The document describes a new biological routing protocol called Biological Tunnel Routing Protocol (BioTROP) for Tunnel Wireless Sensor Networks (TWSN). BioTROP uses concepts from ant colony behavior and optimal forwarding calculations to determine the best next hop neighbor for packet transmission. It was tested on a 7 node TelosB sensor network in a tunnel, where over 70% of transmitted data packets were successfully delivered to the base station. BioTROP employs a cross-layer design between the physical and network layers to select next hops based on metrics like signal strength, link quality, and remaining power from the physical layer. It consists of routing management and neighborhood management modules to determine optimal routes and maintain neighbor tables.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Advanced delay reduction algorithm based on GPS with Load Balancingijdpsjournal
A Mobile Ad-Hoc Network (MANET) is a self-configuring network of mobile nodes connected by wireless
links, to form an arbitrary topology. The nodes are free to move arbitrarily in the topology. Thus, the
network's wireless topology may be random and may change quickly. An ad Hoc network is formed by
sensor networks consisting of sensing, data processing, and communication components. There is frequent
occurrence of congested links in such a network as wireless links inherently have significantly lower
capacity than hardwired links and are therefore more prone to congestion. Here we proposed a algorithm
which involves the reduction in the delay with the help of Request_set created on the basis of the location
information of the destination node. Across the paths found in the Route_reply (RREP) packets the load is
equally distributed
BER ANALYSIS FOR DOWNLINK MIMO-NOMA SYSTEMS OVER RAYLEIGH FADING CHANNELSIJCNCJournal
The Multiple-input multiple-output (MIMO) technique combined with non-orthogonal multiple access (NOMA) has been considered to enhance total system performance. This paper studies the bit error rate of two-user power-domain NOMA systems using successive interference cancellation receivers, with zeroforcing equalization over quasi-static Rayleigh fading channels. Successive interference cancellation technique at NOMA receivers has been the popular research topic due to its simple implementation, despite its vulnerability to error propagation. Closed-form expressions are derived for downlink NOMA in single-input single-output and uncorrelated quasi-static MIMO Rayleigh fading channel. Analytical results are consolidated with Monte Carlo simulation.
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...IJNSA Journal
With the rapid growth of wireless communication infras,,tructure over the recent few years, new
challenges has been posed on the system and analysis on wireless adhoc networking. Implementation of
MIMO communication in such type of network is enhancing the packet transmission capabilities. There
are different techniques for cooperative transmission and broadcasting packet in MIMO equipped
Mobile Adhoc Network. We have employed a model network in the OPNET environment and propose a
new scheduling algorithm based on investigating the different broadcasting algorithm. The new
broadcasting algorithm improves the packet transmission rate of the network based on energy
performance of the network and minimizes the BER for different transmission mode which is illustrated
in this paper. The simulations are done in MATLAB and OPNET environment and the simulated result
for the packet transmission rate are collected and shown in the tabular form. Also simulate the network
for generating a comparative statement for each mobile node. And performance analysis is also done for
the model network. The main focus is to minimize BER and improve information efficiency of the
network.
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...IJCERT
IJCERT Standard on-line Journal
ISSN(Online):2349-7084,(An ISO 9001:2008 Certified Journal)
iso nicir csir
http://www.ijcert.org offers Discount for Indian research Scholars
IJCERT (ISSN 2349–7084 (Online)) is approved by National Science Library (NSL), National Institute of Science Communication And Information Resources (NISCAIR), Council of Scientific and Industrial Research, New Delhi, India.
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACEScscpconf
Opportunistic networks are usually formed spontaneously by mobile devices equipped with
short range wireless communication interfaces. The idea is that an end-to-end connection may
never be present. Designing and implementing a routing protocol to support both service
discovery and delivery in such kinds of networks is a challenging problem on account of
frequent disconnections and topology changes. In these networks one of the most important
issues relies on the selection of the best intermediate node to forward the messages towards the
destination. This paper presents a mobile trace based routing protocol that uses the location
information of the nodes in the network. Using the trace information, next hop is selected to forward the packets to destination. Data forwarding is done via the selected nodes. The effectiveness is shown using simulation
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Advanced delay reduction algorithm based on GPS with Load Balancingijdpsjournal
A Mobile Ad-Hoc Network (MANET) is a self-configuring network of mobile nodes connected by wireless
links, to form an arbitrary topology. The nodes are free to move arbitrarily in the topology. Thus, the
network's wireless topology may be random and may change quickly. An ad Hoc network is formed by
sensor networks consisting of sensing, data processing, and communication components. There is frequent
occurrence of congested links in such a network as wireless links inherently have significantly lower
capacity than hardwired links and are therefore more prone to congestion. Here we proposed a algorithm
which involves the reduction in the delay with the help of Request_set created on the basis of the location
information of the destination node. Across the paths found in the Route_reply (RREP) packets the load is
equally distributed
BER ANALYSIS FOR DOWNLINK MIMO-NOMA SYSTEMS OVER RAYLEIGH FADING CHANNELSIJCNCJournal
The Multiple-input multiple-output (MIMO) technique combined with non-orthogonal multiple access (NOMA) has been considered to enhance total system performance. This paper studies the bit error rate of two-user power-domain NOMA systems using successive interference cancellation receivers, with zeroforcing equalization over quasi-static Rayleigh fading channels. Successive interference cancellation technique at NOMA receivers has been the popular research topic due to its simple implementation, despite its vulnerability to error propagation. Closed-form expressions are derived for downlink NOMA in single-input single-output and uncorrelated quasi-static MIMO Rayleigh fading channel. Analytical results are consolidated with Monte Carlo simulation.
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...IJNSA Journal
With the rapid growth of wireless communication infras,,tructure over the recent few years, new
challenges has been posed on the system and analysis on wireless adhoc networking. Implementation of
MIMO communication in such type of network is enhancing the packet transmission capabilities. There
are different techniques for cooperative transmission and broadcasting packet in MIMO equipped
Mobile Adhoc Network. We have employed a model network in the OPNET environment and propose a
new scheduling algorithm based on investigating the different broadcasting algorithm. The new
broadcasting algorithm improves the packet transmission rate of the network based on energy
performance of the network and minimizes the BER for different transmission mode which is illustrated
in this paper. The simulations are done in MATLAB and OPNET environment and the simulated result
for the packet transmission rate are collected and shown in the tabular form. Also simulate the network
for generating a comparative statement for each mobile node. And performance analysis is also done for
the model network. The main focus is to minimize BER and improve information efficiency of the
network.
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...IJCERT
IJCERT Standard on-line Journal
ISSN(Online):2349-7084,(An ISO 9001:2008 Certified Journal)
iso nicir csir
http://www.ijcert.org offers Discount for Indian research Scholars
IJCERT (ISSN 2349–7084 (Online)) is approved by National Science Library (NSL), National Institute of Science Communication And Information Resources (NISCAIR), Council of Scientific and Industrial Research, New Delhi, India.
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACEScscpconf
Opportunistic networks are usually formed spontaneously by mobile devices equipped with
short range wireless communication interfaces. The idea is that an end-to-end connection may
never be present. Designing and implementing a routing protocol to support both service
discovery and delivery in such kinds of networks is a challenging problem on account of
frequent disconnections and topology changes. In these networks one of the most important
issues relies on the selection of the best intermediate node to forward the messages towards the
destination. This paper presents a mobile trace based routing protocol that uses the location
information of the nodes in the network. Using the trace information, next hop is selected to forward the packets to destination. Data forwarding is done via the selected nodes. The effectiveness is shown using simulation
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3ijwmn
This paper presents the design procedure of the NS-3 script for WLAN that is organized according to the hierarchical manner of TCP/IP model. We configure all layers by using NS-3 model objects and set and modify the values used by objects to investigate the effects of MAC parameters (access mechanism, CWmin, CWmax and retry limit) on the performance metrics viz. packet delivery ratio, packet lost ratio, aggregated throughput, and average delay. The simulation results show that RTS/CTS access mechanism outperforms basic access mechanism in saturated state, whereas the MAC parameters have no significant impact on network performance in non-saturated state. A higher value of CWmin improves the aggregated throughput in expense of average delay. The tradeoff relationships among the performance metrics are also observed in results for the optimal values of MAC parameters. Our design procedure represents a good guideline for new NS-3 users to design and modify script and results greatly benefit the network design and management.
“Optimizing the data transmission between multiple nodes during link failure ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
A Mobile Ad Hoc Network (MANET) is created when an independent mobile node network is connected
dynamically via wireless links. MANET is a self-organizing network that does not rely on pre-existing
infrastructure such as wired or wireless network routers. Mobile nodes in this network move randomly,
thus, the topology is always changing. Routing protocols in MANET are critical in ensuring dependable
and consistent connectivity between the mobile nodes. They conclude logically based on the interaction
between mobile nodes in MANET routing and encourage them to choose the optimum path between source
and destination. Routing protocols are classified as proactive, reactive, or hybrid. The focus of this project
will be on Optimized Link State Routing (OLSR) protocol, a proactive routing technique. OLSR is known as
the optimized variant of link state routing in which packets are sent throughout the network using the
multipoint relay (MPR) mechanism. This article evaluates the performance of the OLSR routing protocol
under condition of changing mobility speed and network density. The study's performance indicators are
average packet throughput, packet delivery ratio (PDR), and average packet latency. Network Simulator 2
(NS-2) and an external patch UM-OLSR are used to simulate and evaluate the performance of such
protocol. As a result of research, the approach of implementing the MPR mechanism are able to minimise
redundant data transmission during the normal message broadcast. The MPRs enhance the link state
protocols’ traditional diffusion mechanism by selecting the right MPRs. Hence, the number of undesired
broadcasts can be reduced and limited. Further research will focus on different scenario and environment
using different mobility model
A fuzzy based congestion controller for control and balance congestion in gri...csandit
A Wireless Sensor Network (WSN) is deployed with a large number of sensors with limited
power supply in a wide geographically area. These sensors collect information depending on
application. The sensors transmit the data towards a base station called sink. Due to the
relatively high node density and source-to-sink communication pattern, congestion is a critical
issue in WSN. Congestion not only causes packet loss, but also leads to excessive energy
consumption as well as delay. To address this problem, in this paper we propose a new fuzzy
logic based mechanism to detect and control congestion in WSN. In the proposed approach, a
Monitor Node for each grid in congestion candidate region performs a fuzzy control to avoid
increasing congestion. Fuzzy controller’s inputs are continually fetched from the network by the
Monitor Node. Simulation results show that our approach has higher packet delivery ratio and
lower packet loss than existing approaches.
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...ijwmn
This paper conducts a detailed simulation study of stateless anycast routing in a mobile wireless ad hoc
network. The model covers all the fundamental aspects of such networks with a routing mechanism using
a scheme of orientation-dependent inter-node communication links. The simulation system Winsim is used
which explicitly represents parallelism of events and processes in the network. The purpose of these
simulations is to investigate the effect of node’s maximum speed, and different TTL over the network
performance under two different scenarios. Simulation study investigates five practically important
performance metrics of a wireless mobile ad hoc network and shows the dependence of this metrics on
the transmission radius, link availability, and maximal possible node speed
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONcscpconf
Mobile Ad-hoc network (MANET) is infrastructure less network in which nodes are mobile, self
reconfigurable, battery powered. As nodes in MANET are battery powered, energy saving is an
important issue. We are using routing protocol to save energy so as to extend network lifetime.
We have extended original Optimized Linked State Routing (OLSR) protocol by using two
algorithms and named it as Enhancement in OLSR using Residual Energy approach (EOLSRRE)
and Enhancement in OLSR using Energy Consumption approach (EOLSR-EC). To analyze
relative performance of modified protocol EOLSR-RE and EOLSR-EC over OLSR, we
performed various trials using Qualnet simulator. The performance of these routing protocols is
analyzed in terms of energy consumption, control overheads, end to end delay, packet delivery
ratio. The modified OLSR protocol improves energy efficiency of network by reducing 20 %
energy consumption and 50% control overheads.
A fuzzy congestion controller to detect and balance congestion in wsnijwmn
A Wireless Sensor Network (WSN) is collection of wireless sensors with limited memory, processing and energy supply. Based on application, sensors distribute in a wide geographically area in order to collect information and transmit the collected data packets toward a base station also called Sink. Due to the relatively high node density and source-to-sink communication pattern, congestion is a critical issue in WSN. Congestion not only causes packet loss, but also leads to excessive energy consumption as well as delay. To address this problem, in this paper we propose a new fuzzy logic based mechanism to detect and control congestion in each grid in WSN. In the proposed approach, sink select one node in each grid as Monitor Node. In addition, sink defines congestion candidate grids. Each Monitor Node in congestion candidate grids continually monitors the network and fetches the fuzzy controller inputs in order to determine level of congestion in each grid. Based on the congestion level, packets forward through the grid or relay nodes. Simulation results show that our approach has higher packet delivery ratio and lower packet loss than existing approaches.
Comparison of energy efficient data transmission approaches for flat wireless...ijassn
In this paper we have analyzed energy efficient neighbour selection algorithms for routing in wireless
sensor networks. Since energy saving or consumption is an important aspect of wireless sensor networks,
its precise usage is highly desirable both for the faithful performance of network and to increase the
network life time. For this work, we have considered a flat network topology where every node has the
same responsibility and capability. We have compared two energy efficient algorithms and analyzed their
performances when all sensor nodes in a network have either homogeneous or heterogeneous energy with
increase in number of nodes, time rounds and node failures.
Proposed mac protocol for reduce energy consumption over wsn networkeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Abstract In optical circuit switching the high values of blocking probability is resolved by dynamic wavelength routing algorithms with wavelength conversion. The aim of this paper is to study these algorithms. Then the algorithm is selected which gives good results with and without wavelength conversion. The selected algorithm is then checked for other parameters of networking namely throughput, packet delivery ratio, and delay. A comparative study is then carried out for increasing traffic. We try to prove that these algorithms satisfy the criteria of QoS parameters by this comparative study. The results of simulation show that the parameters follow the trend of blocking probability of the selected algorithm. Keywords: optical burst switching, throughput, packet delivery ratio, delay.
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...ijwmn
Wireless Sensor networks are a challenging task due to the lack of resources in the network as well as the frequent changes in network topology. Various routing protocols are designed basically to establish correct and efficient paths between source and destination. In the recent years, several routing protocols
have been proposed in literature and many of them studied through extensive simulation at different network characteristics. In this paper, we compare the performance of three most common routing protocols of wireless sensor networks i.e. AODV, DSDV and ZRP. These protocols have been simulated
using NS2 Package. This study investigates the routing protocols corresponding to packet delivery ratio, packet loss ratio, average throughput, dropped packets and end-to-end delay. Hence, evaluation and comparison between routing protocols is required because performance of any routing protocol can be changed with various parameters such as speed of nodes, pause times and number of nodes.
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...cscpconf
Wireless sensor network (WSN) is the collection of many micro-sensor nodes, connecting each other by a
wireless medium. WSN exhibits different approaches to provide reliable sensing of the environment,
detecting and reporting events. In this paper, we have proposed an algorithm for hierarchy based protocols
of wireless sensor networks, which consist of two groups of sensor nodes in a single cluster node. Each
cluster consists of a three cluster head. The event driven data sensing mechanism is used in this paper and
this sensed data is transmitted to the master section head. Hence efficient way of data transmission is possible with larger group of nodes. In this approach, using hierarchy based protocols; the lifetime of the sensor network is increased.
EMERGING WIRELESS TECHNOLOGIES IN THE INTERNET OF THINGS: A COMPARATIVE STUDYijwmn
The Internet of Things (IoT) incorporates multiple long-range, short-range, and personal area wireless
networks and technologies into the designs of IoT applications. This enables numerous business
opportunities in fields as diverse as e-health, smart cities, smart homes, among many others. This research
analyses some of the major evolving and enabling wireless technologies in the IoT. Particularly, it focuses
on ZigBee, 6LoWPAN, Bluetooth Low Energy, LoRa, and the different versions of Wi-Fi including the
recent IEEE 802.11ah protocol. The studies evaluate the capabilities and behaviours of these technologies
regarding various metrics including the data range and rate, network size, RF Channels and Bandwidth,
and power consumption. It is concluded that there is a need to develop a multifaceted technology approach
to enable interoperable and secure communications in the IoT.
EFFECTS OF MAC PARAMETERS ON THE PERFORMANCE OF IEEE 802.11 DCF IN NS-3ijwmn
This paper presents the design procedure of the NS-3 script for WLAN that is organized according to the hierarchical manner of TCP/IP model. We configure all layers by using NS-3 model objects and set and modify the values used by objects to investigate the effects of MAC parameters (access mechanism, CWmin, CWmax and retry limit) on the performance metrics viz. packet delivery ratio, packet lost ratio, aggregated throughput, and average delay. The simulation results show that RTS/CTS access mechanism outperforms basic access mechanism in saturated state, whereas the MAC parameters have no significant impact on network performance in non-saturated state. A higher value of CWmin improves the aggregated throughput in expense of average delay. The tradeoff relationships among the performance metrics are also observed in results for the optimal values of MAC parameters. Our design procedure represents a good guideline for new NS-3 users to design and modify script and results greatly benefit the network design and management.
“Optimizing the data transmission between multiple nodes during link failure ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
PERFORMANCE ANALYSIS OF OLSR PROTOCOL IN MANET CONSIDERING DIFFERENT MOBILITY...ijwmn
A Mobile Ad Hoc Network (MANET) is created when an independent mobile node network is connected
dynamically via wireless links. MANET is a self-organizing network that does not rely on pre-existing
infrastructure such as wired or wireless network routers. Mobile nodes in this network move randomly,
thus, the topology is always changing. Routing protocols in MANET are critical in ensuring dependable
and consistent connectivity between the mobile nodes. They conclude logically based on the interaction
between mobile nodes in MANET routing and encourage them to choose the optimum path between source
and destination. Routing protocols are classified as proactive, reactive, or hybrid. The focus of this project
will be on Optimized Link State Routing (OLSR) protocol, a proactive routing technique. OLSR is known as
the optimized variant of link state routing in which packets are sent throughout the network using the
multipoint relay (MPR) mechanism. This article evaluates the performance of the OLSR routing protocol
under condition of changing mobility speed and network density. The study's performance indicators are
average packet throughput, packet delivery ratio (PDR), and average packet latency. Network Simulator 2
(NS-2) and an external patch UM-OLSR are used to simulate and evaluate the performance of such
protocol. As a result of research, the approach of implementing the MPR mechanism are able to minimise
redundant data transmission during the normal message broadcast. The MPRs enhance the link state
protocols’ traditional diffusion mechanism by selecting the right MPRs. Hence, the number of undesired
broadcasts can be reduced and limited. Further research will focus on different scenario and environment
using different mobility model
A fuzzy based congestion controller for control and balance congestion in gri...csandit
A Wireless Sensor Network (WSN) is deployed with a large number of sensors with limited
power supply in a wide geographically area. These sensors collect information depending on
application. The sensors transmit the data towards a base station called sink. Due to the
relatively high node density and source-to-sink communication pattern, congestion is a critical
issue in WSN. Congestion not only causes packet loss, but also leads to excessive energy
consumption as well as delay. To address this problem, in this paper we propose a new fuzzy
logic based mechanism to detect and control congestion in WSN. In the proposed approach, a
Monitor Node for each grid in congestion candidate region performs a fuzzy control to avoid
increasing congestion. Fuzzy controller’s inputs are continually fetched from the network by the
Monitor Node. Simulation results show that our approach has higher packet delivery ratio and
lower packet loss than existing approaches.
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...ijwmn
This paper conducts a detailed simulation study of stateless anycast routing in a mobile wireless ad hoc
network. The model covers all the fundamental aspects of such networks with a routing mechanism using
a scheme of orientation-dependent inter-node communication links. The simulation system Winsim is used
which explicitly represents parallelism of events and processes in the network. The purpose of these
simulations is to investigate the effect of node’s maximum speed, and different TTL over the network
performance under two different scenarios. Simulation study investigates five practically important
performance metrics of a wireless mobile ad hoc network and shows the dependence of this metrics on
the transmission radius, link availability, and maximal possible node speed
ENHANCEMENT OF OPTIMIZED LINKED STATE ROUTING PROTOCOL FOR ENERGY CONSERVATIONcscpconf
Mobile Ad-hoc network (MANET) is infrastructure less network in which nodes are mobile, self
reconfigurable, battery powered. As nodes in MANET are battery powered, energy saving is an
important issue. We are using routing protocol to save energy so as to extend network lifetime.
We have extended original Optimized Linked State Routing (OLSR) protocol by using two
algorithms and named it as Enhancement in OLSR using Residual Energy approach (EOLSRRE)
and Enhancement in OLSR using Energy Consumption approach (EOLSR-EC). To analyze
relative performance of modified protocol EOLSR-RE and EOLSR-EC over OLSR, we
performed various trials using Qualnet simulator. The performance of these routing protocols is
analyzed in terms of energy consumption, control overheads, end to end delay, packet delivery
ratio. The modified OLSR protocol improves energy efficiency of network by reducing 20 %
energy consumption and 50% control overheads.
A fuzzy congestion controller to detect and balance congestion in wsnijwmn
A Wireless Sensor Network (WSN) is collection of wireless sensors with limited memory, processing and energy supply. Based on application, sensors distribute in a wide geographically area in order to collect information and transmit the collected data packets toward a base station also called Sink. Due to the relatively high node density and source-to-sink communication pattern, congestion is a critical issue in WSN. Congestion not only causes packet loss, but also leads to excessive energy consumption as well as delay. To address this problem, in this paper we propose a new fuzzy logic based mechanism to detect and control congestion in each grid in WSN. In the proposed approach, sink select one node in each grid as Monitor Node. In addition, sink defines congestion candidate grids. Each Monitor Node in congestion candidate grids continually monitors the network and fetches the fuzzy controller inputs in order to determine level of congestion in each grid. Based on the congestion level, packets forward through the grid or relay nodes. Simulation results show that our approach has higher packet delivery ratio and lower packet loss than existing approaches.
Comparison of energy efficient data transmission approaches for flat wireless...ijassn
In this paper we have analyzed energy efficient neighbour selection algorithms for routing in wireless
sensor networks. Since energy saving or consumption is an important aspect of wireless sensor networks,
its precise usage is highly desirable both for the faithful performance of network and to increase the
network life time. For this work, we have considered a flat network topology where every node has the
same responsibility and capability. We have compared two energy efficient algorithms and analyzed their
performances when all sensor nodes in a network have either homogeneous or heterogeneous energy with
increase in number of nodes, time rounds and node failures.
Proposed mac protocol for reduce energy consumption over wsn networkeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Abstract In optical circuit switching the high values of blocking probability is resolved by dynamic wavelength routing algorithms with wavelength conversion. The aim of this paper is to study these algorithms. Then the algorithm is selected which gives good results with and without wavelength conversion. The selected algorithm is then checked for other parameters of networking namely throughput, packet delivery ratio, and delay. A comparative study is then carried out for increasing traffic. We try to prove that these algorithms satisfy the criteria of QoS parameters by this comparative study. The results of simulation show that the parameters follow the trend of blocking probability of the selected algorithm. Keywords: optical burst switching, throughput, packet delivery ratio, delay.
PERFORMANCE COMPARISON AND ANALYSIS OF PROACTIVE, REACTIVE AND HYBRID ROUTING...ijwmn
Wireless Sensor networks are a challenging task due to the lack of resources in the network as well as the frequent changes in network topology. Various routing protocols are designed basically to establish correct and efficient paths between source and destination. In the recent years, several routing protocols
have been proposed in literature and many of them studied through extensive simulation at different network characteristics. In this paper, we compare the performance of three most common routing protocols of wireless sensor networks i.e. AODV, DSDV and ZRP. These protocols have been simulated
using NS2 Package. This study investigates the routing protocols corresponding to packet delivery ratio, packet loss ratio, average throughput, dropped packets and end-to-end delay. Hence, evaluation and comparison between routing protocols is required because performance of any routing protocol can be changed with various parameters such as speed of nodes, pause times and number of nodes.
A NOVEL APPROACH FOR ENERGY EFFICIENT HIERARCHY BASED ROUTING IN SENSOR NETWO...cscpconf
Wireless sensor network (WSN) is the collection of many micro-sensor nodes, connecting each other by a
wireless medium. WSN exhibits different approaches to provide reliable sensing of the environment,
detecting and reporting events. In this paper, we have proposed an algorithm for hierarchy based protocols
of wireless sensor networks, which consist of two groups of sensor nodes in a single cluster node. Each
cluster consists of a three cluster head. The event driven data sensing mechanism is used in this paper and
this sensed data is transmitted to the master section head. Hence efficient way of data transmission is possible with larger group of nodes. In this approach, using hierarchy based protocols; the lifetime of the sensor network is increased.
EMERGING WIRELESS TECHNOLOGIES IN THE INTERNET OF THINGS: A COMPARATIVE STUDYijwmn
The Internet of Things (IoT) incorporates multiple long-range, short-range, and personal area wireless
networks and technologies into the designs of IoT applications. This enables numerous business
opportunities in fields as diverse as e-health, smart cities, smart homes, among many others. This research
analyses some of the major evolving and enabling wireless technologies in the IoT. Particularly, it focuses
on ZigBee, 6LoWPAN, Bluetooth Low Energy, LoRa, and the different versions of Wi-Fi including the
recent IEEE 802.11ah protocol. The studies evaluate the capabilities and behaviours of these technologies
regarding various metrics including the data range and rate, network size, RF Channels and Bandwidth,
and power consumption. It is concluded that there is a need to develop a multifaceted technology approach
to enable interoperable and secure communications in the IoT.
SCTP-MANET NEW EXTENSION OF SCTP PROTOCOL FOR THE OPTIMIZATION OF MANET PERFO...ijwmn
Ad Hoc mobile networks are constituted of nodes that move freely without a centralized administration.
These nodes contribute in the routing of data packets that are sent by a source. This happens when the
latter is not capable of reaching its destination. On the other hand, their mobility causes recurrent
breakdowns of the routing paths notably with sparse MANET. In order to optimize the performance of such
networks, we suggest a new extension of protocols: Stream Control Transmission Protocols (SCTP) named
SCTP-MANET. Their main function is therefore to improve the availability of the links in sparse MANET
protocols. This could be achieved by a better integration of Multihoming. With this aim in mind, this new
extension is based on a cross-layer interface between transport and routing layers as well as the use of
specific messages.
Performance Comparison and Analysis of Mobile Ad Hoc Routing ProtocolsCSEIJJournal
A mobile ad hoc network (MANET) is a wireless network that uses multi-hop peer-to-peer routing instead
of static network infrastructure to provide network connectivity. MANETs have applications in rapidly
deployed and dynamic military and civilian systems. The network topology in a MANET usually changes
with time. Therefore, there are new challenges for routing protocols in MANETs since traditional routing
protocols may not be suitable for MANETs. Researchers are designing new MANET routing protocols
and comparing and improving existing MANET routing protocols before any routing protocols are
standardized using simulations. However, the simulation results from different research groups are not
consistent with each other. This is because of a lack of consistency in MANET routing protocol models
and application environments, including networking and user traffic profiles. Therefore, the simulation
scenarios are not equitable for all protocols and conclusions cannot be generalized. Furthermore, it is
difficult for one to choose a proper routing protocol for a given MANET application. According to the
aforementioned issues, this paper focuses on MANET routing protocols. Specifically, my contribution
includes the characterization of different routing protocols and compare and analyze the performance of
different routing protocols.
Extension of Optimized Linked State Routing Protocol For Energy Efficient App...pijans
Mobile Ad-hoc network (MANET) is infrastructure less network in which nodes are mobile, self
reconfigurable, battery powered. As nodes in MANET are battery powered, energy saving is an important
issue. We are using routing protocol to save energy so as to extend network lifetime. We have extended
original Optimized Linked State Routing (OLSR) protocol by using two algorithms and named it as
Enhancement in OLSR using Residual Energy approach (EOLSR-RE) and Enhancement in OLSR using
Energy Consumption approach (EOLSR-EC). To analyze relative performance of modified protocol
EOLSR-RE and EOLSR-EC over OLSR, we performed various trials using Qualnet simulator. The
performance of these routing protocols is analyzed in terms of energy consumption, control overheads, end
to end delay, packet delivery ratio. The modified OLSR protocol improves energy efficiency of network by
reducing 20 % energy consumption and 50% control overheads.
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...IJCNCJournal
Efficient protection techniques for multimedia data transfer over Wireless Sensor Network (WSN) are very essential issues. In noisy Wireless Multimedia Sensor Networks (WMSN) Quality of Service (QoS) is a challenging task due to bandwidth and limited energy, and unpredictable channel conditions. Therefore, Forward Error Correction (FEC), a class of channel coding has been widely used in WSN. Nevertheless, the bulky size of multimedia data makes it more difficult to be transported over the noisy multi-hop wireless network. Moreover, the efficiency of FEC drops as the number of hops increases. In this paper, an optimized protection technique based on network coding and rateless code has been proposed to enhance the throughput and reduce overhead during data transfer in WMSN. The performance of NCP-OPR is enhanced via Optimal Network Path Model (ONPM) where the best available paths are optimally selected using Particle Swarm Optimization (PSO). In conjunction with the proposed protection scheme, the proposed ONPM is intended for limited power WSN by optimally distributing the power usage among the network paths so that the throughput can be improved.
Optimize the Network Coding Paths to Enhance the Coding Protection in Wireles...IJCNCJournal
Efficient protection techniques for multimedia data transfer over Wireless Sensor Network (WSN) are very essential issues. In noisy Wireless Multimedia Sensor Networks (WMSN) Quality of Service (QoS) is a challenging task due to bandwidth and limited energy, and unpredictable channel conditions. Therefore, Forward Error Correction (FEC), a class of channel coding has been widely used in WSN. Nevertheless, the bulky size of multimedia data makes it more difficult to be transported over the noisy multi-hop wireless network. Moreover, the efficiency of FEC drops as the number of hops increases. In this paper, an optimized protection technique based on network coding and rateless code has been proposed to enhance the throughput and reduce overhead during data transfer in WMSN. The performance of NCP-OPR is enhanced via Optimal Network Path Model (ONPM) where the best available paths are optimally selected using Particle Swarm Optimization (PSO). In conjunction with the proposed protection scheme, the proposed ONPM is intended for limited power WSN by optimally distributing the power usage among the network paths so that the throughput can be improved.
A FUZZY-BASED CONGESTION CONTROLLER FOR CONTROL AND BALANCE CONGESTION IN GRI...cscpconf
A Wireless Sensor Network (WSN) is deployed with a large number of sensors with limited power supply in a wide geographically area. These sensors collect information depending on application. The sensors transmit the data towards a base station called sink. Due to the relatively high node density and source-to-sink communication pattern, congestion is a critical issue in WSN. Congestion not only causes packet loss, but also leads to excessive energy
consumption as well as delay. To address this problem, in this paper we propose a new fuzzy logic based mechanism to detect and control congestion in WSN. In the proposed approach, a
Monitor Node for each grid in congestion candidate region performs a fuzzy control to avoid increasing congestion. Fuzzy controller’s inputs are continually fetched from the network by the Monitor Node. Simulation results show that our approach has higher packet delivery ratio and lower packet loss than existing approaches.
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2csandit
In layered networks, reliability is a major concern
as link failures at lower layer will have a
great impact on network reliability. Failure at a l
ower layer may lead to multiple failures at the
upper layers which deteriorate the network performa
nce. In this paper, the scenario of such a
layered wireless sensor network is considered for A
d hoc On-Demand Distance Vector (AODV)
and Multi Commodity Flow (MCF) routing protocols. M
CF is
developed using
polynomial time
approximation algorithms for the failure polynomial
. Both protocols are compared in terms of
different network parameters such as throughput, pa
cket loss and end to end delay. It was
shown that the network reliability is better when M
CF protocol is used. It was also shown that
maximizing the min cut of the layered network maxim
izes reliability in the terms of successful
packet transmission of network. Thetwo routing prot
ocolsare implemented in the scenario of
discrete network event simulator NS-2.
Mobile environment pretense a number of novel
theoretical and optimization issues such as position, operation
and following in that a lot of requests rely on them for
desirable information. The precedent works are sprinkled
across the entire network layer: from the medium of physical
to link layer to routing and then application layer. In this
invention, we present outline solutions in Medium Access
Control (MAC), data distribution, coverage resolve issues
under mobile ad-hoc network environment based on
congestion control technique using Transmission Control
Protocol (TCP). In mobile ad-hoc network issues can arise
such as link disconnections, channel contention and recurrent
path loss. To resolve this issue, we propose a Cross Layer
based Hybrid fuzzy ad-hoc rate based Congestion Control
(CLHCC) approach to maximize network performance. Based
on the destination report it regulates the speed of data flow to
control data loss by monitoring the present network status
and transmits this report to the source as advice. The source
adjusts the sending flow rate as per the advice. This is
monitored by channel usage, ultimate delay, short term
throughput.
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
Routing is the process of selecting best paths in a network in terms of energy and distance. In adhoc it is critical to collect the information in an efficient manner as it has limitations in terms of centralized congestion. In such case to perform the effective communication there is the requirement of some such routing approach that can provide the routing with optimized path. In this work, ACO based routing approach is defined to generate the optimized path in comparison to DSDV over the network. The presented approach is implemented in matlab environment and obtained results shows the effective results in terms of optimized path.
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
In this paper, we have explained the Enhanced Adaptive Position Update strategy for geographic routing in mobile ad hoc
network In Adaptive Position Update strategy, there are two techniques: Mobility prediction rule and On-demand learning rule. Proposed
system is based on the destination aware routing in which path to transfer the data over the network is based on the distance from highly
stable node to the destination node. Results of the proposed system are compared with Periodic Beaconing on the basis of packet delivery
ratio, beacon overhead, energy consumption. Experiment results show a high improvement in results on the parameters energy
consumption, packet delivery ratio and beacon overhead. Proposed work is implemented on the NS2 (Network Simulator) Environment
to perform experiments.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkIJCI JOURNAL
In Multihop Wireless Networks, traffic forwarding capability of each node varies according to its level of contention. Each node can yield its channel access opportunity to its neighbouring nodes, so that all the nodes can evenly share the channel and have similar forwarding capability. In this manner the wireless channel is utilized effectively, which is achieved using Contention Window Adaptation Mechanism (CWAM). This mechanism achieves a higher end-to-end throughout but consumes the network power to a higher level. So, a newly proposed algorithm Quadrant- Based Directional Routing Protocol (Q-DIR) is implemented as a cross-layer with CWAM, to reduce the total network power consumption through limited flooding and also reduce the routing overheads, which eventually increases overall network throughput. This algorithm limits the broadcast region to a quadrant where the source node and the destination nodes are located. Implementation of the algorithm is done in Linux based NS-2 simulator
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Narendra Singh Yadav
Clustering is an important research area for mobile ad hoc networks (MANETs) as it increases the capacity of network, reduces the routing overhead and makes the network more scalable in the presence of both high mobility and a large number of mobile nodes. Routing protocols based on flat topology are not scalable because of their built-in characteristics. However, clustering cause overhead which consumes considerable bandwidth, drain mobile nodes energy quickly, likely cause congestion, collision and data delay in larger networks. This paper uses an implementation of the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based routing protocol to examine the influence of clustering on the performance of mobile ad hoc networks. This paper evaluates channel utilization and control overhead as a function of number of nodes per sq. km to show the effect of clustering. Simulation results show that in high mobility scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
Tree Based Proactive Source Routing Protocol for MANETspaperpublications3
bstract: A mobile adhoc network (MANET) is a wireless communication network and the node that does not lie within the direct transmission range of each other depends on the intermediate nodes to forward data. Opportunistic data forwarding has not been widely utilized in mobile adhoc networks (MANETs) and the main reason is the lack of an efficient lightweight proactive routing scheme with strong source routing capability. PSR protocol facilitates opportunistic data forwarding in MANETs. In PSR, each node maintains a breadth-first search spanning tree of the network rooted at it-self. This information is periodically exchanged among neighboring nodes for updated network topology information. Here added a Mobile sink to reduce the overhead in case of number of child node increases and also to reduce the delay.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Key Trends Shaping the Future of Infrastructure.pdf
IMPLEMENTATION OF BIOLOGICAL ROUTING PROTOCOL IN TUNNEL WIRELESS SENSOR NETWORK (TWSN)
1. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 4, August 2013
DOI : 10.5121/ijwmn.2013.5409 119
IMPLEMENTATION OF BIOLOGICAL ROUTING
PROTOCOL IN TUNNEL WIRELESS SENSOR
NETWORK (TWSN)
M.Muzaffar Zahar1
and Sharifah H. S. Ariffin, Liza A. Latiff, N. Fisal2
1
Industrial Training Institute of Marang, Terengganu, Malaysia
muzaffar@ilpmrg.gov.my
2
Universiti Teknologi Malaysia, Johor, Malaysia
sharifah@fke.utm.my, liza@ic.utm.my, sheila@fke.utm.my
ABSTRACT
A routing protocol is a core issue in Wireless Sensor Network (WSN) especially on undetermined situation
and crucial condition to guarantee the transmission of data. Therefore, any implementation of routing
protocol in a tunnel environment will suit with their application to minimize dropped data in its
communication. This paper presents a biological routing protocol named as Biological Tunnel Routing
Protocol (BioTROP) in Tunnel Wireless Sensor Network (TWSN). BioTROP has been tested with four
challenging situations for marking its standard soon. By setting it in low power transmission, all nodes
appear as source node and intermediate nodes concurrently, faster transmission rate and free-location
setup for each node; these conditions make BioTROP as an ad-hoc protocol with lightweight coding size in
tunnel environment. This protocol is tested only in real test bed experiment using 7 TelosB nodes at a
predetermined distance. The results have shown more than 70 percent of the transmitted data packets were
successfully delivered at the base station.
KEYWORDS
Routing Protocols, Tunnel Wireless Sensor Network, Biological Inspired Techniques, Ant Colony
Optimization
1. INTRODUCTION
As one of the areas under Wireless Underground Sensor Network (WUSN), Tunnel Wireless
Sensor Networks (TWSN) have different propagation characteristics of EM waves due to
confined space condition although the signal propagates through the air. The structures of the
mines and road or subway tunnels can contribute to refraction and reflection effect to create an
unbalanced communication which leads to early invalidation of nodes close to the base station
[1][2]. On the other hand, multi-path fading phenomenon and material absorption will contribute
to extreme path loss in TWSN communication.
Apart from the challenging environment, TWSN area also circles by the limitations of sensor
nodes manufactured setup such as low memory computational and limited battery usage.
Therefore, most of the researchers come with unique and special method in developing routing
protocol. A lightweight routing protocol is a major scheme chosen by certain researchers to
minimize the power consumption and total coding size in sensor node. Even though in reality, the
detail and various problem handler schemes in proposed routing protocol will contribute inversely
to tackle thousands of possibilities and unexpected risk situation.
2. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 4, August 2013
120
Otherwise, the researcher set the different active time of sensor node as well as limits the number
of the source node to control the signal traffic. However, it is quite tough in the installation
process and not maximizes the sensor nodes that distributed. Therefore, the ideal routing protocol
must have nature awareness, reliable in heavy source node, effective in ad hoc situations and
faster transmission rate with lower power consumption. Although many kinds of application
occur in a tunnel underground such as environmental monitoring, infrastructure monitoring,
location determination, and security monitoring, the core challenging problem in TWSN is how
the routes in the network maintain and reliable in multi-hop communication.
Based on the challenging issues that discussed, the proposed routing protocol must ensure the
secure communication and connection to send the data from source node to base station. In this
project, it is envisaged, the proposed routing protocol, Biological Tunnel Routing Protocol
(BioTROP) shall be an easier method than previous model done in various approaches. This is
considered an ant’s behavior concept that will try to find any way to reach the food area. Besides
that, the ant agent is guided also by optimal forwarding calculation to determine the best next hop
neighbour.
2. SYSTEM DESIGN OF BIOTROP
By the awareness of more refraction and reflection of signal occurred in tunnel condition, TWSN
needs the simple technique and practice to suit the limited memory and storage space in the
wireless sensor device. Therefore, BioTROP uses the cross-layer interaction [3] in its design
process to achieve high gains in the overall performance. The concept of cross-layer design for
sharing information among two or more layers for adaptation purposes is to increase the inter-
layer interactions [4, 5, 6]. BioTROP uses communication between physical layer and network
layer in order to select the next hop forwarding as shown in Figure 1. The process at the network
layer consists of the discovery of an optimal neighbouring node based on calculated optimal
forwarding progress value via physical parameters translated as metrics. The physical parameters
are the signal strength, link quality indicator (LQI) and remaining power. The forwarding metrics
are used in routing management module to determine the next hop communication.
Figure 1. Cross-layer concepts in BioTROP
Based on BioTROP’s role played in design approach, it consists of two functional modules that
include routing management and neighbourhood management as shown in Figure 2. The
neighbourhood management discovers a subset of forwarding candidate nodes and maintains a
3. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 4, August 2013
121
neighbour table of the forwarding candidate nodes. The routing management determines the
optimal route to the destination and forwards the packet based on the unicast forwarding
mechanism. If any problem occurs while routing the data packets, the routing management
implements routing problem handler. Unicast forwarding mechanism is used to forward the data
packet to best next node towards the destination.
Figure 2. Functional Components of BioTROP
2.1. Routing Management Module
As a main role in BioTROP, routing management supports three sub functional processes;
optimal forwarding calculation, unicast forwarding mechanism and routing problem handler as
shown in Figure 2. The selection of next hop node determined by optimal forwarding calculation
that considers three parameters or criteria which are packet reception rate (PRR), link quality
indicator (LQI) and remaining power level. The routing problem handler is used when the sender
node does not receive Backward Ant agent. Figure 3 shows the state machine diagram of the
routing management.
Routing Management
Routing Problem
Handler
Optimal Forwarding Calculation
Unicast
Forwarding
Neighbourhood Management
4. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 4, August 2013
122
Figure 3. State Machine Diagram of Routing Management Module
The routing management module starts when the sensor node sends or receives a Request to
Reply (RTR) packets to or from its neighbour nodes. Each node was set with 1 packet per second
on their transmission rates and will broadcast the RTR packets twice at the earlier of 2 second. At
the same time, each node will be on the alert to receive any RTR packets and reply to the sender
immediately with three parameters. Therefore, there are different role played in searching the
optimal neighbour node at an earlier stage. Based on TelosB datasheet, the transmit data rate of
TelosB node is 250 kilobits per second (kbps). So, this project allocates 2 second so that each
source node has sufficient period in receiving, analyzing and re-sending process.
Refer to Figure 3, the optimal forwarding calculation task acts as the main role in routing
management module. Each receiver node will prepare the forwarding metrics as requested from
source node to get the optimal solution. For realizing it, the optimal forwarding calculation task
will request the neighbour information twice in 2 second to obtain physical parameters such as
packet reception rate, link quality indicator and remaining power. The calculation will follow as
equation (1). The value of λ1, λ2 and λ3 is determined by a table tabulated by Ahmed [7] using
heuristic methods. Therefore, this project chose λ1= 0.4, λ2 = 0.3 and λ3= 0.3. After receiving the
needed parameters, the routing management stores the replies in the neighbour table. The router
management will forward a data packet to the one-hop neighbor that has an optimal forwarding.
The optimal forwarding (OF) is computed as follows:
= max[( × ) + ( × ) + ( + )]
ℎ + + = 1
= 0.4, = 0.3 = 0.3 (1)
The forwarding mechanism will be invoked after routing management module selects the best
progress neighbour in the optimal forwarding calculation. Finally, the data packets will be sent to
the selected neighbour node by unicast forwarding mechanism. The complete finding of route
from source node to destination node will be guided by the ant agent. However, the routing
management module will invoke the neighbourhood management module again if does not
receive Backward Ant agent after launched the Forward Ant. Therefore, if the connection
between a source node and destination node is fine, the survey process only takes once and then
will minimize the delay time to 2 second.
5. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 4, August 2013
123
2.2. Neighbourhood Management Module
Refer to Figure 4, this module starts after routing management module requests neighbour
information. First, it will request neighbour discovery by broadcast the RTR message. Any
neighbour information received will be recorded in the neighbour table. Otherwise, this initiative
was carried out 2 times to maximize the number of neighbour node that can be detected.
Therefore, the neighbourhood procedure will update the neighbour table such as PRR, LQI and
remaining power when receive the new ID of neighbour node and the neighbour table is less than
6 nodes. If the selected neighbour node at routing management module faces any problem, the
neighbourhood management module will invoke neighbour replacement task to replace neighbour
information. Finally, the neighbourhood management module will send the updated neighbour
information to routing management module.
Figure 4. State Machine Diagram of Neighbourhood Management Module
3. METHODS AND EXPERIMENTAL SETUP
The tests were run using a simple network topology in one of the culverts at the Industrial
Training Institute (ITI) Marang, Terengganu as shown in Figure 5. The BioTROP are embedded
into 7 TelosB nodes and the nodes are sending at rate 1 packet per second, which is double with
suggestion rate. According to TelosB’s manufacturer, the optimum rate should be 0.5 packets per
second, because higher rates can lead to congestion [8]. In this experiment, all of six nodes (Node
1 to 6) will send the data packets or acts as Full Function Device (FFD). Node 0 was set as the
base station and each node might run as the intermediate node between a source node and base
station node that created. Therefore, the role of each node will maximize to collect the data while
in tunnel condition.
6. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 4, August 2013
124
Figure 5. The view of experimental setup
The TelosB RF transceiver uses CC2420 component that compliant with IEEE 802.15.4.
Therefore, there are 8 power settings transmission that are allowed as specified at Figure 6 [9].
For this project, the BioTROP is embedded with two different power transmissions which are -25
dBm and -15 dBm, where these are the two lowest settings in TelosB mote. Meanwhile, the
distance between the nodes, d, was varied from two meters to eight meters. The performance will
be in term of Packet Delivery Ratio (PDR), Packet Drop Ratio (PDropR) and Packet Reception
Rate (PRR). These performances will be observed at the base station in 5 minutes. The analyzing
of result between both power transmissions were done on the three performances.
Figure 6. Output Power Settings and Typical Current Consumption @ 2.45 GHz
4. RESULTS AND DISCUSSIONS
This section discusses the implementation’s result of BioTROP in TWSN testbed. The three sub-
section below has been designed to simplify the explanation and conclusion will be made.
4.1. Power Transmission of -25 dBm
In this subdivision, BIOTROP was tested on TelosB motes using power transmission -25 dBm or
3.16 µWatt. Refer to Figure 6, the transmission power was set to code 3 which is lower on the list.
The graph in Figure 7 shows the percentage of packet delivery at the base station from each node
in different distance. The detail value for each result is shown in Table 1.
Node 3Node 1
1.7 m
1.1 m
Base
Station
d
Node 5
d d
Node 4 Node 6dNode 2
32 meter
1.8 meter
1.8meter
7. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 4, August 2013
125
Figure 7. Packet Delivery Ratio (PDR) at -25 dBm power transmission
Table 1. The value of PDR (%) at -25 dBm power transmission.
Node
Distance
1 2 3 4 5 6
2 meters 86 94 94 90 86 86
4 meters 87 97 68 77 61 67
6 meters 81 80 45 44 62 78
8 meters 75 62 22 10 1 5
Since node 1 and node 2 are near to the base station, so the data packets delivered are high which
exceed 80 percent at 2, 4 and 6 meters. Generally, all data packets from all nodes consistently
deliver to the base station at 2 meters. This shows the BioTROP algorithm able to construct the
entire available sender nodes at this distance. However, the PDR drops quite drastically at 6 meter
especially on node 3 and node 4. The decreasing is happening due to the symptom of coverage
loss that caused by interference and attenuation in the tunnel if compared to node 5 and 6
performances that farther located. Meanwhile at 8 meter distance, most of the nodes do not
deliver well to base station node. The lowest power transmission in this setting might contribute
to low PDR that obtained.
0
20
40
60
80
100
120
2 4 6 8
Distance (m)
Numberofpacketdelivered(%)
PDR at Power Transmission of -
25dBm
Node 1
Node 2
Node 3
Node 4
Node 5
Node 6
8. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 4, August 2013
126
Figure 8. Packet Dropped Ratio (PDropR) at -25 dBm power transmission
The Figure 8 shows the percentage graph of the Packet Dropped Ratio (PDropR) meanwhile
Table 2 shows the value for each result obtained. Refer to Figure 8 and Table 2, the data packets
averagely dropped are 4 percent, 12 percent, 24 percent, 26 percent, 29 percent, and 34 percent
respectively for node 1, node 2, node 3, node 4, node 5 and node 6 as the distance changes.
Although most of packets sent dropped exceeds than 20 percent at 8 meters, it is not enough to
evaluate the BioTROP algorithm totally. In lowest power transmission, the probability to detect
the available neighbour nodes is low. Thus, this situation pushes the neighbourhood management
module frequently to initiate new neighbour node discovery. Then, it will use the time located for
searching process without sending any data packets as well as no neighbour node detected.
Table 2. The value of PDropR (%) at -25 dBm power transmission.
Node
Distance
1 2 3 4 5 6
2 meters 14 6 6 10 14 14
4 meters 13 3 32 23 39 33
6 meters 19 20 55 56 38 22
8 meters 25 38 78 90 99 95
Figure 9 shows the packet reception rate at the base station for each node with detail value in
Table 3. As discussed earlier, the experiment sets the packets sending rate of 1 packet per second.
Thus, the best performance of PRR at the base station for each node is 1 packet per second
supposedly. As shown in Figure 9 and read in Table 3, all nodes achieve packet delivery more
than 0.85 PRR (85%) at the closest distance. Meanwhile at 4 meters, only node 1 and node 2
perpetual achieve exceed 0.85 PRR. Meanwhile node 3, 4, 5 and 6 had started to decline to 0.68
PRR, 0.77 PRR, 0.61 PRR and 0.67 PRR respectively. From a distance of 6 meters, three
different phenomena were observed. Node 6 shows increments of packet reception rate
meanwhile node 5 maintains at 0.6 PRR. However, node 1, 2, 3 and 4 decreased to 0.81 PRR,
0
20
40
60
80
100
120
2 4 6 8
Distance (m)
Numberofpacketdropped(%)
PDropR at Power Transmission of -
25dBm
Node 1
Node 2
Node 3
Node 4
Node 5
Node 6
9. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 4, August 2013
127
0.80 PRR, 0.45 PRR and 0.44 PRR respectively. At 8 meter distance, only node 1 and 2 still
exceed than 0.5.
Figure 9. Packets Received Rate (PRR) at -25 dBm power transmission
Table 3. The value of PRR at -25 dBm power transmission.
Node
Distance
1 2 3 4 5 6
2 meters 0.863 0.940 0.943 0.903 0.863 0.863
4 meters 0.873 0.973 0.680 0.773 0.607 0.673
6 meters 0.813 0.797 0.450 0.437 0.617 0.776
8 meters 0.750 0.617 0.220 0.100 0.010 0.047
4.2. Power Transmission of -15 dBm
This experiment sets the power transmission at -15dBm or 31.6 µWatt for all nodes with the same
distance. As inferred in Section 4.2, the low power transmission setup will contribute to the
decreasing pattern when the distance between source nodes is increased in the first experiment.
Hence, this experiment is done to compare and analyze the performance with initial experiment.
Otherwise, the more sources node can be detected by the base station and more precise conclusion
can be made for both experiments.
0
0.2
0.4
0.6
0.8
1
1.2
2 4 6 8
Distance (m)
PacketReceptionRate
PRR at Power Transmission of -
25dBm
Node 1
Node 2
Node 3
Node 4
Node 5
Node 6
10. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 4, August 2013
128
Figure 10. Packet Delivery Ratio (PDR) at -15 dBm power transmission
Figure 10 shows the consistent result of Packet Delivery Ratio (PDR) for each node at the base
station. As can be observed in Table 4, the average of percentage packets delivered fluctuates
slightly from 2 meters to 8 meter distance. In closest position, node 1, 2 and 3 shows that 81
percent, 93 percent and 87 percent of data packets delivered at base station respectively. Despite
the distance of node 4 same with node 3, only 78 percent of data packets are delivered.
Meanwhile, 77 percent and 71 percent of data packets delivered respectively for node 5 and node
6. This unbalance observation may be due to the physical condition of the tunnel that prevent
certain signals cannot be achieved by most nodes. On the other hand, the result of each node for
scenario 2 displays the excellent accomplishment. The entire node delivers the packet data
successfully to base station more than 90 percent. Although the result for scenario 3 and scenario
4 decreased slightly for average node, the data packets delivered still exceed 70 percent.
However, only node 6 given less than 60 percent at 8 meters. This might due to the distances and
interference in the tunnel during an experiment.
Table 4. The value of PDR (%) at -15 dBm power transmission.
Node
Distance
1 2 3 4 5 6
2 meters 81 93 87 78 77 71
4 meters 92 96 90 95 96 91
6 meters 82 76 81 73 73 86
8 meters 79 79 81 73 72 56
0
20
40
60
80
100
120
2 4 6 8
Distance (m)
Numberofpacketdelivered(%)
PDR at Power Transmission of -
15dBm
Node 1
Node 2
Node 3
Node 4
Node 5
Node 6
11. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 4, August 2013
129
Figure 11. Packet Dropped Ratio (PDropR) at -15 dBm power transmission
Table 5. The value of PDropR (%) at -15 dBm power transmission.
Node
Distance
1 2 3 4 5 6
2 meters 19 7 13 22 23 29
4 meters 8 4 10 5 4 9
6 meters 18 24 19 27 27 14
8 meters 21 21 19 27 28 44
Figure 11 focuses on the Packet Dropped Ratio (PDropR) of each node at the base station. Similar
to the initial experiment result discussed previously, the total of packets data supposedly sent
minus to the packets delivered will produce the value of packets dropped. Based on the graph, all
nodes only lost its data packets not more than 30 percent at 2 meters. However, excellent result
showed at 4 meters where only minimum of 10 percent data packets dropped. Although there is
slightly increasing of data packets dropped at 6 meters, it still lower than the maximum data
packet drop at 2 meters. The result showed consistent at 8 meters where the range of data packets
lost similar to 6 meters. Only node 6 shows an unpredictable result even though the distances
setup same with opposite neighbour, node 5. Generally, most of nodes receive the other routes to
forward and same time sends its data packets to the base station fluently.
0
10
20
30
40
50
2 4 6 8
Distance (m)
Numberofpacketdropped(%)
PDropR at Power Transmission of -
15dBm
Node 1
Node 2
Node 3
Node 4
Node 5
Node 6
12. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 4, August 2013
130
Figure 12. Packets Received Rate (PRR) at -15dBm power transmission
Figure 12 shows the PRR result of this experiment and Table 6 interprets the detail value.
Referring to the result at 2 meters, the rate of packets received at the base station for each source
node is more than 0.7. Even at the shortest distance setup, only node 1 and 2 can deliver almost
all its data packet to base station. Differ at 4 meters, all nodes can interact between each other
very well by producing more than 0.89 or 89 percent data delivered. However, the data packets of
all nodes gradually decrease at 6 meters. Only node 1, 3 and 6 accomplish the data packets
delivered more than 0.8. For farthest distance, the PRR of node 1, 2, 3, 4 and 5 is similar which is
above 0.7 PRR. However node 6 was given less than 0.6 PRR.
Table 6. The value of PRR at -15 dBm power transmission.
Node
Distance
1 2 3 4 5 6
2 meters 0.810 0.933 0.873 0.783 0.770 0.713
4 meters 0.917 0.957 0.897 0.947 0.960 0.907
6 meters 0.817 0.757 0.817 0.730 0.733 0.863
8 meters 0.793 0.793 0.807 0.730 0.720 0.557
4.3. Comparison for Both Experiments
This section will discuss the comparison result between first experiment and second experiments
by referring to the distances setup as follows:
Refer to the result of 2 meter setup in the first experiment, all nodes successfully deliver its data
packet despite of the lower power transmission setup. This observation differs to the same
distance in the second experiment as discussed previously where there are disorders in receiving
data especially on node 6. Theoretically, when the power transmission increase, more neighbour
node can be detected by source nodes at the same distance. Therefore, more signal of source node
will be detected by the base station node. This phenomenon will contribute the lower result of
PRR for node 5 and node 6 because of signal interference or high multi-path effect.
0
0.2
0.4
0.6
0.8
1
1.2
2 4 6 8
Distance (m)
PacketReceptionRate
PRR at Power Transmission of -
15dBm
Node 1
Node 2
Node 3
Node 4
Node 5
Node 6
13. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 4, August 2013
131
Furthermore, almost all node start decreases gradually at 4 meter setup for the first experiment.
Only the closest node to a base station which node 1 and node 2 have shown very slightly
increased. It happens due to lack of power transmission for others source nodes. Thus, signal
interference for base station node in minimizes condition at this situation. For signal condition
between node 3 and 6, more than one device transmits at the same time which can create co-
channel interference [1]. As a result, signal attenuates and data packet cannot be sent. However,
the result at second experiment gives the confident performance for BioTROP. All nodes sent
successfully more than 89 percent PDR. These outcomes prove that the power transmission of -15
dBm is able to overcome the tunnel environment problem that occurred in the first experiment.
At 6 meter distance in both experiments, no nodes increase its packet reception rate at the base
station besides on node 5 in the first experiment. However, the slight increasing of PRR on node 5
in first experiment still does not exceed the packet reception rate observed at each node in the
second experiment. Other problems that have been discussed previously are environmental
interference. Certain location node has unexpected surface such as small tree that grows in
between the structure connector and also water hole. Thus, in a weak signal condition and more
types of interference occurred, no more data packet can be sent at 6 meter distance.
The furthest distance, 8 meters imposes more challenges to BioTROP algorithm. Totally source
nodes decreased drastically especially on node 3, 4, 5 and 6 in the first experiment. At this
distance with lowest power transmission, the adjacent neighbours cannot be detected by source
nodes to make guarantee connection. Thus, the complete route from source to destination node
cannot be developed. On the other hands, it will be interesting to discuss the result at the same
distance in the second experiment. As shown in Figure 4.8, most of nodes managed well to reduce
the reduction of data packet dropped beside of node 6. Refer to the result of node 6 in previous
distance setup, the increase or reduction of the graph not drastically as shown in 8 meter distance.
Thus, it may cause of the software problem that happen in reading process.
As an overall, the results obtained at four different distance setup as discussed above attributed
more to external factor only. By the way, there are neighbourhood discovery times in each node
when the neighbour discovery module invoked. The finding of routes from source to destination
by Ant Agent for each node was set to push the neigbour discovery module in 2 minutes at the
starting point. Thus, it will maintain the neighbour table as long as the source node receives the
Backward Ant before sending the data packets. If the source node does not receive the Backward
Ant agent, the request to reply (RTR) message will broadcast again to find the new neighbour.
Thus, it will take the time allocated for sending the data. If the more frequent unstable signal
occurs and then the source node does not receive Backward Ant agent, it will cause the neighbor
discovery module invoked much time. Nevertheless, BioTROP’s performance showed can be
improved by restructuring or minimize the timer of finding neighbor nodes.
5. CONCLUSIONS
The routing protocol developed in WSN area using two types of function nodes which are Full
Function Device (FFD) and Reduce Function Device (RFD) [1] to create multi hop
communication. FFD node will play two roles at the same time which are sourced node and
intermediate node. Meanwhile RFD node just receives and forwards the data packet from source
to destination. Both functions are implemented to reduce the congestion of the signal in order to
guarantee the data packet delivered. Therefore, BioTROP challenged this limitation by setting all
nodes as FFD and run in the confine region which is tunneled underground. Hence, the usage of
sensor node is in fully functional condition to improve the effectiveness of sensing in any
application. In addition, the proposed algorithm in BioTROP has been developed in simple
programming codes in TinyOS 1.x. So, the further improvement and study will be easier and
14. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 4, August 2013
132
more flexible. Otherwise, BioTROP uses low power transmission to enhance the lifetime of
sensor node in real implementations.
ACKNOWLEDGEMENTS
The authors would like to thank the Ministry of Higher Education Malaysia for their full support
and Research Management Center, Universiti Teknologi Malaysia (UTM) for their partial and the
researchers in Telematic Research Group, UTM.
REFERENCES
[1] Ian A.F. Akyildiz and Mehmet Can Vuren. Wireless Sensor Network. John Wiley & Sons Ltd, UK.
A John Wiley and Sons, Ltd, Publication. 2010.
[2] Haifeng Jiang and Jiansheng Qian Wei Peng. Nonuniform Clustering Routing Protocol for Tunnel
Wireless Sensor Network in Underground Mine. 2009 International Conference on Wireless
Communications & Signal Processing. November 13-15, 2009. Nanjing, China: IEEE. 2009. 1-5.
[3] Adel Ali Ahmed, L. A. Latiff and Norsheila Fisal. Simulation-Based Realtime Routing Protocol
With Load Distribution In Wireless Sensor Networks. Wireless Communications and Mobile
Computing. 10 (7). 1002-1016.
[4] Yu-Pin Hsu and Kai-Ten Feng. Cross-Layer Routing For Congestion Control in Wireless Sensor
Networks. 2008 IEEE Radio and Wireless Symposium. January 22-24, 2008. Orlando, Florida.
IEEE Xplore. 2008. 783-786.
[5] Jheng-Da Jhong, Chi-Yuang Chang and Han-Chieh Chao. Cross-Layer Ant Based Algorithm
Routing for MANETs. International Conference On Mobile Technology, Applications, and
Systems. September 10-12, 2008. Yilan, Taiwan. 2008.
[6] N. Chilamkurti, S. Zeadally, A. Vasilakos and V. Sharma1. Cross-Layer Support for Energy
Efficient Routing in Wireless Sensor Networks. Journal of Sensors, Hindawi Publishing
Corporation, 2009. 9.
[7] Adel Ali Ahmed, Liza A. Latiff and Norsheila Fisal. Real-Time Routing Protocol With Load
Distribution In Wireless Sensor Network Based On IEEE 802.11 and IEEE 802.15.4. Universiti
Teknologi Malaysia. Jurnal Teknologi. December 2007. 47 (D): 71-90.
[8] Crossbow Tech. Avoiding RF interference between WiFi and Zigbee. Crossbow Technical Report.
2005.
[9] Chipcon. CC2420 low power radio transceiver. http://www.chipcon.com. 2010.
Authors
Mohd Muzaffar Zahar received his B.Sc. in Electrical Engineering (Mechatronics) from
Universiti Teknologi Malaysia, Skudai, Malaysia in 2008 and graduated in same university
with a Master in Electrical Engineering in 2013 under the supervision of Dr. Sharifah
Hafizah Syed Ariffin. He is now a lecturer at the Industrial Training Institute of Marang.
Sharifah Hafizah Syed Ariffin received her BEng in Electronic and Communication
Engineering from London Metropolitan University, London, UK and her MEE by research
(mobility management in wireless telecommunication) from University Technology
Malaysia (UTM), Malaysia, in 1997 and 2001, respectively. She obtained her PhD in
Telecommunication (accelerated simulation) from Queen Mary University, London, UK, in
2006. She is a Associate Professor at UTM and her research interests include network modelling and
performance, accelerated simulation, self similar traffic and priority scheduling.
15. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 4, August 2013
133
Liza Abdul Latiff graduated from South Dakota State University, USA with a BSc in
Electrical Engineering in 1985 and from UTM with a MEE in Data Communication by
research (Enhancement to Menu Selection Facility in Videotext) in 1988. She obtained her
PhD in Electrical Engineering (Wireless Communication) from UTM in 2007. She is an
Associate Professor in UTM since 1995 and her research interest include routing in
wireless network, resource management and scheduling and also quality of Service and security in
MANET and WSN.
Norsheila Fisal received her BSc in Electronic Communication from University of Salford,
Manchester, UK in 1984, and her MSc in Telecommunication Technology and her PhD in
Data Communication from University of Aston, Birmingham, UK in 1986 and 1993,
respectively. Currently, she is a Professor in the Faculty of Electrical Engineering,
University Technology Malaysia and the Director of Telematic Research Group.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 4, August 2013
133
Liza Abdul Latiff graduated from South Dakota State University, USA with a BSc in
Electrical Engineering in 1985 and from UTM with a MEE in Data Communication by
research (Enhancement to Menu Selection Facility in Videotext) in 1988. She obtained her
PhD in Electrical Engineering (Wireless Communication) from UTM in 2007. She is an
Associate Professor in UTM since 1995 and her research interest include routing in
wireless network, resource management and scheduling and also quality of Service and security in
MANET and WSN.
Norsheila Fisal received her BSc in Electronic Communication from University of Salford,
Manchester, UK in 1984, and her MSc in Telecommunication Technology and her PhD in
Data Communication from University of Aston, Birmingham, UK in 1986 and 1993,
respectively. Currently, she is a Professor in the Faculty of Electrical Engineering,
University Technology Malaysia and the Director of Telematic Research Group.
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 4, August 2013
133
Liza Abdul Latiff graduated from South Dakota State University, USA with a BSc in
Electrical Engineering in 1985 and from UTM with a MEE in Data Communication by
research (Enhancement to Menu Selection Facility in Videotext) in 1988. She obtained her
PhD in Electrical Engineering (Wireless Communication) from UTM in 2007. She is an
Associate Professor in UTM since 1995 and her research interest include routing in
wireless network, resource management and scheduling and also quality of Service and security in
MANET and WSN.
Norsheila Fisal received her BSc in Electronic Communication from University of Salford,
Manchester, UK in 1984, and her MSc in Telecommunication Technology and her PhD in
Data Communication from University of Aston, Birmingham, UK in 1986 and 1993,
respectively. Currently, she is a Professor in the Faculty of Electrical Engineering,
University Technology Malaysia and the Director of Telematic Research Group.