Network Coding is most promising aspect of WSN. This Network Coding method is combined with multipath routing protocol to form NCMR protocol.(network coding based multipath routing protocol).This protocol is used to obtain energy efficient wireless sensor network.. These protocol leads to decrease the number of constrain routes & the total time of transmission. This protocol is applied on unicast and multicast network separately. And comparison is done with traditional multipath routing protocol for same unicast and multicast network. Simulation result shows energy consumption of NCMR multicast is lower than NCMR unicast and also than TMR unicast as well as multicast. This work is proved by the simulation analysis results. The used multipath model is based on braided multipath routing, and the network coding method is random linear network coding (practical network coding). In braided network multiple paths to the sink nodes are created for each source node, and the packets encoded at source nodes are transmitted through the braided multipath network model. Then, intermediate nodes re-encode these received packets and transfer these new packets to next cluster. Finally, the multiple sink nodes decode the packets received from different paths and recover the original data. Results of the analysis show that multicast NCMR provides more reliability. We compare multicast NCMR routing protocol with NCMR unicast & also with traditional multipath routing protocol for unicast and multicast networks, in terms of the packet loss, energy consumption, successful delivery ratio & end to end delay when a packet is transmitted Some special simulations are carried out specially for NCMR multicast i.e. effect of number of nodes on energy consumption, packet loss & end to end delay.
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...ijwmn
Themain challengein wireless sensor network is to improve the fault tolerance of each
node and also provide an energy efficient fast data routing service. In this paper we propose an
energyefficient node fault diagnosis and recovery for wireless sensor networks referred as fault tolerant
multipath routing scheme for energy efficientwireless sensor network (FTMRS).The FTMRSis based on
multipath data routing scheme. One shortest path is use for main data routing in FTMRS technique and
other two backup paths are used as alternative path for faulty network and to handle the overloaded
traffic on main channel.Shortest path data routing ensures energy efficient data routing. The
performance analysis of FTMRSshows better results compared to other popular fault tolerant techniques
in wireless sensor networks.
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...IJNSA Journal
With the rapid growth of wireless communication infras,,tructure over the recent few years, new
challenges has been posed on the system and analysis on wireless adhoc networking. Implementation of
MIMO communication in such type of network is enhancing the packet transmission capabilities. There
are different techniques for cooperative transmission and broadcasting packet in MIMO equipped
Mobile Adhoc Network. We have employed a model network in the OPNET environment and propose a
new scheduling algorithm based on investigating the different broadcasting algorithm. The new
broadcasting algorithm improves the packet transmission rate of the network based on energy
performance of the network and minimizes the BER for different transmission mode which is illustrated
in this paper. The simulations are done in MATLAB and OPNET environment and the simulated result
for the packet transmission rate are collected and shown in the tabular form. Also simulate the network
for generating a comparative statement for each mobile node. And performance analysis is also done for
the model network. The main focus is to minimize BER and improve information efficiency of the
network.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...ijwmn
Themain challengein wireless sensor network is to improve the fault tolerance of each
node and also provide an energy efficient fast data routing service. In this paper we propose an
energyefficient node fault diagnosis and recovery for wireless sensor networks referred as fault tolerant
multipath routing scheme for energy efficientwireless sensor network (FTMRS).The FTMRSis based on
multipath data routing scheme. One shortest path is use for main data routing in FTMRS technique and
other two backup paths are used as alternative path for faulty network and to handle the overloaded
traffic on main channel.Shortest path data routing ensures energy efficient data routing. The
performance analysis of FTMRSshows better results compared to other popular fault tolerant techniques
in wireless sensor networks.
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...IJNSA Journal
With the rapid growth of wireless communication infras,,tructure over the recent few years, new
challenges has been posed on the system and analysis on wireless adhoc networking. Implementation of
MIMO communication in such type of network is enhancing the packet transmission capabilities. There
are different techniques for cooperative transmission and broadcasting packet in MIMO equipped
Mobile Adhoc Network. We have employed a model network in the OPNET environment and propose a
new scheduling algorithm based on investigating the different broadcasting algorithm. The new
broadcasting algorithm improves the packet transmission rate of the network based on energy
performance of the network and minimizes the BER for different transmission mode which is illustrated
in this paper. The simulations are done in MATLAB and OPNET environment and the simulated result
for the packet transmission rate are collected and shown in the tabular form. Also simulate the network
for generating a comparative statement for each mobile node. And performance analysis is also done for
the model network. The main focus is to minimize BER and improve information efficiency of the
network.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHijsrd.com
In heterogeneous sensor networks, certain nodes become cluster heads which aggregate the data of their cluster nodes and transfer it to the sink. An Improved Energy leach protocol for cluster head selection in a hierarchically clustered heterogeneous network to reorganize the network topology efficiently is proposed in this research work. The proposed algorithm will use thresholding to improve the cluster head selection. The presented algorithm considers the sensor nodes in wireless network and randomly distributed in the heterogeneous network. The coordinates of the sink and the dimensions of the sensor field are known in prior.
In wireless sensor network energy cutback is considered as a principle intensive challenge which is studied largely in the Wireless Sensor Networks (WSN) literature. Wireless Sensor Networks (WSNs) are pertinent in numerous arenas where WSNs may be used for sensing, ciphering, and communication elements that give a user or administrator the ability to instrument, observe, and retort to events and phenomena in a specific environment. But sensor devices are resource curbed, positioned in an open and unattended environment, different types of attacks and conventional techniques against these attacks are not desirable due to the resource constrained nature of these kinds of networks. An energy-balanced routing method based on forward-aware factor (FAF-EBRM) in which the next-hop node is elected according to the awareness of link weight and forward energy density. FAF-EBRM is compared with Ladder Diffusion Algorithm, which balances the energy utilization, sustain the function era and guarantees high QoS of WSN. The FAF-EBRM is proposed with Secure Routing Layer (SRL) Protocol which ensures that the secure data transmission is achieved without releasing private sensor readings and without introducing significant overhead on the battery-limited sensors.
Advance in the WIRELESS SENSOR NETWORK (WISENET) technology is energy efficient routing protocols that promises a wide range of potential applications in both civilian and military areas. In the WISNET the sensor node have a limited transmission range and their processing and storage capabilities as well as their energy sources are limited. So the Equalized Cluster Head Election Routing Protocol (ECHERP) and PEGASIS with Double Cluster Head (PDCH) pursues energy conservation through balanced clustering for Energy Efficiency. In WSN, energy efficient routing protocol is important to increase the network lifetime. ECHERP and PDCH both protocol claims to be energy efficient.
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...IJECEIAES
Multi Point Relays (MPRs) are those nodes that are calculated and determined by the Optimized Link State Routing protocol (OLSR) in order to minimize and avoid overload inside the Mobile Ad hoc Network (MANET). In this paper, we will present a synthetic study of many techniques and methods for calculating and selecting the MPR nodes using a set of criteria namely energy, mobility, bandwidth, the quality of links, etc. The result of this study shows that most techniques consider a limited number of metrics for selecting the MPR nodes and therefore they are insufficient to allow the OLSR protocol to be quite complete and efficient because several metrics can occur at the same time in the real execution environment.
With the increase of usage of wireless networks for purposes where the nodes are either stationary or minimally mobile, focus is also on increasing the network capacity of wireless networks. One such way is to use non-overlapping multiple channels provided by 802.11 by using multiple interfaces per node. Multiple non overlapped channels exist in the 2.4 GHz and 5 GHz spectrum. Under this scenario, several challenges need to be addressed before all the available channels can be fully utilized.
Performance analysis of papr reduction techniques in multicarrier modulation ...eSAT Journals
Abstract Orthogonal FrequencyDivisionMultiplexing (OFDM) is one of the many multicarrier modulation techniques which provide high spectral efficiency, less vulnerability to echoes,low implementation complexity and resilience to non – linear distortion. It is used in communication systems due to its various advantages. However, while this system is implemented problem of high peak – to – average power ratio(PAPR) is encountered. The reason behind this drawback is the existence of manyindependent subcarriers, due towhichthesignal amplitudecanhavehighpeakvalues as compared to average of whole system. The high PAPR in multicarrier transmission systems causes power degradation and spectrum spreading.Interleaving, Tone Reservation, Peak Reduction Carrier,Block Coding, Active Constellation Extension, Envelope ScalingareamongmanyPAPRreductionschemesthathavebeenproposedas a remedy to thisproblem. In this paper, performances of Amplitude Clipping and Filtering, Selected Level Mapping (SLM), and PartialTransmitSequence (PTS) techniques of PAPR reduction in OFDM systems by parameter variations are analyzed, based on Complementary Cumulative Distribution Function. An attempt has been made to simulate clipping and filtering technique with iterations and the simulation shows that PAPR problem is reduced as number of iterations increases. The attempts have also been made to simulate SLM technique and PTS technique by varying number of phase sequences, number of sub-blocks in SLM, PTS respectively and simulation results shows that by increasing the number of phase sequences, sub-blocks, PAPR can be reduced significantly.The mathematical equations are incorporated here to compute the maximum expected PAPR from an OFDM signal which shows when there is phase alignment of all sub carriers and sub carriers are equally modulated, then signal peak value hits the maximum. Besides these computer simulations, a comparative study of these three techniques is done.
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
Abstract This paper deals with Real Time Operating System (RTOS) based secure wormhole detection and prevention in ad hoc networks. The wormhole attack can form a serious threat to wireless networks, especially against many ad hoc network routing protocols and location based wireless security systems. A wormhole is created in the ad hoc network by introducing two malicious nodes. These two nodes form a worm hole link and message is transmitted through this link. The next part of the work is to detect the wormhole link by defining worm hole detection and prevention algorithm. After detecting suspicious links, one node performs a verification procedure for each suspicious link. The detection procedure and verifying procedure of suspicious worm link are used for further prevention of wormhole attack in the ad hoc network.
Energy efficient mac protocols for wireless sensor networkijcsa
Wireless sensor network are the collection of individual nodes which are able to interact with physical
environment statically or dynamically by sensing or controlling physical parameter. Wireless sensor network
become a leading solution in many important applications such as intrusion detection, target tracking,
industrial automation etc. A major problem with WSN is to determining a most efficient protocol for
conserving energy of power source. The design of an energy- efficient Medium Access efficient Control
(MAC) protocol is one of the major issues in wireless sensor networks (WSN). In this paper we study some
characteristics of WSN that are important for the design of MAC layer protocols and give a brief introduction
of some newly come MAC protocols with reference to energy efficiency for WSN. In accordance with channel
access policies, MAC protocols are classified into four types, which are cross layer protocols, TDMA-based,
contention-based and hybrid, these are discussed in this paper.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNIJCNCJournal
In recent years, limited resources of user products and energy-saving are recognized as the major challenges of Wireless Sensor Networks (WSNs). Clustering is a practical technique that can reduce all energy consumption and provide stability of workload that causes a larger difference in energy depletion among other nodes and cluster heads (CHs). In addition, clustering is the solution of energy-efficient for maximizing the network longevity and improvising energy efficiency. In this paper, a novel OCE-CHS (Optimized Cluster Establishment and Cluster-Head Selection) approach for sensor nodes is represented to improvise the packet success ratio and reduce the average energy-dissipation. The main contribution of this paper is categorized into two processes, first, the clustering algorithm is improvised that periodically chooses the optimal set of the CHs according to the speed of the average node and average-node energy. This is considerably distinguished from node-based clustering that utilizes a distributed clustering algorithm to choose CHs based on the speed of the current node and remaining node energy. Second, more than one factor is assumed for the detached node to join the optimal cluster. In the result section, we discuss our clustering protocols implementation of optimal CH-selection to evade the death of SNs, maximizing throughput, and further improvise the network lifetime by minimizing energy consumption.
In order enhance the network efficiency of Mobile ad hoc Networks (MANETs), an Power Unbiased Cooperative Media Access Control(PUC-MAC) protocol in MANETs was planned during this paper. It adopted the most effective partnership choice statement to select the cooperative node with higher channel condition, higher passing rate and additional balanced power consumption. Simulation results showed that PUC-MAC outperforms EC-MAC,Cooperative MAC (CoopMAC) and IEEE 802.11 Distributed Coordination perform (DCF) in terms of the packet release quantitative relation, network outturn and network lifespan beneath 2 distinct channel noise levels, particularly beneath the worst channel condition.
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHijsrd.com
In heterogeneous sensor networks, certain nodes become cluster heads which aggregate the data of their cluster nodes and transfer it to the sink. An Improved Energy leach protocol for cluster head selection in a hierarchically clustered heterogeneous network to reorganize the network topology efficiently is proposed in this research work. The proposed algorithm will use thresholding to improve the cluster head selection. The presented algorithm considers the sensor nodes in wireless network and randomly distributed in the heterogeneous network. The coordinates of the sink and the dimensions of the sensor field are known in prior.
In wireless sensor network energy cutback is considered as a principle intensive challenge which is studied largely in the Wireless Sensor Networks (WSN) literature. Wireless Sensor Networks (WSNs) are pertinent in numerous arenas where WSNs may be used for sensing, ciphering, and communication elements that give a user or administrator the ability to instrument, observe, and retort to events and phenomena in a specific environment. But sensor devices are resource curbed, positioned in an open and unattended environment, different types of attacks and conventional techniques against these attacks are not desirable due to the resource constrained nature of these kinds of networks. An energy-balanced routing method based on forward-aware factor (FAF-EBRM) in which the next-hop node is elected according to the awareness of link weight and forward energy density. FAF-EBRM is compared with Ladder Diffusion Algorithm, which balances the energy utilization, sustain the function era and guarantees high QoS of WSN. The FAF-EBRM is proposed with Secure Routing Layer (SRL) Protocol which ensures that the secure data transmission is achieved without releasing private sensor readings and without introducing significant overhead on the battery-limited sensors.
Advance in the WIRELESS SENSOR NETWORK (WISENET) technology is energy efficient routing protocols that promises a wide range of potential applications in both civilian and military areas. In the WISNET the sensor node have a limited transmission range and their processing and storage capabilities as well as their energy sources are limited. So the Equalized Cluster Head Election Routing Protocol (ECHERP) and PEGASIS with Double Cluster Head (PDCH) pursues energy conservation through balanced clustering for Energy Efficiency. In WSN, energy efficient routing protocol is important to increase the network lifetime. ECHERP and PDCH both protocol claims to be energy efficient.
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...IJECEIAES
Multi Point Relays (MPRs) are those nodes that are calculated and determined by the Optimized Link State Routing protocol (OLSR) in order to minimize and avoid overload inside the Mobile Ad hoc Network (MANET). In this paper, we will present a synthetic study of many techniques and methods for calculating and selecting the MPR nodes using a set of criteria namely energy, mobility, bandwidth, the quality of links, etc. The result of this study shows that most techniques consider a limited number of metrics for selecting the MPR nodes and therefore they are insufficient to allow the OLSR protocol to be quite complete and efficient because several metrics can occur at the same time in the real execution environment.
With the increase of usage of wireless networks for purposes where the nodes are either stationary or minimally mobile, focus is also on increasing the network capacity of wireless networks. One such way is to use non-overlapping multiple channels provided by 802.11 by using multiple interfaces per node. Multiple non overlapped channels exist in the 2.4 GHz and 5 GHz spectrum. Under this scenario, several challenges need to be addressed before all the available channels can be fully utilized.
Performance analysis of papr reduction techniques in multicarrier modulation ...eSAT Journals
Abstract Orthogonal FrequencyDivisionMultiplexing (OFDM) is one of the many multicarrier modulation techniques which provide high spectral efficiency, less vulnerability to echoes,low implementation complexity and resilience to non – linear distortion. It is used in communication systems due to its various advantages. However, while this system is implemented problem of high peak – to – average power ratio(PAPR) is encountered. The reason behind this drawback is the existence of manyindependent subcarriers, due towhichthesignal amplitudecanhavehighpeakvalues as compared to average of whole system. The high PAPR in multicarrier transmission systems causes power degradation and spectrum spreading.Interleaving, Tone Reservation, Peak Reduction Carrier,Block Coding, Active Constellation Extension, Envelope ScalingareamongmanyPAPRreductionschemesthathavebeenproposedas a remedy to thisproblem. In this paper, performances of Amplitude Clipping and Filtering, Selected Level Mapping (SLM), and PartialTransmitSequence (PTS) techniques of PAPR reduction in OFDM systems by parameter variations are analyzed, based on Complementary Cumulative Distribution Function. An attempt has been made to simulate clipping and filtering technique with iterations and the simulation shows that PAPR problem is reduced as number of iterations increases. The attempts have also been made to simulate SLM technique and PTS technique by varying number of phase sequences, number of sub-blocks in SLM, PTS respectively and simulation results shows that by increasing the number of phase sequences, sub-blocks, PAPR can be reduced significantly.The mathematical equations are incorporated here to compute the maximum expected PAPR from an OFDM signal which shows when there is phase alignment of all sub carriers and sub carriers are equally modulated, then signal peak value hits the maximum. Besides these computer simulations, a comparative study of these three techniques is done.
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
Abstract This paper deals with Real Time Operating System (RTOS) based secure wormhole detection and prevention in ad hoc networks. The wormhole attack can form a serious threat to wireless networks, especially against many ad hoc network routing protocols and location based wireless security systems. A wormhole is created in the ad hoc network by introducing two malicious nodes. These two nodes form a worm hole link and message is transmitted through this link. The next part of the work is to detect the wormhole link by defining worm hole detection and prevention algorithm. After detecting suspicious links, one node performs a verification procedure for each suspicious link. The detection procedure and verifying procedure of suspicious worm link are used for further prevention of wormhole attack in the ad hoc network.
Energy efficient mac protocols for wireless sensor networkijcsa
Wireless sensor network are the collection of individual nodes which are able to interact with physical
environment statically or dynamically by sensing or controlling physical parameter. Wireless sensor network
become a leading solution in many important applications such as intrusion detection, target tracking,
industrial automation etc. A major problem with WSN is to determining a most efficient protocol for
conserving energy of power source. The design of an energy- efficient Medium Access efficient Control
(MAC) protocol is one of the major issues in wireless sensor networks (WSN). In this paper we study some
characteristics of WSN that are important for the design of MAC layer protocols and give a brief introduction
of some newly come MAC protocols with reference to energy efficiency for WSN. In accordance with channel
access policies, MAC protocols are classified into four types, which are cross layer protocols, TDMA-based,
contention-based and hybrid, these are discussed in this paper.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNIJCNCJournal
In recent years, limited resources of user products and energy-saving are recognized as the major challenges of Wireless Sensor Networks (WSNs). Clustering is a practical technique that can reduce all energy consumption and provide stability of workload that causes a larger difference in energy depletion among other nodes and cluster heads (CHs). In addition, clustering is the solution of energy-efficient for maximizing the network longevity and improvising energy efficiency. In this paper, a novel OCE-CHS (Optimized Cluster Establishment and Cluster-Head Selection) approach for sensor nodes is represented to improvise the packet success ratio and reduce the average energy-dissipation. The main contribution of this paper is categorized into two processes, first, the clustering algorithm is improvised that periodically chooses the optimal set of the CHs according to the speed of the average node and average-node energy. This is considerably distinguished from node-based clustering that utilizes a distributed clustering algorithm to choose CHs based on the speed of the current node and remaining node energy. Second, more than one factor is assumed for the detached node to join the optimal cluster. In the result section, we discuss our clustering protocols implementation of optimal CH-selection to evade the death of SNs, maximizing throughput, and further improvise the network lifetime by minimizing energy consumption.
In order enhance the network efficiency of Mobile ad hoc Networks (MANETs), an Power Unbiased Cooperative Media Access Control(PUC-MAC) protocol in MANETs was planned during this paper. It adopted the most effective partnership choice statement to select the cooperative node with higher channel condition, higher passing rate and additional balanced power consumption. Simulation results showed that PUC-MAC outperforms EC-MAC,Cooperative MAC (CoopMAC) and IEEE 802.11 Distributed Coordination perform (DCF) in terms of the packet release quantitative relation, network outturn and network lifespan beneath 2 distinct channel noise levels, particularly beneath the worst channel condition.
A Review: Welding Of Dissimilar Metal Alloys by Laser Beam Welding & Friction...IJERA Editor
Welding of dissimilar metals has attracted attention of the researchers worldwide, owing to its many advantages and challenges. There is no denial in the fact that dissimilar welded joints offer more flexibility in the design and production of the commercial and industrial components. Many welding techniques have been analyzed to join dissimilar metal combinations. The objective of this paper is to review two such techniques – Laser welding and Friction stir welding. Laser beam welding, a high power density and low energy-input process, employs a laser beam to produce welds of dissimilar materials. Friction stir welding, a solid-state joining process, is also successfully used in dissimilar welding applications like aerospace and ship building industries. This paper summarizes the trends and advances of these two welding processes in the field of dissimilar welding. Future aspects of the study are also discussed.
госпрограмма постановление от 19 июля 2013 г. № 330 ппpatriot29
Постановление от 19 июля 2013 г. № 330-пп г. Об утверждении государственной программы Архангельской области «Патриотическое воспитание, развитие физической культуры, спорта, туризма и повышение эффективности реализации молодежной политики в Архангельской области (2014 – 2020 годы)»
Adsorptive Removal Of Dye From Industrial Dye Effluents Using Low-Cost Adsorb...IJERA Editor
Industrial, agricultural, and domestic activities of humans have affected the environmental system, resulting in drastic problems such as global warming and the generation of wastewater containing high concentration of pollutants. As water of good quality is a precious commodity and available in limited amounts, it has become highly imperative to treat wastewater for removal of pollutants. In addition, the rapid modernization of society has also led to the generation of huge amount of materials of little value that have no fruitful use. Such materials are generally considered as waste, and their disposal is a problem. The utilization of all such materials as low-cost adsorbents for the treatment of wastewater may make them of some value. An effort has been made to give a brief idea about the low-cost alternative adsorbents with a view to utilizing these waste/low-cost materials in the treatment of wastewater.
Green Roofs and Green Building Rating SystemsIJERA Editor
The environmental benefits for green building from the Leadership in Energy and Environment Design (LEED)
and Ecology, Energy, Waste, and Health (EEWH) rating systems have been extensively investigated; however,
the effect of green roofs on the credit-earning mechanisms is relatively unexplored. This study is concerned with
the environmental benefits of green roofs with respect to sustainability, stormwater control, energy savings, and
water resources. We focused on the relationship between green coverage and the credits of the rating systems,
evaluated the credits efficiency, and performed cost analysis. As an example, we used a university building in
Keelung, Northern Taiwan. The findings suggest that with EEWH, the proposed green coverage is 50–75%,
whereas with LEED, the proposed green coverage is 100%. These findings have implications for the application
of green roofs in green building.
Un workshop per imparare a guardare, a comporre una fotografia e gestire lo sguardo di chi osserva le nostre fotografie con l'obiettivo di produrre immagini "significative" perché vedere non è guardare e mostrare è qualcosa di diverso ancora, ovvero:
• guardare v. tr. e intr. [dal germ. wardōn] (come intr., aus. avere). –
1. Dirigere gli occhi, fissare lo sguardo su qualche oggetto (non include necessariamente l’idea del vedere, in quanto si può guardare senza vedere, così come si può vedere qualche cosa senza rivolgervi intenzionalmente o coscientemente lo sguardo…
• vedére v. tr. [lat. vĭdēre]
… indicando, oltre la sensazione visiva, anche l’intenzione, la volontà di avere tale sensazione (con sign. analogo a guardare)…
… Con riferimento a scritti, esaminare, leggere…
…avere discernimento, capire
• mostrare v. tr. [lat. monstrare, der. di monstrum: v. mostro2] (io móstro, ecc.). –
1. a. Far vedere, presentare ad altri perché veda, esamini, osservi…
in September 2014, the Buffalo History Museum unveiled its first exhibit of Hispanic history in the Buffalo, NY area. Here are the exhibit panels. Many thanks to Casimiro Rodriguez and the Hispanic Heritage Council.
“Optimizing the data transmission between multiple nodes during link failure ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETEditor IJCATR
A lot of research has been done on different coding techniques and benefits of their use in wired networks Since
network coding was raised as a basic method for increasing network outpouring and reaching the capacity of
networks. However, wireless networks are suffering from low operating power as the use of NC concept in
MANET principally improves throughput rate in the wireless network .
The delay can be considered as an important parameter in networks and system delayed is not acceptable in
these networks. However, the acceptable delay depends on the application although the efficiency and
throughput leads to an increase in network coding , a reduction in bandwidth consumption, and a delay in
sending packets is reduced by using network coding. In this study, a method is proposed for coding in the
MANET, decreasing the number of sent packets, leading to a reduction in that dela
The main aim of energy efficient routing is to
minimize the energy required to transmit or receive packets also
called as active communication energy. Inactive energy is the
energy which not only tries to reduce the energy consumed
when a mobile node stays idle but also listens to the wireless
medium for any possible communication requests from other
nodes. To conserve energy, many energy efficient routing
protocols have been proposed. Networks of small, inexpensive,
disposable, smart sensors are emerging as a new technology with
tremendous potential. Wireless sensor networks can be randomly
deployed inside or close to phenomenon to be monitored. The
advantage of these networks is the fact that they are selfconfiguring,
which means that a sensor network can be deployed
randomly on a battlefield, in a disaster area or in an inaccessible
area without the need for human intervention. The energy
supplies of nodes are not replenished or replaced and therefore
nodes only participate in the network for as long as they have
energy. This fact necessitates energy efficiency in the design of
every aspect of such nodes. Energy consumption in sensor nodes
occurs mainly due to computational processing and, to a greater
extent, communication. The routing protocol employed by these
sensor nodes can minimize the number of transmissions that
nodes make as well as the computational complexity of routing
path selection. It is therefore of critical importance that the
routing protocol be designed with energy efficiency in mind.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...acijjournal
Wireless sensor networks consists of thousands of tiny, low cost, low power and multifunctional sensor nodes where each sensor node has very low battery life. Purpose is to conserve the transmitted energy
from various sensor nodes. Various energy efficient algorithms have been designed for this. LEACH uses
distributed cluster formation & randomized rotation of the cluster head to minimize the network energy
consumption. Our paper is proposing an algorithm which is the enhancement of existing IB-LEACH. It reduces the energy consumption by using energy bank. This energy bank stores the energy after each round in both routing and clustering phase which overall increases the life time of the network. In this
approach, ACTIVE_ROUTE_TIMEOUT is also enhanced by shamming the static parameters of HELLO_INTERVAL, RREQ_RETRIES and NET_DIAMETER. Results are compared through MATLAB and provide better approach than previous ones.
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...IJEACS
Energy is one of the main network resources that is used in mobile devices. We proposed an energy efficient routing techniques called reliable minimum energy cost routing (RMECR) and comparing with reliable minimum energy routing (RMER) which are used by the nodes in the most efficient manner. RMER and RMECR works on the basis of balancing the energy of the nodes so that the nodes with maximum energy can do the work and the nodes with less than certain threshold energy required to do a certain amount of work will not do any work. Thereby we try to raise the network reliability and lifetime of communication in a network of mobile devices. The proposed RMECR protocol is also used to decrease the cost of communication in a wireless networking environment.
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...IJERA Editor
Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network with
infrastructure less environment to establish a data transmission between nodes within the network. A routing
protocol is used to discover routes between nodes. In this paper, we study the three existing routing protocols
namely AODV, DSDV and DSR to analyze theirperformance based on set of parameters.AODV and DSR
deliver almost all the packets compared to DSDV. Hence we try to modify the AODVprotocol and use in the
cooperative transmission.
In this paper, we study the cooperative transmission at the network layer and cooperative diversity at the
physical layer as a joint optimization of the transmission power in a Mobile Ad-Hoc Network (MANET) with
static channel. However due to variable wireless channels static routing is suboptimal. Proposed protocol
proactively selects forwarding nodes that work cooperatively forwarding the packet towards the destination.
Cooperative transmission side diversity helps in reducing interference. Diversity can be achieved at the physical
layer by coordinating the multiple nodes. Nodes are equipped with Omni-directional antenna and take the
advantages of transmission side diversity to achieve energy saving, under the assumption that channel gains are
available at the transmitters.
The proposed Opportunistic Minimum Cost Cooperative Transmission Shortest Path (OMCTSP) algorithms
select the best optimum route with minimum cost in terms of energy, number of hops, available bandwidth, link
quality (SNR) and outage probability. As the network becomes larger, finding optimal routes becomes
computationally intractable as the complexity of the dynamic programming (DP) approach increases as o (22n)
where n is the number of nodes in the networks. Hence we develop two suboptimal algorithms have complexity
of o (n2) perform as same as optimal algorithm. Also developthe Opportunistic Cooperative Routing in MANET
(O_CORMAN), which is a network layer opportunistic routing scheme for mobile ad hoc networks. Nodes in
the network use the components proactive routing protocol, forwarder list update and local re-transmission. We
evaluate the performance using NS 2.32 simulator there is significant performance improvement with respect to
energy, throughput packet delivery, and delay compared with Modified AODV (OMCTSP).
Performance Analysis of Enhanced Opportunistic Minimum Cost Routingin Mobile ...IJERA Editor
Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network with
infrastructure less environment to establish a data transmission between nodes within the network. A routing
protocol is used to discover routes between nodes. In this paper, we study the three existing routing protocols
namely AODV, DSDV and DSR to analyze theirperformance based on set of parameters.AODV and DSR
deliver almost all the packets compared to DSDV. Hence we try to modify the AODVprotocol and use in the
cooperative transmission.
In this paper, we study the cooperative transmission at the network layer and cooperative diversity at the
physical layer as a joint optimization of the transmission power in a Mobile Ad-Hoc Network (MANET) with
static channel. However due to variable wireless channels static routing is suboptimal. Proposed protocol
proactively selects forwarding nodes that work cooperatively forwarding the packet towards the destination.
Cooperative transmission side diversity helps in reducing interference. Diversity can be achieved at the physical
layer by coordinating the multiple nodes. Nodes are equipped with Omni-directional antenna and take the
advantages of transmission side diversity to achieve energy saving, under the assumption that channel gains are
available at the transmitters.
The proposed Opportunistic Minimum Cost Cooperative Transmission Shortest Path (OMCTSP) algorithms
select the best optimum route with minimum cost in terms of energy, number of hops, available bandwidth, link
quality (SNR) and outage probability. As the network becomes larger, finding optimal routes becomes
computationally intractable as the complexity of the dynamic programming (DP) approach increases as o (2
2n)
where n is the number of nodes in the networks. Hence we develop two suboptimal algorithms have complexity
of o (n2) perform as same as optimal algorithm. Also developthe Opportunistic Cooperative Routing in MANET
(O_CORMAN), which is a network layer opportunistic routing scheme for mobile ad hoc networks. Nodes in
the network use the components proactive routing protocol, forwarder list update and local re-transmission. We
evaluate the performance using NS 2.32 simulator there is significant performance improvement with respect to
energy, throughput packet delivery, and delay compared with Modified AODV (OMCTSP).
Active Path Updation For Layered Routing (Apular) In Wireless Mesh Networkschetan1nonly
Routing is the major research issues in the Wireless Mesh Network (WMN). Ad-hoc networks routing protocols can be applied for WMN, but due to limited success & less efficiency there is need of more efficient routing protocols. In Infrastructure Wireless Mesh Routing Architecture (IWMRA) routing protocol, source node initiates a path establishing process whenever path breaks. This is not an ideal method in WMN where every nodes rather than source and destination in the path are motionless. One way of overcoming this is by initiating the local route repair by destination node. In this paper, we propose an active path updating procedure APULAR for quickly repair the broken path. Moreover, to improve throughput and to reduce the co-channel interference, we use multiple interface with multi channels. We are considering 4-hop as an interference range and will use fixed channel assignment within the mesh routers to reduce the inter flow interference. Our procedure is simulated in NS2 and compared with AODV – MI3 and APULAR-MI2, APULAR-MI3, APULAR-MI5. Simulation results show that our protocol performs better AODV in key performance metrics like packet delivery ratio, control overhead, average throughput and end-to-end delay.
Iterative network channel decoding with cooperative space-time transmissionijasuc
One of the most efficient methods of exploiting space diversity for portable wireless devices is cooperative
communication utilizing space-time block codes. In cooperative communication, users besides
communicating their own information, also relay the information of other users. In this paper we
investigate a scheme where cooperation is achieved using two methods, namely, distributed space-time
coding and network coding. Two cooperating users utilize Alamouti space time code for inter-user
cooperation and in addition utilize a third relay which performs network coding. The third relay does not
have any of its information to be sent. In this paper we propose a scheme utilizing convolutional code based
network coding, instead of conventional XOR based network code and utilize iterative joint networkchannel
decoder for efficient decoding. Extrinsic information transfer (EXIT) chart analysis is performed to
investigate the convergence property of the proposed decoder.
Design and implementation of new routingIJCNCJournal
Energy consumption is a key element in the Wireless Sensor Networks (WSNs) design. Indeed, sensor nodes are really constrained by energy supply. Hence, how to improve the network lifetime is a crucial and challenging task. Several techniques are available at different levels of the OSI model to maximize the WSN lifetime and especially at the network layer which uses routing strategies to maintain the routes in the network and guarantee reliable communication. In this paper we intend to propose a new protocol called
Combined Energy and Distance Metrics Dynamic Routing Protocol (CEDM-DR). Our new approach considers not only the distance between wireless sensors but also the energy of node acting as a router in order to find the optimal path and achieve a dynamic and adaptive routing.
The performance metrics exploited for the evaluation of our protocol are average energy consumed, network lifetime and packets lost. By comparing our proposed routing strategy to protocol widely used in WSN namely Ad hoc On demand Distance Vector(AODV), simulation results show that CEDM-DR strategy might effectively balance the sensor power consumption and permits accordingly to enhance the network
lifetime. As well, this new protocol yields a noticeable energy saving compared to its counterpart.
Wireless Sensor Networks (WSNs)have sensor nodes that sense and extract information from surrounding environment, processing information locally then transmit it to sink wirelessly. Multimedia data is larger in volume than scalar data, thus transmitting multimedia data via Wireless Multimedia Sensor Networks (WMSNs) requires stick constraints on quality of services in terms of energy, throughput and end to end delay.Multipath routing is to discover multipath during route discovery from source to sink. Discover multipath and sending data via these different paths improve the bandwidth and decrease the end to end delay. This paper introduces an Energy Location Aware Routing Protocol (ELARP) which is reactive multipath routing protocol establishing three paths with awareness of node’s residual energy and distance. ELARP has experimented with NS2 simulator. The simulation results show that ELARP enhances QoS for multimedia data in terms of end to end delay and packet delivery ratio.
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IJNSA Journal
With the rapid growth of wireless communication infras,,tructure over the recent few years, new challenges has been posed on the system and analysis on wireless adhoc networking. Implementation of MIMO communication in such type of network is enhancing the packet transmission capabilities. There are different techniques for cooperative transmission and broadcasting packet in MIMO equipped Mobile Adhoc Network. We have employed a model network in the OPNET environment and propose a new scheduling algorithm based on investigating the different broadcasting algorithm. The new broadcasting algorithm improves the packet transmission rate of the network based on energy performance of the network and minimizes the BER for different transmission mode which is illustrated in this paper. The simulations are done in MATLAB and OPNET environment and the simulated result for the packet transmission rate are collected and shown in the tabular form. Also simulate the network for generating a comparative statement for each mobile node. And performance analysis is also done for the model network. The main focus is to minimize BER and improve information efficiency of the network.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Similar to Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath Routing Protocol For Multicast Network (20)
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Key Trends Shaping the Future of Infrastructure.pdf
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath Routing Protocol For Multicast Network
1. Gunjal M.S. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 3), December 2014, pp.78-83
www.ijera.com 78 | P a g e
Energy Efficient Wireless Sensor Network Using Network Coding
Based Multipath Routing Protocol For Multicast Network
Gunjal M.S.1
, Prof.S.A.Shaikh2
*(Department of Electronics & Telecommunication, PUNE University, Loni-413736)
** (Department of Electronics & Telecommunication, PUNE University, Loni-413736)
ABSTRACT
Network Coding is most promising aspect of WSN. This Network Coding method is combined with multipath
routing protocol to form NCMR protocol.(network coding based multipath routing protocol).This protocol is
used to obtain energy efficient wireless sensor network.. These protocol leads to decrease the number of
constrain routes & the total time of transmission. This protocol is applied on unicast and multicast network
separately. And comparison is done with traditional multipath routing protocol for same unicast and multicast
network. Simulation result shows energy consumption of NCMR multicast is lower than NCMR unicast and
also than TMR unicast as well as multicast. This work is proved by the simulation analysis results. The used
multipath model is based on braided multipath routing, and the network coding method is random linear
network coding (practical network coding). In braided network multiple paths to the sink nodes are created for
each source node, and the packets encoded at source nodes are transmitted through the braided multipath
network model. Then, intermediate nodes re-encode these received packets and transfer these new packets to
next cluster. Finally, the multiple sink nodes decode the packets received from different paths and recover the
original data. Results of the analysis show that multicast NCMR provides more reliability. We compare
multicast NCMR routing protocol with NCMR unicast & also with traditional multipath routing protocol for
unicast and multicast networks, in terms of the packet loss, energy consumption, successful delivery ratio & end
to end delay when a packet is transmitted Some special simulations are carried out specially for NCMR
multicast i.e. effect of number of nodes on energy consumption, packet loss & end to end delay.
Keywords - Wireless Sensor Network, Multipath Routing, Network Coding, Energy efficiency, TMR, NCMR
I. INTRODUCTION
A wireless sensor network is a collection of no.
of nodes deployed in work place. Every sensor node
consist of three subsystems are sensor subsystem,
processing subsystem &communication subsystem.
Individual sensor have limited sensing region,
processing power & energy. Networking a large
number of sensors gives rise to robust, reliable &
accurate sensor network covering wider region. The
WSN may consist of 1000s or 10000s nodes. There
are two important features of WSN.First is nodes in
WSN’s transmit the data through wireless channels,
but mostly the link quality of wireless channel is bad
due to instability. And second is nodes are used
batteries as power supply. But the battery life is
limited. Therefore a reliable WSN can be
considering with low energy consumption & higher
successful delivery ratio.
A lot of work is done & different technologies
are developed to improve the energy efficiency &
SDR of WSNs.Multipath routing [10-15] is one of
the technology used to increase reliability of
wireless sensor network. This technique creates no.
of path from each source node to sink (destination
node).Due to this no. of duplicate data copies are
sent through this path. This process increases
reliability by increasing redundancy & redundancy
results in more energy consumption. Forward error
correcting is another technology which also
increases reliability. In FEC technique the sender
encodes the initial data to new codeword with some
redundant bit. Some bits of the data may become
garbage in the channel during the transmissions, but
at the end receiver can retrieve the authentic data
with the redundant bits while the number of
inaccurate bits is not more than the correcting
capacity of FEC. Means it improves the reliability
without retransmission, which is convenient for
wireless networks. But, the disadvantage of FEC is
that in FEC all the original data bits and redundant
data bits in the same packets, and if any one of the
nodes in the route stop working, the packets cannot
successfully transport, so FEC scheme is not
efficient for WSNs. Ideal WSNs should satisfied the
following three requirement. First, it should
decreases the data redundancy. Secondly, it should
avoid retransmission. Third, it is durable to failure of
nodes. Network coding may satisfied that three
requirements. Network coding combine with
multipath routing to obtain energy efficient wireless
sensor network. But this system is implemented for
RESEARCH ARTICLE OPEN ACCESS
2. Gunjal M.S. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 3), December 2014, pp.78-83
www.ijera.com 79 | P a g e
multicast network model & some intermediate nodes
are considered to be coded.
The flow of this paper is listed as follows.
First, we propose a energy efficient WSN using
NCMR, that help to reduce the number of required
paths and the times of data transmissions. Second,
we compare NCMR routing protocol with traditional
multipath routing protocol for unicast and multicast
network, in terms of the signal delivery ratio, energy
consumption ,packet loss & end to end delay. In
third, we show that different parameters with respect
to number of nodes for NCMR multicast.
The remainder part of this paper is
organized as follows. In Section II, network coding.
In section III, network model used in simulation is
described. In Section IV, we design different
algorithms to permit network coding to worked on
braided multipath networks so that we can obtain the
simulation results. In Section V, We show the results
of extensive simulations , the last section
summarizes the main conclusion.
II. NETWORK CODING SCHEME
In Network coding [1,9] scheme the
intermediate nodes combine packets before
forwarding. Due to this practice of network coding
total no. of transmission & time of transmission is
reduced. Figure.1 shows the random linear network
coding means when there are data to be transmitted
from the source node, these packets are split into K
packets. The source node randomly selects (K+n) ×
K elements from a Galois field to be a coefficient
matrix, and code these K original packets into (K+n)
new packets. Multiply each row vector of the
coefficient matrix by the K original packets is a new
packet which is a linear mixture of these original
packets. Intermediate nodes which are coded nodes
need to be recoding the received packets, and then
these recoded packets send to next cluster. At last
when the destination node successfully receives K
packets of these (K+n) packets, it decodes and
retrieve original data.
Fig.1. Random linear network coding[15]
III. NETWORK MODEL
There are two models of multipath n/w model. Figure
2 shows one of that braided multipath routing model &
another is disjoint n/w model. The braided multipath n/w
model is unicast consist of single source & sink
(destination node) & many intermediate nodes. We
assume that N is no. of paths, therefore total number of
nodes in a cluster is equal to N. There are N-1 backup
nodes for each intermediate node.
Figure.2.Unicast network model[15]
3. Gunjal M.S. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 3), December 2014, pp.78-83
www.ijera.com 80 | P a g e
Figure.2.Unicast network model[15]
Multicast Network Model
There is only one source node and sink node in
unicast models, and base paper shows that network
coding is dominant in both unicast network and
multicast network model. Fig.3 shows the network
models with single source and multiple sinks are
worthwhile to address i.e. multicast Multicast (one
to-many) is a communication sample in which a
source node sends a message to a group of
destination nodes. Again, multicast network can be
established by sending different unicast (point-to-
point) messages to each of the destination nodes.
There are many cause which make the multicasting
advisable. The first major advantage of using
multicasting is the decreases of the network load.
There are many applications like ticker applications
which are used to transfer packets to different of
stations .The packets sent to these stations share a
group of links on their paths to their destinations. As
multicasting requires the broadcasting of only a
single packet by the source and replicates this
packets at the sink node. Only drawback is multicast
transmission can consume more network bandwidth.
IV. ALGORITHMS FOR PROTOCOL
DESIGN
To obtain simulation result we require a
protocol to facilitate network coding to be deployed
in a braided multipath routing network. Similar to
other routing protocols, the protocol also mainly
consists of routing discovery algorithm, data
disseminating algorithm, and routing maintenance
algorithm.[15]
4.1 Algorithm [15]
1: Routing discovery algorithm Demand: It is
assume that source node must have
knowledge of link quality.
1: //Step 1. To obtain the minimum hops to
sink node
2: The destination (sink) nodes overflow a
route recognition packet (RRP).
3: For each node except destination node
receiving RRP
4: Then transfer ahead the packet.
5: Updates the shortest route to destination and
report all the nodes in the shortest route.
6: Report and updates the number of hops of
the shortest route (H).
7: End
8: //Step2. Routing founding
9: The source node S calculates the number of
essential paths (N) that is equivalent to no.
of total nodes.
10: Then node S sends the value of N to its next
node in downward direction P which is the
first hop in the shortest route to the
destination.
11: Node P finds other N - 1 nodes to provide as
its (supporting) backup nodes. These N
nodes form a (bunch) cluster.
12: Node P sends the value of N to its next
downstream node Q, and node Q performs
the same role as in step 11.
13: If destination (sink) node is reached
14: Finish routing founding.
15: Else
16: Continue routing founding.
17: End
In routing discovery stage, any intermediate node is
used for data transmission must record source nodes
in its cache.
4.2 Algorithm 2: Data Disseminating
Demand: Operations on Galois field are previously
implemented in sensor nodes.
1: //Step 1. Programming at source node
2: The source node S programmes the original K
packets into K’ new packets.
3: Send the new packets to next hop.
4. Gunjal M.S. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 3), December 2014, pp.78-83
www.ijera.com 81 | P a g e
4: //Step2. Programming at intermediate nodes
5: For each intermediate node
6: If no. of received packets are R>=K%R
7: Then arbitrarily generates a K*K matrix M
to be local coding kernel.
8: Encodes these R packets into K new packets
with matrix M.
9: Else
10: Arbitrarily generates a R*R matrix M to be
local coding kernel
11: Encodes these R packets into R’ new packets
with matrix M.
12: End
13: Transfer the new packets to next hop.
14: End
15: //Step3. Decoding by the destination node
16: If R > = K
17: The destination node recollect the original
packets through Gaussian elimination.
18: End
4.3 Algorithm 3: Routing maintenance
Demand of Algorithm: The routing maintenance
packet (RMP) should be broadcast periodically by
source node.
1: For each head node of cluster receiving
RMP
2: If RMP is from upstream cluster
3: Then forwards it to downstream cluster
4: Else if RMP is from its supporting (backup)
nodes.
5: Save the node identification and increment
counter with 1
6: Answer a message to the backup node.
7: End
8: Then transfer these RMP to the head node of
cluster of next hop.
9: End
10: If counter <N
11: If it selects (N-counter) free nodes to be its
backup nodes.
12: End
13: For each supporting (backup) node receiving
RMP
14: Transmit the RMP to head node of cluster
and waits for a respond.
15: If reply is not received % Cluster-head node
get fails.
16: Choose a new head node of cluster and finds
a new supporting (backup) node.
17: End
18: At the end, the destination node discards
RMP.
4.4 Experimental Set-Up
Table.1 Simulation Parameters
VI. RESULT ANALYSIS
Simulation are done on NCMR unicast and
multicast network as well as TMR multicast and
comparison is done.The graphical result shows that
energy consumption of NCMR multicast is less as
compare to NCMR unicast and TMR unicast as well
as multicast.Fig.4 shows graph of energy
consumption versus bit error rate.Fig.5 shows graph
of successful delivery ratio versus bit error rate.It
observed that SDR of NCMR for multicast is more
than SDR of NCMR for unicast & TMR for unicast
as well as multicast. The comparison is also done in
terms of end to end delay and packet loss.(Fig.6 & 7)
Fig .4. Energy Consumption
Parameters Values Parameters Values
Network plot
300 × 100
m2
Mac layer
protocol
CSMA
Carrier
frequency
2.413e+6Hz
No. of Sink
nodes
04
Max sending
power
50 mw
Net layer
head length
32 bit
Mac layer
head length
24 bit
No. of
source
nodes
01
5. Gunjal M.S. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 3), December 2014, pp.78-83
www.ijera.com 82 | P a g e
Fig.5.Sucessfull Delivery Ratio
Special simulations are carried out on NCMR
for mulicast network .The Fig 8 shows a graph
number of nodes Vs end to end delay, packet loss in
Fig 9,average energy consumption Fig.10.Graphs
shows as no of nodes increases the energy
consumption increases ,End to end delay decreases
and packet loss also decreases.
Fig.6.End to End Delay
Fig.7.Packet Loss
Fig.8.Nodes Vs End to End Delay
Fig.9.Nodes Vs packet loss
6. Gunjal M.S. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 12( Part 3), December 2014, pp.78-83
www.ijera.com 83 | P a g e
Fig.10.Nodes Vs energy consumption
VII. CONCLUSION
We develop a energy efficient ,network coding
based multipath routing protocol for multicast
network,which forwards packets through multiple
paths dynamically based on path durability and
coding opportunity. Comparative study is done
interms of different parameters for unicast and
multicast networks. And it is observed that NCMR
(for multicast) produces higher reliability and energy
efficiency. The NCMR with multiple sink & single
source node is employed. The results of simulations
show that NCMR for multicast is more efficient than
NCMR for unicast & TMR. Some special
simulations are carried out for NCMR(multicast) to
check efficiency.
FUTURE SCOPE
In terms of future work we can consider some
other parameters for simulation to prove that NCMR
is more reliable and energy efficient than traditional
multipath routing protocol. And it is assumed that
many intermediate nodes in the network are
permitted to carry out network coding, which
increases more processing work of nodes. So in
future we can decrease the no. of coded nodes.
References
[1] R. Ahlswede, N. Cai, S. R. Li, and R. W.
Yeung. Network information flow. IEEE
Transactions on Information Theory,
(4):1204–1216, 2000.
[2] D. Bein and S. Q. Zheng. An effective
algorithm for computing energy-efficient
broadcasting trees in all-wireless networks.
In Proc. of IEEE ICDCS, 2008 28
[3] P. Chaporkar and A. Proutiere. Adaptive
network coding and scheduling for
maximizing throughput in wireless
networks. In Proc. of ACM MobiCom, 2007.
[4] F. Dai and J. Wu. Efficient broadcasting in
ad hoc wireless networks using directional
antennas. IEEE Transactions on Parallel
and Distributed Systems, (4):1–13, 2006.
[5] F. Delgosha, E. Ayday, K. Chan, and F.
Fekri. Security services in wireless sensor
networks using sparse random coding. In
Proc. of IEEE INFOCOM, 2007.
[6] A. Dimakis, B. Godfrey, M.Wainwright, and
K. Ramchandran. Network coding for
distributed storage in peer-to-peer networks.
In Proc. of IEEE INFOCOM, 2007.
[7] C. Fragouli, J.Widmer, and J.-Y L. Boudec.
A network coding approach to energy
efficient broadcasting: from theory to
practice. In Proc. of IEEE INFOCOM,
2006..
[8] X. Y. Li, Y. Wu, S. J. Tang, and X. H. Xu.
Broadcast capacity for wireless ad hoc
networks. In Proc. Of IEEE MASS, 2008.
[9] J. Liu, D. Goeckel, and D. Towsley. Bounds
on the gain of network coding and
broadcasting in wireless networks. In Proc.
of IEEE INFOCOM, 2007.
[10] W. Lou and J. Wu. On reducing broadcast
redundancy in ad hoc wireless networks.
IEEE Transactions on Mobile Computing,
(2):111–122, 2002.
[11] A. Mohammed, M. Ould-Khaoua, L. M.
Mackenzie, and J. Abdulai. An adjusted
counter-based broadcast scheme for mobile
ad hoc networks. In Proc. of the Tenth
International Conference on Computer
Modeling and Simulation (UKSIM), 2008.
[12] W. Navidi and T. Camp. Stationary
distributions for the random waypoint
mobility model. IEEE Transactions on
Mobile Computing, (1):99–108, 2004. 29
[13] S. Pleisch, M. Balakrishnan, K. Birman, and
R. Renesse. MISTRAL: Efficient flooding in
mobile ad-hoc networks. In Proc. of ACM
MobiHoc, 2006.
[14] S. Sengupta, S. Rayanchu, and S. Banerjee.
An analysis of wireless network coding for
unicast sessions: The case for coding-aware
routing. In Proc. of IEEE INFOCOM, 2007.
[15] Lei Wang, Yuwang Yang* and Wei Zhao,
Network coding-based multipath routing for
energy efficiency in wireless sensor
networks EURASIP Journal on Wireless
Communications and Networking 2012,
2012:115