow control ...
Performance evaluation of interference aware topology power and flow control ...
 
A small vessel detection using a co-located multi-frequency FMCW MIMO radar
A small vessel detection using a co-located multi-frequency FMCW MIMO radar A small vessel detection using a co-located multi-frequency FMCW MIMO radar
A small vessel detection using a co-located multi-frequency FMCW MIMO radar
 
Integrating device to device network with internet of health things: Towards ...
Integrating device to device network with internet of health things: Towards ...Integrating device to device network with internet of health things: Towards ...
Integrating device to device network with internet of health things: Towards ...
 
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
 
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKSDYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
DYNAMIC HYBRID CHANNEL (WMN) FOR BANDWIDTH GUARANTEES IN AD_HOC NETWORKS
 
A novel optimal small cells deployment for next-generation cellular networks
A novel optimal small cells deployment for next-generation cellular networks A novel optimal small cells deployment for next-generation cellular networks
A novel optimal small cells deployment for next-generation cellular networks
 
DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS
DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS
DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS
 

Viewers also liked

Integration techniques for two dimensional domains
Integration techniques for two dimensional domainsIntegration techniques for two dimensional domains
Integration techniques for two dimensional domainseSAT Publishing House
 
A new conceptual algorithm for adaptive route
A new conceptual algorithm for adaptive routeA new conceptual algorithm for adaptive route
A new conceptual algorithm for adaptive routeeSAT Publishing House
 
Implementation of a bit error rate tester of a wireless communication system ...
Implementation of a bit error rate tester of a wireless communication system ...Implementation of a bit error rate tester of a wireless communication system ...
Implementation of a bit error rate tester of a wireless communication system ...eSAT Publishing House
 
Theoretical flexural behavior of sandwich panel using
Theoretical flexural behavior of sandwich panel usingTheoretical flexural behavior of sandwich panel using
Theoretical flexural behavior of sandwich panel usingeSAT Publishing House
 
Vibgyor a sustainability assessment tool for residential building
Vibgyor a sustainability assessment tool for residential buildingVibgyor a sustainability assessment tool for residential building
Vibgyor a sustainability assessment tool for residential buildingeSAT Publishing House
 
Design and implementation of labview based scada for textile mills
Design and implementation of labview based scada for textile millsDesign and implementation of labview based scada for textile mills
Design and implementation of labview based scada for textile millseSAT Publishing House
 
Design of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkDesign of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkeSAT Publishing House
 
Assessment of the leachability and mechanical stability of mud from a zinc pl...
Assessment of the leachability and mechanical stability of mud from a zinc pl...Assessment of the leachability and mechanical stability of mud from a zinc pl...
Assessment of the leachability and mechanical stability of mud from a zinc pl...eSAT Publishing House
 
Modeling monthly average daily diffuse radiation for
Modeling monthly average daily diffuse radiation forModeling monthly average daily diffuse radiation for
Modeling monthly average daily diffuse radiation foreSAT Publishing House
 
Aiding visually challenged individual for object detection and navigation usi...
Aiding visually challenged individual for object detection and navigation usi...Aiding visually challenged individual for object detection and navigation usi...
Aiding visually challenged individual for object detection and navigation usi...eSAT Publishing House
 
Study of permeation of gases through ceramic supported polymeric and zeolite ...
Study of permeation of gases through ceramic supported polymeric and zeolite ...Study of permeation of gases through ceramic supported polymeric and zeolite ...
Study of permeation of gases through ceramic supported polymeric and zeolite ...eSAT Publishing House
 
Designing and implementation of remotely operated cooking module
Designing and implementation of remotely operated cooking moduleDesigning and implementation of remotely operated cooking module
Designing and implementation of remotely operated cooking moduleeSAT Publishing House
 
Hydrologic modeling of detention pond
Hydrologic modeling of detention pondHydrologic modeling of detention pond
Hydrologic modeling of detention pondeSAT Publishing House
 
Effect of inclined hump on the turbulence intensities
Effect of inclined hump on the turbulence intensitiesEffect of inclined hump on the turbulence intensities
Effect of inclined hump on the turbulence intensitieseSAT Publishing House
 
Design of a low cost temperature controller for high temperature furnaces use...
Design of a low cost temperature controller for high temperature furnaces use...Design of a low cost temperature controller for high temperature furnaces use...
Design of a low cost temperature controller for high temperature furnaces use...eSAT Publishing House
 
Treatment of kitchen waste by microbial culture
Treatment of kitchen waste by microbial cultureTreatment of kitchen waste by microbial culture
Treatment of kitchen waste by microbial cultureeSAT Publishing House
 
Novel technique for maximizing the thermal efficiency
Novel technique for maximizing the thermal efficiencyNovel technique for maximizing the thermal efficiency
Novel technique for maximizing the thermal efficiencyeSAT Publishing House
 
Effects on p h behaviour of expansive and non expansive soils contaminated wi...
Effects on p h behaviour of expansive and non expansive soils contaminated wi...Effects on p h behaviour of expansive and non expansive soils contaminated wi...
Effects on p h behaviour of expansive and non expansive soils contaminated wi...eSAT Publishing House
 
Industrial application of machine vision
Industrial application of machine visionIndustrial application of machine vision
Industrial application of machine visioneSAT Publishing House
 
Performance evaluation of lhr engine using palm
Performance evaluation of lhr engine using palmPerformance evaluation of lhr engine using palm
Performance evaluation of lhr engine using palmeSAT Publishing House
 

Viewers also liked (20)

Integration techniques for two dimensional domains
Integration techniques for two dimensional domainsIntegration techniques for two dimensional domains
Integration techniques for two dimensional domains
 
A new conceptual algorithm for adaptive route
A new conceptual algorithm for adaptive routeA new conceptual algorithm for adaptive route
A new conceptual algorithm for adaptive route
 
Implementation of a bit error rate tester of a wireless communication system ...
Implementation of a bit error rate tester of a wireless communication system ...Implementation of a bit error rate tester of a wireless communication system ...
Implementation of a bit error rate tester of a wireless communication system ...
 
Theoretical flexural behavior of sandwich panel using
Theoretical flexural behavior of sandwich panel usingTheoretical flexural behavior of sandwich panel using
Theoretical flexural behavior of sandwich panel using
 
Vibgyor a sustainability assessment tool for residential building
Vibgyor a sustainability assessment tool for residential buildingVibgyor a sustainability assessment tool for residential building
Vibgyor a sustainability assessment tool for residential building
 
Design and implementation of labview based scada for textile mills
Design and implementation of labview based scada for textile millsDesign and implementation of labview based scada for textile mills
Design and implementation of labview based scada for textile mills
 
Design of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulinkDesign of digital video watermarking scheme using matlab simulink
Design of digital video watermarking scheme using matlab simulink
 
Assessment of the leachability and mechanical stability of mud from a zinc pl...
Assessment of the leachability and mechanical stability of mud from a zinc pl...Assessment of the leachability and mechanical stability of mud from a zinc pl...
Assessment of the leachability and mechanical stability of mud from a zinc pl...
 
Modeling monthly average daily diffuse radiation for
Modeling monthly average daily diffuse radiation forModeling monthly average daily diffuse radiation for
Modeling monthly average daily diffuse radiation for
 
Aiding visually challenged individual for object detection and navigation usi...
Aiding visually challenged individual for object detection and navigation usi...Aiding visually challenged individual for object detection and navigation usi...
Aiding visually challenged individual for object detection and navigation usi...
 
Study of permeation of gases through ceramic supported polymeric and zeolite ...
Study of permeation of gases through ceramic supported polymeric and zeolite ...Study of permeation of gases through ceramic supported polymeric and zeolite ...
Study of permeation of gases through ceramic supported polymeric and zeolite ...
 
Designing and implementation of remotely operated cooking module
Designing and implementation of remotely operated cooking moduleDesigning and implementation of remotely operated cooking module
Designing and implementation of remotely operated cooking module
 
Hydrologic modeling of detention pond
Hydrologic modeling of detention pondHydrologic modeling of detention pond
Hydrologic modeling of detention pond
 
Effect of inclined hump on the turbulence intensities
Effect of inclined hump on the turbulence intensitiesEffect of inclined hump on the turbulence intensities
Effect of inclined hump on the turbulence intensities
 
Design of a low cost temperature controller for high temperature furnaces use...
Design of a low cost temperature controller for high temperature furnaces use...Design of a low cost temperature controller for high temperature furnaces use...
Design of a low cost temperature controller for high temperature furnaces use...
 
Treatment of kitchen waste by microbial culture
Treatment of kitchen waste by microbial cultureTreatment of kitchen waste by microbial culture
Treatment of kitchen waste by microbial culture
 
Novel technique for maximizing the thermal efficiency
Novel technique for maximizing the thermal efficiencyNovel technique for maximizing the thermal efficiency
Novel technique for maximizing the thermal efficiency
 
Effects on p h behaviour of expansive and non expansive soils contaminated wi...
Effects on p h behaviour of expansive and non expansive soils contaminated wi...Effects on p h behaviour of expansive and non expansive soils contaminated wi...
Effects on p h behaviour of expansive and non expansive soils contaminated wi...
 
Industrial application of machine vision
Industrial application of machine visionIndustrial application of machine vision
Industrial application of machine vision
 
Performance evaluation of lhr engine using palm
Performance evaluation of lhr engine using palmPerformance evaluation of lhr engine using palm
Performance evaluation of lhr engine using palm
 

Similar to Enhancement of energy efficiency and throughput using csmaca dcf operation for cim

Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...IJECEIAES
 
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...csandit
 
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...chokrio
 
1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-mainRahul Singh
 
Minimum Process Coordinated Checkpointing Scheme For Ad Hoc Networks
Minimum Process Coordinated Checkpointing Scheme For Ad Hoc Networks   Minimum Process Coordinated Checkpointing Scheme For Ad Hoc Networks
Minimum Process Coordinated Checkpointing Scheme For Ad Hoc Networks pijans
 
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...IRJET Journal
 
ADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC Networks
ADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC NetworksADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC Networks
ADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC Networksijwmn
 
Secured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manetsSecured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manetseSAT Publishing House
 
Transport layer protocol for urgent data
Transport layer protocol for urgent dataTransport layer protocol for urgent data
Transport layer protocol for urgent dataeSAT Publishing House
 
Transport layer protocol for urgent data transmission in wsn
Transport layer protocol for urgent data transmission in wsnTransport layer protocol for urgent data transmission in wsn
Transport layer protocol for urgent data transmission in wsneSAT Journals
 
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over ManetImproved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over ManetIJERA Editor
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksIOSR Journals
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksIOSR Journals
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksIOSR Journals
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksIOSR Journals
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)IRJET Journal
 
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...eSAT Publishing House
 

Similar to Enhancement of energy efficiency and throughput using csmaca dcf operation for cim (20)

40120140503011
4012014050301140120140503011
40120140503011
 
I018135565
I018135565I018135565
I018135565
 
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
Evaluation of Energy Consumption using Receiver–Centric MAC Protocol in Wirel...
 
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENS...
 
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
 
1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main
 
Minimum Process Coordinated Checkpointing Scheme For Ad Hoc Networks
Minimum Process Coordinated Checkpointing Scheme For Ad Hoc Networks   Minimum Process Coordinated Checkpointing Scheme For Ad Hoc Networks
Minimum Process Coordinated Checkpointing Scheme For Ad Hoc Networks
 
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
Teletraffic Analysis of Overflowed Traffic with Voice only in Multilayer 3G W...
 
ADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC Networks
ADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC NetworksADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC Networks
ADHOCFTSIM: A Simulator of Fault Tolerence In the AD-HOC Networks
 
Secured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manetsSecured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manets
 
Transport layer protocol for urgent data
Transport layer protocol for urgent dataTransport layer protocol for urgent data
Transport layer protocol for urgent data
 
Transport layer protocol for urgent data transmission in wsn
Transport layer protocol for urgent data transmission in wsnTransport layer protocol for urgent data transmission in wsn
Transport layer protocol for urgent data transmission in wsn
 
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over ManetImproved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
 
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor NetworksEnergy Efficient E-BMA Protocol for Wireless Sensor Networks
Energy Efficient E-BMA Protocol for Wireless Sensor Networks
 
K016136062
K016136062K016136062
K016136062
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
 
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 

Enhancement of energy efficiency and throughput using csmaca dcf operation for cim

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 485 ENHANCEMENT OF ENERGY EFFICIENCY AND THROUGHPUT USING CSMA/CA DCF OPERATION FOR CIM Puneeth Naik. S1 , JayanthiK.Murthy2 1 MTech-Student (Digital communications), Dept. of Electronics and communication, BMSCE, Bangalore Karnataka- 2013, India 2 Associate professor (PG Studies), Dept. of Electronics and communication, BMSCE, Bangalore Karnataka-2013, India Abstract Advancements in wireless sensor network technology (WSN) have lead researchers to work on wide variety of distributed sensing applications. They have better potential to work without human attention after deployment in large physical environments. Out of all large physical environments that sensing is dealt with, Critical infrastructure monitoring (CIM) emerges as a prominent application. The Major requirements of CIM are reliable data transfer and long deployment life time. These networks are also expected to operate in extremely low-cost communication environment. In this paper we propose a DCF integrated MAC (Medium access control) protocol to cater CIM with better throughput. We have used an infrastructure based wireless sensor network in association with back off algorithm. The simulation shows that DCF integrated channel access method would offer better throughput for CIM which happens to be one of the major requirement. Keywords: CIM (Critical infrastructure monitoring), WSN (Wireless sensor networks), MAC (Medium Access control), DCF (Distributed Coordination function).CS (Carrier sensing). -----------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION The Advantages and advancements of wireless communication, networking and data processing techniques have increased the potential of wireless sensor networks. These sensor networks are robust enough to sense large physical environments, process the data and route the same to the desired destination. The applications of these sensor networks have been consistently increasing and major one’s to name are i) Disaster monitoring, ii)Surveillance, iii) Target tracing and iv) Health monitoring [1]. When we review the large physical environments closely, we see that critical infrastructure (CI) have received less attention in terms of monitoring prospective. Critical Infrastructures: Critical infrastructures are defines as large physical environments which can run up to kilometers. They are very much essential for better functioning of society and economy. Just to list a few, i) Oil and Gas pipeline monitoring, ii) Gas material detection, iii) Water leakage detection. Predominantly CI’s are monitored using the traditional techniques. Traditional techniques demands high human attention more frequently and are not much reliable.Monitoring CI’s would help in ensuring prevention, maintenance, safety and reliability. It also helps in prevention of catastrophic failures, damages due to leakages (Oil, Gas)[2]. The same has been shown in the figure 1 Fig 1: Water leakage Monitoring, Power Monitoring While Monitoring CI’s sensors would produce large amount of data which can be basically categorized into 1) Normal Data 2) Emergency data. These sensed data needs to be transmitted reliably. In wireless sensor networks channel access and energy of the nodes playa important role as all the sensor nodes in the network needs to be treated in fair manner. Improper assignment of channels would affect the throughput, and leads to inefficient utilization of energy [3]. The most suitable and challenging area in networking to work with is MAC Protocols. MAC basically works with channels and helps in achieving the desired throughput and manages the delay. In this article we first describe Distributed coordination function (DCF) concept and its operation. We integrate this concept with MAC protocol in order to enhance the
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 486 throughput for CI’s using proper channel management, after which we simulate the same and analyze the results. 2. RELATED WORK The handsome amount of research has been done by authors in [4] on resources management in wireless sensor networks. The IEEE 802.15.4e based CIM MAC which utilizes the time slotted channel hopping concept. The authors in [5] have investigated on the power consumption at end points. They have proposed a low-energy link access for CIM by distributing the access load on the slotted link. The author in [6] has proposed “Low Energy MAC Proposal for TG4kWSNIRI” based on Non Beacon mode, CSMA/CA and ACK. Here the coordinator keeps listening to the channel and the endpoints keep sleeping. If endpoint has data to transmit, sends Data Request frame by using CSMA/CA, and waits for payload frame from Coordinator, failing which the retransmission of data request frame takes place. If the coordinator wants to send a Multicast or broadcast frame then sends a sequence of wakeup calls to make an appointment about the desired frame transmission time. If it has a unicast frame to a particular end point, theit broadcasts the wakeup call and waits for the ACK from the intended receiver failing which resends the wakeup frame. The authors [7] have proposed an IEEE 802.15.4e based CIM MAC protocol which consumes less energy and they do not consider the concept of Coordinator. It uses the idea of batch transmission and coordinated sleeping. In this concept the technique of buffer management at the receiver plays a important role and also uses the ACK concept. This concept y helps in conserving the energy, However it difficult to implement the concept of buffer in all the nodes. In this paper we have considered few inputs from the literature referred above and have worked on throughput and energy aspects of CIM 3. THROUGHPUT AND ENERGY ATTRIBUTES OF WSN Major sources of energy waste in wireless sensor network are basically of four types [8] [9]. (i) Collision: The first one is the collision. When a transmitted packet is corrupted due to interference, it has to be discarded and the follow on Retransmissions increase energy consumption. Collision increases latency also. (ii) Overhearing: The second is overhearing, meaning that a node picks up packets that are destined to other nodes. (iii) Packet Overhead: The third source is control packet overhead. Sending and receiving control packets consumes energy too and less useful data packets can be transmitted. (iv) Idle listening: The last major source of inefficiency is idle listening i.e., listening to receive possible traffic that is not sent. This is especially true in many sensor network applications. If nothing is sensed, the sensor node will be in idle state for most of the time. The main goal of any MAC protocol for sensor network is to minimize the energy waste due to idle listening, overhearing and collision. 4. MEDIUM ACCESS CONTROL (MAC) MAC protocol is responsible for reliable, error free data transfer with minimum retransmissions. The MAC also caters to meet performance requirements such as controlling bandwidth, power awareness, contention resolution, minimize interference and collision avoidance. Data collection in WSN tends to suffer from heavy congestion which basically affects the throughput and the energy consumption in the network.[10] MAC protocols can be categorized as Contention-free and Contention-based, as shown in figure 2. Fig 2: Classification of MAC protocols. Contention free Protocols: The contention free protocols do not make the assumption that network traffic is intrinsically random, instead traffic is ordered in a bounded channel assignment. These schemes are generally based on TDMA, FDMA or CDMA that utilizes the synchronization technique and the channel access mechanism of the physical layer. However, these schemes are more complex, specialized sensor hardware and there is a dependency on the physical layer [11]. Contention Based Protocols: The contention based protocols use Carrier Sense Multiple Access (CSMA) scheme, where for a node to transmit, it must sense the medium to determine if another node is transmitting. If the medium is busy, the node will defer until the end of the current transmission. After deferral or just before attempting to transmit again, the node shall select a random back-off interval and shall decrement the back-off interval counter while the medium is idle [11]. The MAC sub layer of the IEEE 802.11 defines the Distributed Coordination Function (DCF), the Point Coordination Function (PCF), and the Hybrid Coordination Function (HCF). The focus will be on the DCF that allows automatic medium sharing [12]. 5. DISTRIBUTED COORDINATION FUNCTION (DCF) The basic access mechanism called DCF is a carrier senses multiple access collision avoidance (CSMA/CA) mechanism. The CSMA protocol allows a station wishing to transmit to sense the medium, if the medium is busy it defer its
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 487 transmission but if the medium is free then the station is allowed to transmit. CSMA is very effective when the medium does not have high traffic, since all medium transmit with minimum delay. Stations transmitting at the same time result in collision as the protocol initially are designed for single channel transmission. CA allows the medium that is busy and defers to wait and allow the medium to be free for a specific time called distributed inter frame space (DIFS) then the station is allowed to transmit.[13] Fig 3: DCF Operation. Multiple collision occur more frequently after a busy period when there are multiple stations waiting on the medium to transmit their data. This situation necessitates a random backoff procedure to resolve medium contention conflicts through carrier sense (CS) functions [13, 14]. The IEEE 802.11 DCF protocol works in two different modes 1) infrastructure mode and 2)Ad hoc mode. In infrastructure mode communication between modes must go through a central node called coordinator node, while in Ad hoc mode nodes communicate directly with each other. Infrastructure mode fits for static large infrastructure applications [15, 16]. In this paper we focus on communication which is based on infrastructure mode and we utilize IEEE 802.11 DCF infrastructure mode along with MAC protocol for the CIM. By enhancing throughput and maintaining channel access fairness within the network, the quality of service is enhanced and consequently the WSN information assurance is supported for CIM. 6. COMMUNICATION PROCESS The main motto of the CIM is to facilitate single point to multi-thousands of point’s Communication for critical infrastructure monitoring with low energy. The main components of CIM network are coordinator or collector, devices or end points, and repeater. Coordinator is generally main powered, and endpoints are battery powered. Topology used in CIM is star topology that supports one to multipoint communication. CIM network consists of only one coordinator that supports many devices. The present 802.15.1, Bluetooth has a short range and cannot support thousands of endpoints due to low capacity. The IEEE 802.15.3 also has a short range and aimed high data rate applications. IEEE 802.15.4/4e MACs supports low data rate applications. However, they need modifications to support such a large network with very lossy channel. IEEE 802.15.4e supports mainly TDMA approach which cannot work well for CIM networks due to large number of endpoints as it leads to lot of delay. Flow Chart 1: Communication Process Unlike traditional MAC protocols in this project we consider a unique approach to satisfy the CIM demands. A IEEE 802.11 based MAC protocol and the concept of DCF are used. The performance analysis is done based on the analysis of the channel assignment to the endpoints and the throughput.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 488 Fig 4: Star topology 7. PERFORMANCE ANALYSIS As we are dealing with infrastructure based wireless sensor network, the coordinator dominates all the end points and manages radio resources and power. When we consider uplink communication i.e. from end pints to the coordinator, channel access management needs to be handled by MAC protocol. In this implementation we have considered the DCF operation with standard IEEE 802.11 MAC protocol. Initially when we deploy the nodes and initialize the network, we assume that all these nodes have the monitored data with them and they are ready to contend for the channel. The implementation of the same has been shown in the figure Now the MAC protocol with DCF operation would allocate the backoff values to all the nodes which are deployed. Once the nodes have the backoff value assigned , they start listening to the channel and executes the CSMA/CA technique. If the channel is busy it waits for a time called DIFS and still if it hears the channel to be busy then it will backoff again. The value of the back off counter would be reduced by 1 on every successful transmission on the channel. Likewise all the deployed nodes would be given with a particular frame for transmission of its sensed data in a fair manner. Special Case: If the back off values of two or more nodes n the network becomes zero at the same time, then all the nodes with same back off value would start there transmissions. This situation would lead to losing a complete frame length allocated to these nodes. To avoid this scenario, we have included an additional algorithm in this implementation to handle the case efficiently. Fig 5: Network Deployment of CIM When two nodes are assigned with the same back off values and becomes zero (Upon CSMA), MAC protocol assigns another pair of random values to them. They nodes would be sorted in ascending order and the one with the least random value will be given with a chance to transmit the information over the channel. Fig 6: successful assignment of channels. The process will be repeated until all the nodes which had the same back off value are given with an opportunity to transmit the information. With this technique we were able to avoid collisions and enhance the throughput, avoid energy consumption and reduce the latency. 0 20 40 60 80 100 120 140 0 20 40 60 80 100 120 140 N1 N2 N3 N4 N5 N6 N7 N8 N9 N10 N11 N12 N13 N14 N15 N16 N17 N18 N19 N20 coverage range Base station Sensor nodes 0 20 40 60 80 100 120 140 0 20 40 60 80 100 120 140 N1 N2 N3 N4 N5 N6 N7 N8 N9 N10 N11 N12 N13 N14 N15 N16 N17 N18 N19 N20 coverage range Base station Sensor nodes
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 489 The Parameters that we had considered for the implementation are as follows Sl NO PARAMETER NAME VALUES 1 Number of Sensor nodes 20(Random Deployment) 2 SIFS 0.01sec 3 DIFS 0.05sec 4 Physical Area 140m x 140m 5 Frame length 10 6 Back off range 0 to 20(Random) 7 frequency 2.4 GHz 8 Threshold Noise 0.7(Random) 8. RESULTS AND DISCUSSIONS We found that the throughput has been increased as per the results plotted using the simulation values. We also see that the network congestion has been intelligently handled by using the DCF operation. All the nodes in the deployed physical area are given with a chance in the fair manner. The frames are also been utilized efficiently. The frame drops have been reduced which basically happens due to inappropriate planning of channel allocation. The drops which are shown in plot are based on the noise parameter which we have assumed and not because of the failing in handling the channel access. Using the proposed technique we can aid the CIM in a efficient and reliable approach. The plot of the same has been shown in figure 7 Fig 7: Plot of throughput 9. CONCLUSIONS AND FUTURE WORK We proposed a IEEE 802.11 based MAC protocol integrated with CAMS/CA based DCF technique for CIM. We have used a infrastructure based wireless sensor network which helps the end points to have a minimal work assigned and the coordinator which is main powered with the maximum work . This prolongs the deployment life time of end points as they are battery driven. We have showed the better throughput by handling the channel access using CSMA/CA DCF operation. The proposed protocol is simple implement and flexible in terms of network size. In future we will extend our work to include slotted aloha protocol in this implementation and do the performance analysis in aiding CIM. REFERENCES [1]. S. Hayat, N. Javaid, Z. A. Khan, A. Shareef, A. Mahmood, S. H. Bouk, “Energy Efficient MAC Protocols” Http://arxiv.org/abs/1207.2567v1 [2]. Niamat Ullah, M. SanaullahChowdhury, Mosaddique Al Ameen, andKyung SupKwak, “Energy Efficient MAC Protocol for Low-Energy Critical Infrastructure Monitoring Networks Using Wakeup Radio” International Journal of Distributed Sensor Networks Volume 2012, Article ID 504946,15 pages doi:10.1155/2012/504946 [3]. J. Becker, M. Calcagno, and D. Howard, “Low Energy Critical Infrastructure Monitoring, doc.: IEEE 802.15-10- 0053-00-wng0-,” 2010, https://mentor.ieee.org/802.15/documents. [4]. Schwoerer and N. Dejean, “Elster & France Telecom proposal”, doc.: IEEE 802.15-11-0479-01-004k, 2011, https://mentor.ieee.org/802.15/documents [5]. S.S.Joo, J.A.Jun, and C.S.Pyo, “MAC Proposal for Low- Energy Wide Area Monitoring, doc.: IEEE802.15-11-0597- 01-004k,” 2011, https://mentor.ieee.org/802.15/documents [6]. Y. Yang et al., “Low Energy MAC Proposal for TG4kWSNIRI, doc.: IEEE 802.15-11-0596-00-004k,” 2011, https://mentor.ieee.org/802.15/documents. [7]. H. Liu, G. Yao, and P. Xu, “Energy Efficient MAC protocol for Low Energy Critical Infrastructure Networks” Doc: IEEE802.15-11-0619-01-004k-2011, hhts://mentor.ieee.org. [8]. Wei Ye, J.Heidemann and D. Estrin: An Energy-Efficient MAC Protocol for Wireless Sensor Networks, IEEE INFOCOM, New York, Vol. 2, pp. 1567-1576 (June 2002). [9]. Tijs van Dam, Koen Langendoen: An Adaptive Energy Efficient MAC Protocol for Wireless Networks, in Proceedings of the First ACM Conference on Embedded Networked Sensor Systems (November 2003)v [10]. Kumar, S. Raghavan, V. Deng, Medium Access Control protocols for ad hoc wireless networks: A survey. Ad Hoc Networks 4, 2006, pp. 326-358. [11]. Urmila A. Patil, Smita V. Modi, Suma B.J. “Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks “International Journal of 5 10 15 20 25 35 40 45 50 55 60 65 70 75 80 85 Throughput number of nodes Proposed DCF
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 04 | Apr-2014, Available @ http://www.ijret.org 490 Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September 2013. [12]. V. Vitsas, P. Chatzimisios, A. C. Boucouvalas, P. Raptis, K. Paparrizos and D. Kleftouris, “Enhancing performance of the IEEE 802.11 Distributed Coordination Function via packet bursting” IEEE Communications Society Globecom 2004 Workshops 0-7803-87 98-8/04/$20.00 ©2004 IEEE [13]. J. Polastre, J. Hill, and D. Culler, “Versatile low power media access for wireless sensor networks,” in Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys ’04), pp. 95–107, Baltimore, Md, USA, November2004. [14]. J.Lopez, J.A.Montenegro, and R.Roman, “Service oriented security architecture for CII based on sensor networks,” in 2nd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU ’06), pp. 1–6, June 2006. [15]. M. Albano, S. Chessa, and R. Di Pietro, “A model with applications for data survivability in Critical Infrastructures, ” International Journal of Information Assurance and Security, vol. 4, pp. 629–639, 2009. [16]. B. Rolfe,” Preliminary Fragmentation Proposal for TG4k, doc. IEEE 802.15-11-0478-00-004k,”2011, https://mentor.ieee.org/802.15/documents