IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
The document provides an overview of routing protocols in wireless sensor networks. It discusses several categories of routing protocols including data-centric, hierarchical, and location-based. For hierarchical routing protocols, it summarizes LEACH, PEGASIS, HEED, P-LEACH, H-LEACH, and other variants that aim to improve energy efficiency. It provides brief descriptions of how each protocol operates and highlights drawbacks. The document also summarizes several data-centric routing protocols including Directed Diffusion, Rumor Routing, and their limitations.
The document discusses the evaluation of reliability in wireless sensor networks. It analyzes the effect of reporting rate and packet size on reliability parameters like packet delivery ratio and packet loss ratio. The key findings from simulation graphs are: (1) packet delivery ratio decreases and packet loss ratio increases with increasing reporting rate due to more congestion, (2) initially packet delivery ratio increases with packet size but starts decreasing after a threshold as larger packets lead to more information loss. The paper concludes that packet size and reporting rate impact network reliability and increasing delivery ratio while minimizing energy and congestion can enhance reliability.
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
Wireless sensor networks consist of large numbers of sensor nodes that monitor parameters and communicate wirelessly. The SPIN protocol family was developed to address the limitations of sensor nodes, particularly their limited energy, computation, and communication capabilities. SPIN uses meta-data negotiation and resource awareness to disseminate data between nodes more efficiently than flooding protocols. SPIN-1 is a simple three-stage handshake protocol that reduces energy costs. SPIN-2 builds upon SPIN-1 with an additional energy conservation heuristic to further prolong network lifetime. Evaluation shows SPIN consumes significantly less energy than flooding for data dissemination in wireless sensor networks.
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN Sathish Silence
GSTEB is a self-organized tree-based energy-balance routing protocol for wireless sensor networks. It aims to prolong network lifetime by balancing energy consumption across nodes. In GSTEB, the base station selects a root node and broadcasts its ID. Then each node selects its parent in a way that minimizes its distance to the root while balancing energy levels. The network operates in rounds, where a routing tree is constructed and nodes transmit sensed data to the base station along the tree. GSTEB dynamically changes the root node between rounds to further balance energy usage among all nodes. Simulation results show GSTEB outperforms other protocols in balancing energy consumption and extending network lifetime.
Energy efficient communication techniques for wireless micro sensor networksPushpita Biswas
The document summarizes work done on improving the LEACH routing protocol for wireless sensor networks. It provides background on WSNs and discusses limitations of the original LEACH protocol. The work done section describes an algorithm that tracks "perfect clusters" based on distances between a cluster head and nodes, and adjusts node thresholds to promote repetition of such clusters while limiting energy depletion. Simulation conditions consider 100 homogeneous nodes randomly placed to transmit data to a base station.
The document discusses routing protocols in wireless sensor networks. It outlines several key challenges for routing protocols including node deployment, network dynamics, energy conservation, fault tolerance, scalability, and hardware constraints. It then describes several common routing techniques used in wireless sensor networks, including proactive, reactive, and hybrid path establishment approaches, as well as flat, hierarchical, and location-based network structures. Finally, it discusses different protocol operations such as multipath routing, query-based routing, negotiation-based routing, and supporting quality of service metrics.
Directed diffusion for wireless sensor networkingHabibur Rahman
This document summarizes the key ideas of the "Directed Diffusion for Wireless Sensor Networking" paper. It introduces directed diffusion as a data-centric paradigm for wireless sensor networks that is designed for robustness, scalability, and energy efficiency. The core concepts of directed diffusion are interests, data, gradients, and reinforcement, which work together to efficiently route queries to sensor data in the network. Through localized interactions and data aggregation, directed diffusion is shown to significantly reduce energy consumption compared to flooding-based approaches in wireless sensor networks.
The document provides an overview of routing protocols in wireless sensor networks. It discusses several categories of routing protocols including data-centric, hierarchical, and location-based. For hierarchical routing protocols, it summarizes LEACH, PEGASIS, HEED, P-LEACH, H-LEACH, and other variants that aim to improve energy efficiency. It provides brief descriptions of how each protocol operates and highlights drawbacks. The document also summarizes several data-centric routing protocols including Directed Diffusion, Rumor Routing, and their limitations.
The document discusses the evaluation of reliability in wireless sensor networks. It analyzes the effect of reporting rate and packet size on reliability parameters like packet delivery ratio and packet loss ratio. The key findings from simulation graphs are: (1) packet delivery ratio decreases and packet loss ratio increases with increasing reporting rate due to more congestion, (2) initially packet delivery ratio increases with packet size but starts decreasing after a threshold as larger packets lead to more information loss. The paper concludes that packet size and reporting rate impact network reliability and increasing delivery ratio while minimizing energy and congestion can enhance reliability.
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
Wireless sensor networks consist of large numbers of sensor nodes that monitor parameters and communicate wirelessly. The SPIN protocol family was developed to address the limitations of sensor nodes, particularly their limited energy, computation, and communication capabilities. SPIN uses meta-data negotiation and resource awareness to disseminate data between nodes more efficiently than flooding protocols. SPIN-1 is a simple three-stage handshake protocol that reduces energy costs. SPIN-2 builds upon SPIN-1 with an additional energy conservation heuristic to further prolong network lifetime. Evaluation shows SPIN consumes significantly less energy than flooding for data dissemination in wireless sensor networks.
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN Sathish Silence
GSTEB is a self-organized tree-based energy-balance routing protocol for wireless sensor networks. It aims to prolong network lifetime by balancing energy consumption across nodes. In GSTEB, the base station selects a root node and broadcasts its ID. Then each node selects its parent in a way that minimizes its distance to the root while balancing energy levels. The network operates in rounds, where a routing tree is constructed and nodes transmit sensed data to the base station along the tree. GSTEB dynamically changes the root node between rounds to further balance energy usage among all nodes. Simulation results show GSTEB outperforms other protocols in balancing energy consumption and extending network lifetime.
Energy efficient communication techniques for wireless micro sensor networksPushpita Biswas
The document summarizes work done on improving the LEACH routing protocol for wireless sensor networks. It provides background on WSNs and discusses limitations of the original LEACH protocol. The work done section describes an algorithm that tracks "perfect clusters" based on distances between a cluster head and nodes, and adjusts node thresholds to promote repetition of such clusters while limiting energy depletion. Simulation conditions consider 100 homogeneous nodes randomly placed to transmit data to a base station.
The document discusses routing protocols in wireless sensor networks. It outlines several key challenges for routing protocols including node deployment, network dynamics, energy conservation, fault tolerance, scalability, and hardware constraints. It then describes several common routing techniques used in wireless sensor networks, including proactive, reactive, and hybrid path establishment approaches, as well as flat, hierarchical, and location-based network structures. Finally, it discusses different protocol operations such as multipath routing, query-based routing, negotiation-based routing, and supporting quality of service metrics.
Directed diffusion for wireless sensor networkingHabibur Rahman
This document summarizes the key ideas of the "Directed Diffusion for Wireless Sensor Networking" paper. It introduces directed diffusion as a data-centric paradigm for wireless sensor networks that is designed for robustness, scalability, and energy efficiency. The core concepts of directed diffusion are interests, data, gradients, and reinforcement, which work together to efficiently route queries to sensor data in the network. Through localized interactions and data aggregation, directed diffusion is shown to significantly reduce energy consumption compared to flooding-based approaches in wireless sensor networks.
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyAli Habeeb
This document summarizes several data-centric routing protocols for wireless sensor networks. It begins by outlining the challenges of routing in WSNs, including energy consumption, scalability, addressing, robustness, topology, and application-specific needs. It then describes several data-centric routing protocols, including flooding, directed flooding, constrained flooding, gossiping, fuzzy gossiping, location-based gossiping, and others. It notes advantages and disadvantages of these protocols for efficiently routing data in wireless sensor networks while minimizing energy consumption.
Wireless sensors networks protocols part 2Rushin Shah
The document discusses routing protocols for wireless sensor networks. It describes why routing protocols are needed in WSNs to efficiently transmit sensor data to data sinks. It outlines several challenges for routing in WSNs, including limited resources, large network scales, dynamic environments, and different data traffic models. The document then examines different routing strategies like proactive, reactive, and hybrid approaches. It also discusses routing techniques that use flat networks, clustering, data-centric approaches, and geographic location-based routing. Flooding and gossiping are presented as common information dissemination techniques with issues like implosion and resource blindness.
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Editor IJCATR
In wireless sensor networks, sensor nodes play the most prominent role. These sensor nodes are mainly un-chargeable, so it
raises an issue regarding lifetime of the network. Mainly sensor nodes collect data and transmit it to the Base Station. So, most of the
energy is consumed in the communication process between sensor nodes and the Base Station. In this paper, we present an
improvement on LEACH protocol to enhance the network lifetime. Our goal is to reduce the transmissions between cluster heads and
the sink node. We will choose optimum number of Master Cluster Heads from variation cluster heads present in the network. The
simulation results show that our proposed algorithm enhances the network lifetime as compare to the LEACH protocol.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
This document presents a hierarchical clustering algorithm for wireless sensor networks. It begins with introductions to wireless sensor networks and their architecture. It then discusses routing protocols, applications, quality of service aspects, and types of clustering for wireless sensor networks. The main body of the document describes the evolution of hierarchical clustering, and presents the hierarchical clustering algorithm and a dynamic energy efficient hierarchical routing algorithm. It provides details on the simulation methods and concludes that hierarchical clustering and routing algorithms can efficiently reduce energy consumption in sensor nodes.
Performance Analysis of Routing Protocols of Wireless Sensor NetworksDarpan Dekivadiya
The document summarizes different types of routing protocols that can be used in wireless sensor networks. It categorizes the protocols based on their mode of functioning, participation style of nodes, and network structure. Some key routing protocols discussed include LEACH, which is a proactive clustering protocol, SPIN that uses direct communication, and TEEN which is a reactive clustering protocol. The document also discusses challenges in routing for wireless sensor networks given the constraints of sensor nodes.
This document outlines various clustering protocols for heterogeneous wireless sensor networks (HWSN). It begins by defining keywords related to HWSN and challenges in these networks, such as limited energy and heterogeneous hardware. The goals of clustering protocols are then discussed, including load balancing, fault tolerance and energy efficiency. Various clustering methods, attributes and models are classified. Examples of heterogeneous resources, impacts and performance measures are provided. The document also lists relevant conferences, simulators and laboratories, and provides author details.
The document discusses clustering protocols in wireless sensor networks (WSNs). It begins by introducing WSNs and their applications. It then describes the main types of communication in WSNs: direct, multi-hop, and using clustering. Several issues with clustering in WSNs are identified, such as selecting cluster heads and handling node mobility. Popular clustering protocols like LEACH are examined, noting their advantages like data aggregation but also limitations such as unsuitability for large networks. Proposed solutions for improving LEACH involve considering energy levels and traffic load when selecting cluster heads.
This document summarizes several energy-aware routing protocols for wireless sensor networks. It discusses classical approaches like flooding and gossiping and their deficiencies. It then describes the SPIN protocol which uses negotiations and metadata to adapt to resource constraints. Directed Diffusion is also covered, using interests, data messages, gradients, and reinforcement to set up multiple paths between sources and sinks. The document provides details on how these protocols establish and maintain paths while conserving energy in wireless sensor networks.
Performance evaluation of variants of particle swarm optimization algorithms ...Aayush Gupta
The document discusses wireless sensor networks (WSNs) and energy efficient routing protocols. It provides background on the challenges of WSNs including limited energy. It describes that communication is the most energy expensive activity and multihop transmission can help. It then discusses the LEACH routing protocol, a hierarchical clustering protocol, including its phases and stochastic threshold algorithm for selecting cluster heads. It proposes adapting k-means clustering for LEACH to select cluster heads more efficiently and compares performance of random LEACH versus adaptive k-means LEACH.
EDEEC and LEACH are clustering protocols for wireless sensor networks. EDEEC is for heterogeneous networks where nodes have different energy levels, while LEACH is for homogeneous networks. The document compares the performance of EDEEC and LEACH in terms of network lifetime, energy consumption, and total data transmission. Simulation results show that EDEEC outperforms LEACH by prolonging network lifetime, reducing energy consumption rate over time, and increasing total data transmitted to the base station.
Energy efficient routing in wireless sensor networksSpandan Spandy
The document summarizes several energy efficient multicast routing protocols for wireless sensor networks. It begins with an introduction to wireless sensor networks and routing challenges. It then summarizes the following protocols: MAODV, TEEN, APTEEN, SPEED, MMSPEED, RPAR, and LEACH. For each protocol, it provides a brief overview of the protocol's design, objectives, components, and how it aims to improve energy efficiency in wireless sensor network routing. The document concludes that providing energy-efficient multicast routing is important for wireless sensor network applications and that the protocols presented aim to achieve lower energy requirements through approaches like clustering, adaptive thresholding, and congestion control.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document summarizes several cluster-based routing protocols for wireless sensor networks that aim to improve energy efficiency. It discusses both pre-established protocols like LEACH, EEHC, and HEED, as well as on-demand protocols like Passive Clustering and Energy Level-based Passive Clustering. For each protocol, it describes the key ideas such as random cluster head election, using residual energy to select cluster heads, and rotating cluster head roles to balance energy load among nodes. The document concludes that hierarchical routing protocols can improve energy efficiency but optimal clustering parameters and handling of network dynamics are still challenges.
The document describes two wireless sensor network routing protocols: LEACH and PEGASIS. LEACH uses local processing to reduce global communication and randomly rotates cluster heads to distribute energy load. PEGASIS forms chains between nodes so that each node only communicates with a close neighbor, extending network lifetime compared to LEACH by up to 3 times. Both protocols aim to improve energy efficiency through data aggregation and minimizing transmission distances in wireless sensor networks.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
The document analyzes and compares the performance of two routing protocols for wireless sensor networks: LEACH and SPIN. LEACH is a hierarchical clustering protocol that randomly selects cluster heads to aggregate and transmit data to the base station. SPIN is a data-centric protocol that uses data negotiation to disseminate data and avoid redundant transmissions. The document simulates both protocols and finds that SPIN has lower overall energy consumption than LEACH due to its negotiation-based approach. Key differences between the protocols include LEACH using clusters and SPIN being flat, with SPIN allowing for possible node mobility and multipath transmission.
The document discusses the LEACH protocol and DECSA improvement for wireless sensor networks. It describes the two phases of LEACH - the set-up phase where cluster heads are chosen and the steady-state phase where data is transmitted. DECSA considers both distance and residual energy to select cluster heads, forming a three-level hierarchy. DECSA prolongs network lifetime by 31% and reduces energy consumption by 40% compared to the original LEACH protocol.
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...acijjournal
This document summarizes a research paper that proposes an enhancement to the Improved Balanced LEACH (IB-LEACH) routing protocol for heterogeneous wireless sensor networks. The proposed enhancement stores residual energy from each routing round in an "energy bank" to increase network lifetime. It also enhances the ACTIVE_ROUTE_TIMEOUT parameter in the underlying AODV routing protocol. Simulation results using MATLAB show the proposed approach improves network lifetime compared to previous methods. The document provides background on wireless sensor networks, routing protocols, LEACH clustering, and IB-LEACH before detailing the proposed enhancement and simulation results.
This document presents an introduction to a thesis that compares the performance of routing protocols in wireless sensor networks. It provides background on wireless sensor networks and discusses routing as an important issue. The introduction defines the problem, motivation, research questions, methodology, aims, assumptions, contributions, and organization of the thesis. It includes figures to illustrate typical wireless sensor network components, different network topologies, deployment densities, and a bar chart on simulation pause time.
5 продвинутых технологий VMware, которые нужно знатьSkillFactory
Константин Кряженков – ведущий инструктор онлайн-школы SkillFactory по виртуализации и облачным вычислениям – подготовил список из пяти самых перспективных технологий, которые нужно знать администратору ЦОД.
Network tomography to enhance the performance of software defined network mon...Sabidur Rahman
Monitoring and management of SDN is a challenging and active field of research. In this project, we have used Network Tomography techniques to enhance performance of SDN monitoring and management.
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyAli Habeeb
This document summarizes several data-centric routing protocols for wireless sensor networks. It begins by outlining the challenges of routing in WSNs, including energy consumption, scalability, addressing, robustness, topology, and application-specific needs. It then describes several data-centric routing protocols, including flooding, directed flooding, constrained flooding, gossiping, fuzzy gossiping, location-based gossiping, and others. It notes advantages and disadvantages of these protocols for efficiently routing data in wireless sensor networks while minimizing energy consumption.
Wireless sensors networks protocols part 2Rushin Shah
The document discusses routing protocols for wireless sensor networks. It describes why routing protocols are needed in WSNs to efficiently transmit sensor data to data sinks. It outlines several challenges for routing in WSNs, including limited resources, large network scales, dynamic environments, and different data traffic models. The document then examines different routing strategies like proactive, reactive, and hybrid approaches. It also discusses routing techniques that use flat networks, clustering, data-centric approaches, and geographic location-based routing. Flooding and gossiping are presented as common information dissemination techniques with issues like implosion and resource blindness.
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Editor IJCATR
In wireless sensor networks, sensor nodes play the most prominent role. These sensor nodes are mainly un-chargeable, so it
raises an issue regarding lifetime of the network. Mainly sensor nodes collect data and transmit it to the Base Station. So, most of the
energy is consumed in the communication process between sensor nodes and the Base Station. In this paper, we present an
improvement on LEACH protocol to enhance the network lifetime. Our goal is to reduce the transmissions between cluster heads and
the sink node. We will choose optimum number of Master Cluster Heads from variation cluster heads present in the network. The
simulation results show that our proposed algorithm enhances the network lifetime as compare to the LEACH protocol.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
This document presents a hierarchical clustering algorithm for wireless sensor networks. It begins with introductions to wireless sensor networks and their architecture. It then discusses routing protocols, applications, quality of service aspects, and types of clustering for wireless sensor networks. The main body of the document describes the evolution of hierarchical clustering, and presents the hierarchical clustering algorithm and a dynamic energy efficient hierarchical routing algorithm. It provides details on the simulation methods and concludes that hierarchical clustering and routing algorithms can efficiently reduce energy consumption in sensor nodes.
Performance Analysis of Routing Protocols of Wireless Sensor NetworksDarpan Dekivadiya
The document summarizes different types of routing protocols that can be used in wireless sensor networks. It categorizes the protocols based on their mode of functioning, participation style of nodes, and network structure. Some key routing protocols discussed include LEACH, which is a proactive clustering protocol, SPIN that uses direct communication, and TEEN which is a reactive clustering protocol. The document also discusses challenges in routing for wireless sensor networks given the constraints of sensor nodes.
This document outlines various clustering protocols for heterogeneous wireless sensor networks (HWSN). It begins by defining keywords related to HWSN and challenges in these networks, such as limited energy and heterogeneous hardware. The goals of clustering protocols are then discussed, including load balancing, fault tolerance and energy efficiency. Various clustering methods, attributes and models are classified. Examples of heterogeneous resources, impacts and performance measures are provided. The document also lists relevant conferences, simulators and laboratories, and provides author details.
The document discusses clustering protocols in wireless sensor networks (WSNs). It begins by introducing WSNs and their applications. It then describes the main types of communication in WSNs: direct, multi-hop, and using clustering. Several issues with clustering in WSNs are identified, such as selecting cluster heads and handling node mobility. Popular clustering protocols like LEACH are examined, noting their advantages like data aggregation but also limitations such as unsuitability for large networks. Proposed solutions for improving LEACH involve considering energy levels and traffic load when selecting cluster heads.
This document summarizes several energy-aware routing protocols for wireless sensor networks. It discusses classical approaches like flooding and gossiping and their deficiencies. It then describes the SPIN protocol which uses negotiations and metadata to adapt to resource constraints. Directed Diffusion is also covered, using interests, data messages, gradients, and reinforcement to set up multiple paths between sources and sinks. The document provides details on how these protocols establish and maintain paths while conserving energy in wireless sensor networks.
Performance evaluation of variants of particle swarm optimization algorithms ...Aayush Gupta
The document discusses wireless sensor networks (WSNs) and energy efficient routing protocols. It provides background on the challenges of WSNs including limited energy. It describes that communication is the most energy expensive activity and multihop transmission can help. It then discusses the LEACH routing protocol, a hierarchical clustering protocol, including its phases and stochastic threshold algorithm for selecting cluster heads. It proposes adapting k-means clustering for LEACH to select cluster heads more efficiently and compares performance of random LEACH versus adaptive k-means LEACH.
EDEEC and LEACH are clustering protocols for wireless sensor networks. EDEEC is for heterogeneous networks where nodes have different energy levels, while LEACH is for homogeneous networks. The document compares the performance of EDEEC and LEACH in terms of network lifetime, energy consumption, and total data transmission. Simulation results show that EDEEC outperforms LEACH by prolonging network lifetime, reducing energy consumption rate over time, and increasing total data transmitted to the base station.
Energy efficient routing in wireless sensor networksSpandan Spandy
The document summarizes several energy efficient multicast routing protocols for wireless sensor networks. It begins with an introduction to wireless sensor networks and routing challenges. It then summarizes the following protocols: MAODV, TEEN, APTEEN, SPEED, MMSPEED, RPAR, and LEACH. For each protocol, it provides a brief overview of the protocol's design, objectives, components, and how it aims to improve energy efficiency in wireless sensor network routing. The document concludes that providing energy-efficient multicast routing is important for wireless sensor network applications and that the protocols presented aim to achieve lower energy requirements through approaches like clustering, adaptive thresholding, and congestion control.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document summarizes several cluster-based routing protocols for wireless sensor networks that aim to improve energy efficiency. It discusses both pre-established protocols like LEACH, EEHC, and HEED, as well as on-demand protocols like Passive Clustering and Energy Level-based Passive Clustering. For each protocol, it describes the key ideas such as random cluster head election, using residual energy to select cluster heads, and rotating cluster head roles to balance energy load among nodes. The document concludes that hierarchical routing protocols can improve energy efficiency but optimal clustering parameters and handling of network dynamics are still challenges.
The document describes two wireless sensor network routing protocols: LEACH and PEGASIS. LEACH uses local processing to reduce global communication and randomly rotates cluster heads to distribute energy load. PEGASIS forms chains between nodes so that each node only communicates with a close neighbor, extending network lifetime compared to LEACH by up to 3 times. Both protocols aim to improve energy efficiency through data aggregation and minimizing transmission distances in wireless sensor networks.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
The document analyzes and compares the performance of two routing protocols for wireless sensor networks: LEACH and SPIN. LEACH is a hierarchical clustering protocol that randomly selects cluster heads to aggregate and transmit data to the base station. SPIN is a data-centric protocol that uses data negotiation to disseminate data and avoid redundant transmissions. The document simulates both protocols and finds that SPIN has lower overall energy consumption than LEACH due to its negotiation-based approach. Key differences between the protocols include LEACH using clusters and SPIN being flat, with SPIN allowing for possible node mobility and multipath transmission.
The document discusses the LEACH protocol and DECSA improvement for wireless sensor networks. It describes the two phases of LEACH - the set-up phase where cluster heads are chosen and the steady-state phase where data is transmitted. DECSA considers both distance and residual energy to select cluster heads, forming a three-level hierarchy. DECSA prolongs network lifetime by 31% and reduces energy consumption by 40% compared to the original LEACH protocol.
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...acijjournal
This document summarizes a research paper that proposes an enhancement to the Improved Balanced LEACH (IB-LEACH) routing protocol for heterogeneous wireless sensor networks. The proposed enhancement stores residual energy from each routing round in an "energy bank" to increase network lifetime. It also enhances the ACTIVE_ROUTE_TIMEOUT parameter in the underlying AODV routing protocol. Simulation results using MATLAB show the proposed approach improves network lifetime compared to previous methods. The document provides background on wireless sensor networks, routing protocols, LEACH clustering, and IB-LEACH before detailing the proposed enhancement and simulation results.
This document presents an introduction to a thesis that compares the performance of routing protocols in wireless sensor networks. It provides background on wireless sensor networks and discusses routing as an important issue. The introduction defines the problem, motivation, research questions, methodology, aims, assumptions, contributions, and organization of the thesis. It includes figures to illustrate typical wireless sensor network components, different network topologies, deployment densities, and a bar chart on simulation pause time.
5 продвинутых технологий VMware, которые нужно знатьSkillFactory
Константин Кряженков – ведущий инструктор онлайн-школы SkillFactory по виртуализации и облачным вычислениям – подготовил список из пяти самых перспективных технологий, которые нужно знать администратору ЦОД.
Network tomography to enhance the performance of software defined network mon...Sabidur Rahman
Monitoring and management of SDN is a challenging and active field of research. In this project, we have used Network Tomography techniques to enhance performance of SDN monitoring and management.
This document provides an overview and implementation details for IBM Tivoli Monitoring for Network Performance V2.1. It describes the product's architecture including components like the web application, monitor functions, communication methods, and database structure. It then discusses two implementation scenarios: a distributed servers environment and a pure z/OS environment. Finally, it covers steps for installing and configuring the web application on AIX and z/OS mainframes.
Network monitoring of processes in Linux, using Linux dynamic Kernel instrumentation (KProbes)
Monitoring network interactions of one process accessing the network is not always simple and it has some performance issues.
A Linux Kernel Module was developed, which uses dynamic instrumentation and monitors the target user process for interactions and registers the information to a repository.
When packets pass through the network interface the repository is queried to decide if the packet should be captured for further analysis.
To control this monitoring mechanism an interface was developed which can be modified through files in the virtual filesystem, DebugFS.
To use this monitoring mechanism it is necessary to have the Linux Kernel Module loaded and have a user process running that performs the network monitoring (such as TCPDump). This monitoring process can use this mechanism without changing its own source code.
Distributed Network Monitoring - Interopnet class by NetBeezNetBeez, Inc.
This course provides an overview of distributed network monitoring in modern network environments and describes its benefits and use cases. Referencing the network topology of InteropNet, we will discuss the goals of the installation, review the deployment locations of the NetBeez agents, and explain the configured monitoring tests. During the last part of the session, we will generate reports and analyze in detail the statistics of the performance data captured and processed by the system.
4 декабря 2015 года Алексей Семеняка, исполнительный директор Qrator Labs, выступил на конференции UAdom, посвященной развитию доменной политики Украины.
Из доклада вы узнаете, почему защищать веб-ресурсы становится все сложнее, а также какие средства и ресурсы лежат в основе «взрослого» бизнеса DDoS-атак.
[old] Network Performance Monitoring for DevOps and ITSite24x7
Take a look at our updated Network Monitoring presentation in the link given below:
https://www.slideshare.net/Site24x7/network-final
Get comprehensive performance insights by monitoring critical network devices such as routers, switches and firewalls with Site24x7.
About Site24x7:
Site24x7 offers unified cloud monitoring for DevOps and IT operations. Monitor the experience of real users accessing websites and applications from desktop and mobile devices. In-depth monitoring capabilities enable DevOps teams to monitor and troubleshoot applications, servers and network infrastructure including private and public clouds. End user experience monitoring is done from 50+ locations across the world and various wireless carriers. For more information on Site24x7, please visit http://www.site24x7.com/.
Forums: https://forums.site24x7.com/
Facebook: http://www.facebook.com/Site24x7
Twitter: http://twitter.com/site24x7
Google+: https://plus.google.com/+Site24x7
LinkedIn: https://www.linkedin.com/company/site...
View Blogs: http://blogs.site24x7.com/
The Changing Landscape in Network Performance Monitoring Savvius, Inc
Late in 2013 TRAC Research, a market research and analyst company that specializes in IT management, published research findings on key trends in the Network Performance Monitoring market. The research highlights some challenges, and well as some common misconceptions, with the state of Network Performance Monitoring solutions. Join us as we host Bojan Simic, Principal Analyst at TRAC Research, who will share his insights on these research findings as well as his perspectives on the changing landscape in the Network Performance Monitoring market.
This document provides guidance on optimizing the TCH call drop rate KPI in GSM networks. It defines the TCH call drop rate and recommends formulas for calculating it. It then discusses factors that can affect the TCH call drop rate, such as hardware failures, transmission problems, parameter settings, interference, coverage issues, and antenna problems. The document provides detailed steps for analyzing high TCH call drop rates, including checking hardware, transmissions, software versions, parameter settings, interference, coverage, antenna systems, uplink/downlink balance, and repeaters. It also includes several case studies and recommendations for optimization.
The document discusses network and application performance monitoring (N/APM) using Performance Vision. It provides an overview of Performance Vision's capabilities such as identifying application bottlenecks, troubleshooting HTTP application performance, and network performance monitoring. The presentation demonstrates how Performance Vision can be used to diagnose various issues like application failures, slow page loads, and login problems. It also highlights Performance Vision's non-intrusive deployment and fast troubleshooting abilities.
Project Business Case and Capital Justification for Implementation of Applica...Duane Bodle
Business Case and Capital Justification Presentation For
Application Performance Monitoring and Retrospective Network Analysis Implementation. *** This Presentation Has Been Sanitized of IP Information ***
This document discusses network monitoring and performance. It provides an overview of how network monitoring has evolved from early computer networks to today's sophisticated tools. It describes key aspects of network monitoring like functions, commonly used protocols like ICMP and SNMP, and popular open source monitoring tools. The document also discusses measuring network performance and how monitoring will be important for handling future networking demands like increased video traffic and more mobile users.
Обзор оборудования для построения сетей операторов связи.Cisco Russia
Данная сессия посвящена развитию модельного ряда оборудования, применяемого для построения высокоэффективных сегментов доступа и агрегации операторов фиксированной и мобильной связи, а также новому функционалу и возможностям оборудования. Информация, полученная в результате данной сессии, будет особенно полезна техническим специалистам отделов развития и эксплуатации сетей доступа и агрегации операторов связи, а также всем, кому интересна данная тематика.
This document presents a clustering approach using a handoff mechanism to enhance network lifetime in wireless sensor networks. It proposes using a mobile-based LEACH-ERE method for clustering and cluster head election to improve energy efficiency. The method considers both fixed and mobile nodes to increase network lifetime, packet delivery ratio, and energy usage effectiveness. It was found that the mobile-based LEACH-ERE approach increases network lifetime and packet delivery ratio compared to the static LEACH protocol, as it consumes less energy over time.
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET Journal
The document discusses an energy efficient and secure data aggregation protocol for wireless sensor networks called the Trusted Third Party (TTP) protocol. It aims to overcome Byzantine attacks, where compromised nodes inject false data. The key aspects are:
1) Sensor nodes are clustered, with each cluster having an aggregator node to collect and aggregate data from members.
2) When a malicious node tries to inject false data or steal real data, a trusted third party (TTP) detects this and changes the authentication IDs for that cluster quickly, confusing the malicious node.
3) The protocol has three phases - cluster formation, data transmission using a distance-based routing protocol to minimize energy, and using the TTP to provide
IRJET- Comparison of ATTEMPT and SIMPLE Protocols for Wireless Body Area Netw...IRJET Journal
This document compares the ATTEMPT and SIMPLE protocols for wireless body area networks (WBANs). ATTEMPT is an opportunistic protocol that relies on relay nodes when the sink node moves out of range, increasing power consumption and packet loss. SIMPLE aims to balance energy usage and improve throughput by selecting low-cost forwarder nodes to route data to the sink in a multi-hop fashion using TDMA scheduling. The document provides detailed descriptions of the initialization, routing, scheduling and data transmission phases of the ATTEMPT and SIMPLE protocols and discusses their advantages and disadvantages for energy efficiency in WBAN applications.
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...cscpconf
In this paper, we have taken out the concern of security on a Medium Access Control layer
implementing Assured Neighbor based Security Protocol to provide the authentication,
confidentiality and taking in consideration High speed transmission by providing security in
parallel manner in both Routing and Link Layer of Mobile Ad hoc Networks. We basically
divide the protocol into two different segments as the first portion concentrates, based on
Routing layer information; we implement the scheme for the detection and isolation of the
malicious nodes. The trust counter for each node is maintained which actively increased and
decreased considering the trust value for the packet forwarding. The threshold level is defined differencing the malicious and non malicious nodes. If the value of the node in trust counter lacks below the threshold value then the node is considered as malicious. The second part focus on providing the security in the link layer, the security is provided using CTR (Counter) approach for authentication and encryption. Hence simulating the results in NS-2, we come to conclude that the proposed protocol can attain high packet delivery over various intruders while attaining low delays and overheads.
Data aggregation and storage has become very important issue in Sensor
networks for future information retrieval. Storage nodes serve as an intermediate tier
between sensors and a sink for storing data and processing queries in wireless sensor
networks. The importance of storage nodes also makes them attractive to attackers. Data
Storage is happens via the Forwarding nodes and Storage nodes. Storage nodes are
introduced in this paper to store collected data from the sensors in their proximities, it
reduce the energy cost and communication cost induced by network query. Aim of the
project is to deploy the storage nodes and secure data transmission for cluster-based WSNs
(CWSNs), where the clusters are formed dynamically and periodically. We propose two
Secure and Efficient data Transmission (SET) protocols for CWSNs, called SET-IBS and
SET-IBOOS, by using the Identity-Based digital Signature (IBS) scheme and the Identity-
Based Online/Offline digital Signature (IBOOS) scheme, respectively. The cluster routing
protocol LEACH (Low-Energy Adaptive Clustering Hierarchy) is considered and
improved. We propose a clustering routing protocol named Enhanced LEACH, which
extend LEACH protocol for balancing the energy consumption in the network. The output
shows that the comparison of Leach and Enhanced leach protocol for improving the
network life time and power consumption of the network and also provides the safety and
security using those protocols.
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET Journal
This document proposes a chaotic encryption method combined with a clustered Low-Energy Adaptive Clustering Hierarchy (LEACH) algorithm to improve energy efficiency and security in wireless sensor networks. It discusses how LEACH clustering helps to reduce energy consumption through data aggregation at cluster heads. The proposed method uses chaotic maps for encryption to provide security. Simulation results show the combined approach increases network lifetime by reducing total energy consumption compared to traditional LEACH.
Faulty node recovery and replacement algorithm for wireless sensor networkprjpublications
This document describes a Fault Node Recovery and Replacement algorithm for wireless sensor networks that combines grade diffusion and genetic algorithms. It begins by explaining grade diffusion and genetic algorithms, as well as existing fault recovery techniques. It then introduces the Fault Node Recovery and Replacement algorithm, which uses grade diffusion to create routing tables and genetic algorithms to replace sensor nodes when they fail. The algorithm aims to reuse existing routing paths and replace fewer sensor nodes to extend the lifetime of the wireless sensor network while reducing replacement costs.
FAULTY NODE RECOVERY AND REPLACEMENT ALGORITHM FOR WIRELESS SENSOR NETWORKFprj_publication
This paper proposes an algorithm by combining grade diffusion and genetic algorithm
to enhance the lifetime of a wireless sensor network. The algorithm is named as Fault Node
Recovery and Replacement algorithm. The algorithm enhances the lifetime of the wireless
sensor network with fewer replacements of sensor nodes. In the simulation it is shown that
the proposed algorithm increases the number of active node, reduces the rate of data loss,
increases the life time of the wireless sensor network and reduces the rate of energy
consumption.
This document analyzes the performance of a three hop reliability model for wireless sensor networks in nuclear power plants. Reliability is crucial for sensor data in nuclear plants since time-critical safety information must be delivered accurately and without loss. Existing single and two hop models have packet loss issues. The proposed three hop model maintains three copies of data packets to increase reliability without extra network costs. It uses zone routing and increments a step value with each hop to ensure three copies are held before removing the original. Simulation results show this three hop acknowledgment model has higher delivery ratio and throughput while avoiding packet loss compared to earlier approaches.
Energy efficient neighbour selection for flat wireless sensor networkscsandit
In this paper we have analyzed energy efficient neighbour selection algorithms for routing in
wireless sensor networks. Since energy saving or consumption is an important aspect of
wireless sensor networks, its precise usage is highly desirable both for the faithful performance
of network and to increase the network life time. For this work, we have considered a flat
network topology where every node has the same responsibility and capability. We have
compared two energy efficient algorithms and analyzed their performances with increase in
number of nodes, time rounds and node failures.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkAM Publications
This paper gives performance of LEACH protocol. LEACH is the first network protocol that uses hierarchical
routing for wireless sensor networks to increase the life time of network. All the nodes in a network organize themselves into
local clusters, with one node acting as the cluster-head. All non-cluster-head nodes transmit their data to the cluster-head,
while the cluster-head node receive data from all the cluster members, perform signal processing functions on the data (e.g.,
data aggregation), and transmit data to the remote base station. Therefore, being a cluster-head node is much more energyintensive
than being a non-cluster-head node. Thus, when a cluster-head node dies all the nodes that belong to the cluster lose
communication ability. This paper gives performance of LEACH protocol considering parameters i) Packet Delivery Ratio ii)
Throughput iii) Delay iv) lifetime.
IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wi...IRJET Journal
This document analyzes and compares several hierarchical routing protocols for virtual wireless sensor networks (VWSNs). It first provides background on VWSNs and how virtualization allows a single physical sensor network to serve multiple applications simultaneously. It then reviews several common cluster-based routing protocols for wireless sensor networks, including LEACH, ModLEACH, SEP, and ZSEP. Through simulation and analysis of network lifetime, load balancing, energy consumption, and packets received, the document aims to provide insights on how well different routing protocols can be utilized for VWSNs under various conditions.
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...IRJET Journal
This document analyzes and compares the performance of different routing protocols in wireless sensor networks. It first discusses existing routing protocols like LEACH, LEACH-C, and PEGASIS and their limitations. It then proposes a new Static Clustering Based Multi-hop Routing (SCMR) algorithm where clusters are formed statically before network deployment and do not change. The SCMR algorithm is simulated and analysis shows it has lower energy consumption, longer network lifetime, and higher packet delivery ratio compared to LEACH.
This document compares and contrasts several common cluster-based routing algorithms for wireless sensor networks, including LEACH, TEEN, APTEEN, HEED, and PEGASIS. It discusses the advantages and disadvantages of each algorithm, with a focus on their approaches to energy efficiency. LEACH randomly selects cluster heads and uses TDMA, but assumes equal energy levels and that all nodes can reach the base station. TEEN and APTEEN add thresholds to improve energy efficiency for time-critical applications. HEED selects cluster heads based on both residual energy and node degree to balance energy use. The document provides an overview of the key clustering algorithms and issues to consider when choosing an approach.
Data gathering in wireless sensor networks using intermediate nodesIJCNCJournal
Energy consumption is an essential concern to Wireless Sensor Networks (WSNs).The major cause of the energy consumption in WSNs is due to the data aggregation. A data aggregation is a process of collecting data from sensor nodes and transmitting these data to the sink node or base station. An effective way to perform such a task is accomplished by using clustering. In clustering, nodes are grouped into clusters where a number of nodes, called cluster heads, are responsible for gathering data from other nodes, aggregate them and transmit them to the Base Station (BS).
In this paper we produce a new algorithm which focused on reducing the transmission bath between sensor nodes and cluster heads. A proper utilization and reserving of the available power resources is achieved with this technique compared to the well-known LEACH_C algorithm.
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...IOSR Journals
The broad significance of Wireless Sensor Networks is in most emergency and disaster rescue
domain. The routing process is the main challenges in the wireless sensor network due to lack of physical links.
The objective of routing is to find optimum path which is used to transferring packets from source node to
destination node. Routing should generate feasible routes between nodes and send traffic along the selected path
and also achieve high performance. This paper presents a nearest adjacent node scheme based on shortest path
routing algorithm. It is plays an important role in energy conservation. It finds the best location of nearest
adjacent nodes by involving the least number of nodes in transmission of data and set large number of nodes to
sleep in idle mode. Based on simulation result we shows the significant improvement in energy saving and
enhance the life of the network
Comparison of energy efficient data transmission approaches for flat wireless...ijassn
In this paper we have analyzed energy efficient neighbour selection algorithms for routing in wireless
sensor networks. Since energy saving or consumption is an important aspect of wireless sensor networks,
its precise usage is highly desirable both for the faithful performance of network and to increase the
network life time. For this work, we have considered a flat network topology where every node has the
same responsibility and capability. We have compared two energy efficient algorithms and analyzed their
performances when all sensor nodes in a network have either homogeneous or heterogeneous energy with
increase in number of nodes, time rounds and node failures.
COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...ijassn
The document compares two energy efficient routing approaches - highest energy (HE) and minimum energy consumption route (MECRT) - for flat wireless sensor networks. Through simulations, it finds that in homogeneous networks, MECRT outperforms HE in terms of energy consumption and network lifetime. However, in heterogeneous networks, HE performs better than MECRT for medium sized networks. Overall, the document analyzes and compares the performance of these two energy efficient routing techniques for both homogeneous and heterogeneous wireless sensor networks of varying sizes.
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...IRJET Journal
This document proposes an algorithm to improve energy efficiency and privacy preservation for the sink node in wireless sensor networks. The algorithm uses node clustering, where sensor nodes are grouped into clusters with a cluster head node. Data is routed from cluster members to their cluster head, and then from cluster heads to the sink node. The algorithm elects a subset of cluster heads to broadcast data, obscuring the location of the sink node and distributing energy usage across nodes. Simulations analyze how effectively this approach preserves sink node anonymity while limiting energy depletion across varying network conditions.
Similar to Enhancement of Routing Performance for Energy Efficiency and Critical Event Monitoring in Wireless Sensor Network (20)
An Examination of Effectuation Dimension as Financing Practice of Small and M...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Does Goods and Services Tax (GST) Leads to Indian Economic Development?iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Childhood Factors that influence success in later lifeiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Customer’s Acceptance of Internet Banking in Dubaiiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Consumer Perspectives on Brand Preference: A Choice Based Model Approachiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Student`S Approach towards Social Network Sitesiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Broadcast Management in Nigeria: The systems approach as an imperativeiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Study on Retailer’s Perception on Soya Products with Special Reference to T...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladeshiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...iosrjce
1. The document describes a study that designed a balanced scorecard for a nonprofit organization called Yayasan Pembinaan dan Kesembuhan Batin (YPKB) in Malang, Indonesia.
2. The balanced scorecard translated YPKB's vision and mission into strategic objectives across four perspectives: financial, customer, internal processes, and learning and growth.
3. Key strategic objectives included donation growth, budget effectiveness, customer satisfaction, reputation, service quality, innovation, and employee development. Customers perspective had the highest weighting, suggesting a focus on public service over financial growth.
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Media Innovations and its Impact on Brand awareness & Considerationiosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Customer experience in supermarkets and hypermarkets – A comparative studyiosrjce
- The document examines customer experience in supermarkets and hypermarkets in India through a survey of 418 customers.
- It finds that in supermarkets, previous experience, atmosphere, price, social environment and experience in other channels most influence customer experience, while in hypermarkets, previous experience, product assortment, social environment and experience in other channels are most influential.
- The study provides insights for retailers on key determinants of customer experience in each format to help them improve strategies and competitive positioning.
Social Media and Small Businesses: A Combinational Strategic Approach under t...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Implementation of Quality Management principles at Zimbabwe Open University (...iosrjce
This document discusses the implementation of quality management principles at Zimbabwe Open University's Matabeleland North Regional Centre. It begins with background information on ZOU and the importance of quality management in open and distance learning institutions. The study aimed to determine if quality management and its principles were being implemented at the regional centre. Key findings included that the centre prioritized customer focus and staff involvement. Decisions were made based on data analysis. The regional centre implemented a quality system informed by its policy documents. The document recommends ensuring staffing levels match needs and providing sufficient resources to the regional centre.
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...iosrjce
IOSR Journal of Business and Management (IOSR-JBM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Generative AI Use cases applications solutions and implementation.pdfmahaffeycheryld
Generative AI solutions encompass a range of capabilities from content creation to complex problem-solving across industries. Implementing generative AI involves identifying specific business needs, developing tailored AI models using techniques like GANs and VAEs, and integrating these models into existing workflows. Data quality and continuous model refinement are crucial for effective implementation. Businesses must also consider ethical implications and ensure transparency in AI decision-making. Generative AI's implementation aims to enhance efficiency, creativity, and innovation by leveraging autonomous generation and sophisticated learning algorithms to meet diverse business challenges.
https://www.leewayhertz.com/generative-ai-use-cases-and-applications/
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Blood finder application project report (1).pdfKamal Acharya
Blood Finder is an emergency time app where a user can search for the blood banks as
well as the registered blood donors around Mumbai. This application also provide an
opportunity for the user of this application to become a registered donor for this user have
to enroll for the donor request from the application itself. If the admin wish to make user
a registered donor, with some of the formalities with the organization it can be done.
Specialization of this application is that the user will not have to register on sign-in for
searching the blood banks and blood donors it can be just done by installing the
application to the mobile.
The purpose of making this application is to save the user’s time for searching blood of
needed blood group during the time of the emergency.
This is an android application developed in Java and XML with the connectivity of
SQLite database. This application will provide most of basic functionality required for an
emergency time application. All the details of Blood banks and Blood donors are stored
in the database i.e. SQLite.
This application allowed the user to get all the information regarding blood banks and
blood donors such as Name, Number, Address, Blood Group, rather than searching it on
the different websites and wasting the precious time. This application is effective and
user friendly.
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Transcat
Join us for this solutions-based webinar on the tools and techniques for commissioning and maintaining PV Systems. In this session, we'll review the process of building and maintaining a solar array, starting with installation and commissioning, then reviewing operations and maintenance of the system. This course will review insulation resistance testing, I-V curve testing, earth-bond continuity, ground resistance testing, performance tests, visual inspections, ground and arc fault testing procedures, and power quality analysis.
Fluke Solar Application Specialist Will White is presenting on this engaging topic:
Will has worked in the renewable energy industry since 2005, first as an installer for a small east coast solar integrator before adding sales, design, and project management to his skillset. In 2022, Will joined Fluke as a solar application specialist, where he supports their renewable energy testing equipment like IV-curve tracers, electrical meters, and thermal imaging cameras. Experienced in wind power, solar thermal, energy storage, and all scales of PV, Will has primarily focused on residential and small commercial systems. He is passionate about implementing high-quality, code-compliant installation techniques.
Open Channel Flow: fluid flow with a free surfaceIndrajeet sahu
Open Channel Flow: This topic focuses on fluid flow with a free surface, such as in rivers, canals, and drainage ditches. Key concepts include the classification of flow types (steady vs. unsteady, uniform vs. non-uniform), hydraulic radius, flow resistance, Manning's equation, critical flow conditions, and energy and momentum principles. It also covers flow measurement techniques, gradually varied flow analysis, and the design of open channels. Understanding these principles is vital for effective water resource management and engineering applications.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Enhancement of Routing Performance for Energy Efficiency and Critical Event Monitoring in Wireless Sensor Network
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 3, Ver. V (May – Jun. 2015), PP 87-94
www.iosrjournals.org
DOI: 10.9790/0661-17358794 www.iosrjournals.org 87 | Page
Enhancement of Routing Performance for Energy Efficiency and
Critical Event Monitoring in Wireless Sensor Network
Mr. Aniket D. Kharat1
, Dr. U. L. Bombale 2
1
M. Tech-II Electronics Technology, 2
Associate Professor/ET,
Department of Technology, Shivaji University, Kolhapur, India
Abstract: In Wireless Sensor Network, because of limitation on sensor node energy, the energy efficiency is a
major concern which should be deliberated while planning to design a protocol. To overcome this conflict, data
grouping and accumulation should be done in this issue to decrease consumption of sensor node energy and
cost of communication by aggregating data redundancy at intermediate sensor nodes to reduce number and size
of alarming messages in critical event monitoring. The network for design is Ad-Hoc network. In this paper we
proposed an improved algorithm Improved-Data Routing for In-Network Aggregation Data (I-DRINA) whose
results are compared with existing known protocols as Data Routing for In-Network Aggregation (DRINA) and
Low Energy Adaptive Clustering Hierarchy (LEACH). The proposed protocol has designed for improvement in
path routing in network and stables the energy consumption in the wireless network to prolong the existence of
network for monitoring of an event. The simulation of this project work has been done on NS2 platform for
WSNs. The simulation results of proposed I-DRINA algorithm gives better improvement in results than the
results of existing DRINA and LEACH algorithms for various performance parameters and different nodal
scenarios in WSN.
Keywords: Broadcasting delay, Critical event monitoring, Energy efficiency, Wireless sensor network.
I. INTRODUCTION
Wireless Sensor Network (WSN) consisting of the spatially distribution of independent sensor nodes
that co-operatively senses the physical conditions such as temperature, pressure, sound, level etc. and sends the
effective data towards the distant site through the wireless network. The WSN consists of a large number of
sensor nodes which are mostly battery powered or solar powered. Hence saving of energy for these nodes is a
significant issue in WSN. As the sensor nodes in network must have to work for a long time without recharging
or changing the batteries [1][2]. Hence the improvement in energy efficient algorithm is very much required in
WSN.
Also in WSN, many times a small message packets are required to broadcast as they are only to inform
the remote server regarding the environmental situations. Such environmental situations called as the critical
events. Hence while handling the critical event situations, the end to end delay required to transmit the alarming
message is less enough in the WSN to wake-up network. As the broadcasting delay occurs due to sleep
scheduling because of the sensing or relay node have to wait till the receiver nodes are active and ready to receive
that message. Therefore broadcasting delay is also important parameter while designing the protocols for the
WSN. This overall information is routed in the network in multipath manner towards the sink node. Hence data
gathering at specific nodes also gives effective way to reduce broadcasting delay in the network [3][4].
To improve performance of network by considering the energy efficiency and broadcasting delay, it is
necessary to improve the routing algorithms in WSN which is a challenging task. The routing performance will
be enhanced with improvement in the AODV algorithm. Therefore in this project work, we have proposed the
innovative approach Improved-Data Routing In Network Aggregation (I-DRINA). In this algorithm,
improvement in routing algorithm to that of existing algorithm Data Routing In Network Aggregation (DRINA).
This paper gives the comparative study of simulation results of existing algorithms as Low Energy Adaptive
Clustering Hierarchy (LEACH), (DRINA) and proposed algorithm (I-DRINA) [1][2][8].
II. COMPARATIVE STUDY OF PROTOCOLS
In this section, we will see the overview of existing algorithms for clustering, scheduling and data
aggregation which aims for energy efficiency and least broadcasting delay:
2.1 Low Energy Adaptive Clustering Hierarchy (LEACH)
In WSNs, LEACH plays an important role to form clusters for given nodes in the network. LEACH is an
AdHoc based routing protocol. In this algorithm, the clusters are formed based on the percentage of cluster heads
in the given WSNs. The LEACH protocol is divided in to two phases such as Cluster Formation and Data
Routing [3].
2. Enhancement of Routing Performance for Energy Efficiency and Critical Event Monitoring in WSN
DOI: 10.9790/0661-17358794 www.iosrjournals.org 88 | Page
2.1.1 Cluster Formation
In this phase, the clusters are formed with following equation:
(1)
The cluster and cluster head is formed based on the rounds. In this one of node in the network is picks
up a random value between 0 to 1. This value is compared with the threshold value T(n) for equation (1). If the
randomly selected value is less than that of the threshold value T(n), then that node is selected as a cluster head
in the respective round.
For the equation (1), ‘n’ denotes the present node. ‘P’ denotes the required percentage of cluster head
in the network. ‘r’ denotes the present round for selection of cluster head. ‘G’ denotes the nodes which are not
selected as a cluster head in (1/p) of previous rounds [1][2][3].
2.1.2 Data Routing
After the formation of clusters and selection of cluster heads in the above phase, the actual data transferred
through the network. In this, if one or multiple nodes in the network detect a critical event, then that node must
have to send that data to the cluster head as early as possible to the cluster head situated at remote place to
wake-up overall network. The data is transferred in two phases as uplink and downlink [5][6].
2.1.2.1 Uplink
In this Phase, after detecting a critical event in the network; that node sends an alarming message to the cluster
head and cluster head to remote server for further processing in the network in multi hop fashion.
2.1.2.2 Downlink
After getting the alarming message by cluster head to wake-up overall network, the cluster head broadcasts the
alarming message to the entire network quickly [7].
2.2 Data Routing In Network Aggregation (DRINA)
The main aim of DRINA algorithm is to improve routing performance in the network by implementing a routing
tree with shortest paths which connects overall sensor nodes to the server nodes or cluster head nodes in the
network. Also the data has been aggregated in this protocol to reduce the redundancy of data [8]-[12].
The DRINA protocol divides the nodes in to following four types.
Collaborator: A node which identifies an event and collectively sends data to the coordinator.
Coordinator: A node which also identifies an event. That node collects data sent by collaborator nodes and
sends to sink node.
Sink: A node which accepts data from the collaborators and coordinator nodes.
Relay: Nodes which are intermediate between the routing paths and forwards data to the sink node.
This protocol has distributed into three phases 1.Hop tree Formation 2. Cluster Formation and Leader Election
3.Establishment of Route and Hop Tree Update.
2.2.1 Hop Tree Formation
In this phase, the routing distance has been calculated in the form of hops by sending HCM (Hop
Configuration Message) message starting from sink node to overall network. The HCM message has distributed
in two fields: ID and HopToTree. The ID field gives the information about identifier which is started from sink
node and HopToTree contains the shortest routing distance of each node from the sink node shown in Fig. 1.
The HopToTree field started by 1 at sink node and overall nodes in the network set the HopToTree field to
infinity. After receiving the HCM message by node in the network; it checks the value of HopToTree in the
HCM message with the HopToTree value in the nodes which is stored previously. If the value is less, then that
node updates the value of NextHop variable with values in the ID and HopToTree Fields. If HCM message
again received by the same node, then that message is discarded by the same node as it has already acquired the
shortest distance from sink node [8]-[12].
3. Enhancement of Routing Performance for Energy Efficiency and Critical Event Monitoring in WSN
DOI: 10.9790/0661-17358794 www.iosrjournals.org 89 | Page
Fig. 1 Hop Tree Configuration
2.2.2 Cluster Formation and Leader Election
In this phase, if one or multiple nodes detect an event, this algorithm forms cluster of that event detected nodes.
If this event is detected first round, then the node will be selected as a coordinator or leader node which is
closest to that of sink node shown in Fig. 2. Otherwise the coordinator node is close to the already established
routing path. If in case of tie that is two or more number of nodes are at the same distance from the sink node
then coordinator node will be that node which has minimum ID in HCM. The coordinator further collects the
information and sends towards the sink node with minimum hop distance [8]-[12].
Fig. 2 Cluster Formation and Leader Election
2.2.3 Establishment of Route and Hop Tree Update
In this phase, the route is established between the coordinator nodes and sink node with the help of
Route Establishment Message (REM). The coordinator nodes firstly send REM to the NextHop neighboring
nodes. As the NextHop nodes get the REM message, it further retransmits to the NexHop nodes to those nodes
with route table update process in the network. In this way, the Hop Updating process continues to the sink node
gets the REM message or a relay node which is the part of previously established tree path towards sink node.
This routing path is determined on the best suitable shortest route at each hop [8]-[12].
The Fig. 3 shows shortest possible path towards the sink node. If the event detected in the network
firstly, then the path is established with shortest distance with broadcasting HCM message as shown in Fig. 4.
The events detected afterwards at any nodes or clusters, they will firstly find the pre-established path as shown
in Fig. 5. This method gives the aggregation of the data in the network.
4. Enhancement of Routing Performance for Energy Efficiency and Critical Event Monitoring in WSN
DOI: 10.9790/0661-17358794 www.iosrjournals.org 90 | Page
Fig. 3 Establishment of Route
Fig. 4 Hop Tree Updatation
Fig. 5 Establishment of Route and Hop Tree Update
5. Enhancement of Routing Performance for Energy Efficiency and Critical Event Monitoring in WSN
DOI: 10.9790/0661-17358794 www.iosrjournals.org 91 | Page
III. PROPOSED METHODOLOGY
In the section, the I-DRINA protocol is improved with routing performance by considering the energy.
Energy is most crucial parameter in WSNs as it has to utilize in effective manner. Hence in proposed protocol
work, we have implemented the energy conscious routing algorithm. This algorithm maintains stability in the
network traffic which is intermediate between the source to destination nodes.
Consider the nodes in fig. 6(a) are intermediate nodes in the path of source to destination and the path
A-B-C-D is a shortest path from source to the destination node. But in this route path, the relay nodes B and C
remains as intermediate nodes. Therefore those nodes may blows down after some time due remaining energy at
those nodes. Therefore the proposed protocol works well at this situation by routing the path through neighbor
nodes by comparing the remaining energy of those nodes. In Fig. 6(b), the path is routed via node E and F
substituting to node B with route from source to A-E-F-C-D to destination. In Fig. 6(c), path is redirected via
nodes E-F-G substituting node C with route A-E-F-G-D to destination node. This path routing is done by
comparing the remaining energy of present relay nodes and the neighboring nodes which overhear the REM
message while route establishment phase.
Hence, the proposed protocol I-DRINA which is improvement to that of DRINA, gives the energy
efficient environment in WSNs in which the intermediate relay nodes are protected from getting blows down
due to energy remaining at those nodes. Also due to this sometime the routing may minimizes the broadcasting
delay in the network.
Fig. 6 Establishment of Energy Concious Route and Updatation of Hop Table
IV. PERFORMANCE EVALUATION
In this section, the results of proposed protocol I-DRINA has compared with the existing protocols as
LEACH and DRINA which are related to that of routing protocols in the network. The comparative study of
results with following performance parameters:
Average Energy Consumption
End to End Transmission Delay
Average Throughput
Normalized Routing Load
Packet Delivery Ratio
4.1 Simulation Environment
In this project work, we have performed the experiments for the simulation results on Network
Simulator-2 which is simulation software for WSNs. The simulation has done for different nodal configuration
6. Enhancement of Routing Performance for Energy Efficiency and Critical Event Monitoring in WSN
DOI: 10.9790/0661-17358794 www.iosrjournals.org 92 | Page
with area of 1000X1000 sq. meters. Assumption is that nodes have not mobility in the network. The simulation
model parameters required to perform experiment given in table 1.
Table: 1 Simulation Parameters
Simulation Parameters
Parameters Values
Simulation tool NS-2
Propagation Two Ray Ground
Channel used Wireless
Initial energy 100 Joules for each node
Network area 1000m X 1000m
Number of nodes 100,150,200,250,300
Number of clusters 2
Antenna type Omni-Directional
Routing MAC protocol AODV
Data packet length in queue 50
4.2 Simulation Result Analysis
In this experimental work for given protocols, the network has implemented on different scenario with 100, 150,
200, 250, 300. The analysis of result with different performance parameters are as follows:
4.2.1 Average Energy Consumption
In WSNs, sensor nodes mostly battery powered. So energy consumption must have to put as minimum as
possible. The main sources of consumption of energy in WSNs are sensing, routing or communicating and
computational work.
Fig. 7 Average Enegy Consumption
Results in Fig. 7 shows that the Average Energy Consumed by proposed I-DRINA protocol is minimized
compared to that of existing protocols.
4.2.2 End to End Transmission Delay
End to End Delay is the time required to transmit message packet from source node to destination node
successfully. It may contains all probable types of delays as queuing in the transmission path, buffering at
routers, acknowledgement delay, packet retransmission in case of packet failure, time for message coding.
Fig. 8 shows that the end to end delay in the proposed protocol I-DRINA is less than that of two known
protocols as LEACH and DRINA.
4.2.3 Average Throughput
Average Throughput is ratio of difference between number of data packets received at destination node
and number of data packets lost in between to the total time required from first data packet to last data packet.
The unit of throughput is bits/sec. Throughput in the network plays an important role as it is totally related to the
7. Enhancement of Routing Performance for Energy Efficiency and Critical Event Monitoring in WSN
DOI: 10.9790/0661-17358794 www.iosrjournals.org 93 | Page
data packet loss and broadcasting delay in WSNs. In Fig. 9, the average throughput of I-DRINA is improved
compared to LEACH and DRINA effectively. The performance is incresed due to improvement in the routing
for the I-DRNA over the DRINA.
Fig. 8 Average End to end Delay
Fig. 9 Average Throughput
4.2.4 Normalized Routing Load
Routing Load is the ratio of number of routing packets to the number of data packets. The routing load
determines the network effectiveness. As the network must have minimum routing packets and maximun
number of data packets.
Fig. 10 Normalized Routing Load
Fig. 10 gives the copararison of result in which gives the idea about I-DRINA improved the routing load by
minimizing the routing packets in the network with effectively increase in number of data packets.
8. Enhancement of Routing Performance for Energy Efficiency and Critical Event Monitoring in WSN
DOI: 10.9790/0661-17358794 www.iosrjournals.org 94 | Page
4.2.5 Packet Delivery Ratio
It is a ratio of number of received packets by destination nodes effectively to the number of packet
generated by the source node. This ratio must be high enough that is signifies the network performance affecting
due to packet loss in WSNs. The Packet Delivery Ratio is measured in the percentage form.
Fig. 11 Packet Delivery Ratio
In Fig. 11, proposed I-DRINA protocol gives the improvement in the Packet Delivery over the existing protocol.
V. CONCLUSION
In this project work, we have improved the routing performance of the proposed protocol I-DRINA.
The improvement has done by considering the energy efficiency with data aggregation in event monitoring in
WSNs. The dynamic routing in the network gives the better results to the network. The proposed protocol has
compared with energy consumption, broadcasting delay, throughput, routing load and packet delivery type of
performance parameters of the network. For these simulation results considering as a reference, the proposed
protocol I-DRINA protocol gives improvement in the overall performance parameters over existing LEACH and
DRINA protocols.
References
[1]. Peng Guo, Tao Jiang, Senior Member, IEEE, Qian Zhang, Fellow, IEEE, and Kui Zhang, Sleep Scheduling for Critical Event
Monitoring in Wireless Sensor Networks, IEEE Transactions On Parallel And Distributed Systems, Vol. 23, No. 2, February 2012
[2]. Dali Wei, Member, IEEE, et. al., An Energy-Efficient Clustering Solution for Wireless Sensor Networks, IEEE Transactions on
Wireless Communications, Vol. 10, No. 11, November 2011
[3]. Yanwei Wu, Member, IEEE, Xiang-Yang Li, Senior Member, IEEE, YunHao Liu, Senior Member, IEEE, and Wei Lou, Energy-
Efficient Wake-Up Scheduling for Data Collection and Aggregation, IEEE Transactions On Parallel And Distributed Systems, Vol.
21, No. 2, February 2010
[4]. AbtinKeshavarzian, Huang Lee, LaxmiVenkatraman, Wake up scheduling in wireless sensor networks, Proc. seventh ACM Int'l
Conf.Mobile Ad Hoc Networking and Computing, (pp. 322-333).2006
[5]. N. Bouabdallah, M.E. Rivero-Angeles, and B. Sericola, Continuous Monitoring Using Event-Driven Reporting for Cluster-Based
Wireless Sensor Networks,” IEEE Trans. Vehicular Technology, vol. 58, no. 7, pp. 3460-3479, Sept. 2009.
[6]. Bo Jiang, Student Member, IEEE, Binoy Ravindran, Senior Member, IEEE, and Hyeonjoong Cho, Member, IEEE: Probability-
Based Prediction and Sleep Scheduling for Energy-Efficient Target Tracking in Sensor Networks, IEEE Transactions on Mobile
Computing, Vol. 12, No. 4, April 2013
[7]. Hongbo Jiang, Member et. al., Prediction or Not? An Energy-Efficient Framework for Clustering-Based Data Collection in Wireless
Sensor Networks, IEEE Transactions On Parallel And Distributed Systems, Vol. 22, No. 6, June 2011
[8]. Leandro Aparecido Villas et. al., DRINA: A Lightweight and Reliable Routing Approach for In-Network Aggregation in Wireless
Sensor Networks, IEEE Transaction on computers, vol. 62, No. 4, 676-689, April 2013
[9]. E. Fasolo, M. Rossi, J. Widmer, and M. Zorzi, In-network Aggregation Techniques for Wireless Sensor Networks: A Survey, IEEE
Wireless Comm., vol. 14, no. 2, pp. 70-87, Apr. 2007
[10]. B. Krishnamachari, D. Estrin, and S.B. Wicker, The Impact of Data Aggregation in Wireless Sensor Networks, Proc. 22nd Int’l
Conf. Distributed Computing Systems (ICDCSW ’02), pp. 575-578, 2002
[11]. S. Madden, M.J. Franklin, J.M. Hellerstein, and W. Hong, Tag: A Tiny Aggregation Service for Ad-Hoc Sensor Networks, ACM
SIGOPS Operating Systems Rev., vol. 36, no. SI, pp. 131-146, 2002
[12]. A.P. Chandrakasan, A.C. Smith, and W.B. Heinzelman, An Application-Specific Protocol Architecture for Wireless Micro sensor
Networks, IEEE Trans. Wireless Comm., vol. 1, no. 4, pp. 660- 670, Oct. 2002.