SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 07 | Jul-2014, Available @ http://www.ijret.org 405
“OPTIMIZING THE DATA TRANSMISSION BETWEEN MULTIPLE
NODES DURING LINK FAILURE IN WIRELESS NETWORK”
Santosh S.Chinchali 1
, Vasudha V.Ayyannavar2
1
Department of Computer Science and engineering, Basaveshwar College Of Engineering,Bagalkot / Visvesvaraya
Technological University,Belagum
2
Department of Computer Science and engineering, Basaveshwar College Of Engineering,Bagalkot / Visvesvaraya
Technological University,Belagum
Abstract
The nodes in wireless network are mobile resulting in dynamic topology with high rate of link breakage and network partitions
leading to interruptions in the ongoing communication in contrast to wired network. In the networks the link failure may be
occurred due to a loss of energy in nodes, congestion, and power loss in nodes. Routing techniques help in path establishment for
transmission. The existing routing protocols suffer from overhead causing energy loss which may be further aggravated by link
failures. Different techniques can be used to prevent one path failure and this system uses multipath routing to overcome this issue.
In this technique the system uses network coding protection for both single and multiple link failures. The system states that in
connection each node receives a multiple copies of same data, first copy from the primary path and second copy from secondary
path. In order to improve the performance, data is to be transmitted through the secondary path is compressed using Huffman
coding in order to save the energy consumption. And encoding mechanism is used for providing security for the data transmitted
between source to destination. This will ensure the recovery of data in failure of working path.
---------------------------------------------------------------------***--------------------------------------------------------------------
1. INTRODUCTION
Wireless network works in the situations where certain
number of nodes comes together within the transmission
range of each other and they can be able to communicate.
Wireless network topology frequently changes and nodes
will be having limited power. Because of this the routing is
challenging issue in wireless network.
Most of the energy related study has been done at routing
layer to reduce energy consumption in transmission. And
few have explored the idea to reduce the energy
consumption due to routing overheads, which requires the
cross layer design approach. In the transmission of data if
link failure occurs, the source node of that link has to wait
for timeout interval. And also has to inform all the nodes
using the same path by sending (Route Error) RERR
packets, to find another route. So the transmission interrupts
for a significant amount of time. In performing these
activities amount of energy is consumed. So this survey
gives an insight by studying the various routing techniques
that the energy consumption is due to Routing overheads
and link failures.
Transmission of data in the network during congestion will
not ensure the end to end delivery. When huge number of
users send the data to the destination by using same link, if
the link fails due to congestion, then it is not possible to
provide end to end delivery in short time. So by using an
optimization technique for data transmission between the
nodes will provide the guaranteed delivery to the destination
during link failure.
The system should adopt the concept of backup paths and
should transmit data through two paths such that the
destination receives multiple copies of data. If the
transmission line is withdrawn or corrupted, then the data
received from the other path is used. This increases the
packet delivery ratio and latency as number of
retransmissions is substantially minimized.
Despite the innumerable applications of wireless networks,
these networks have several limitations such as limited
energy supply, limited computing power, and limited
bandwidth of the wireless links connecting nodes. One of
the main design goals of wireless network is to prolong the
lifetime of the network and prevent connectivity degradation
by employing aggressive energy management techniques.
The design of routing protocols in wireless network is
influenced by many challenging issues.
One of the challenging design issues in routing is energy
consumption without losing accuracy. Nodes can use their
limited amount of energy in computations and transmitting
information in a wireless environment. So energy-
conserving forms of communication and computation are
essential. In a multihop wireless network, each node plays
dual role as data sender and data router. The malfunctioning
of some nodes due to power failure leads topological
changes and might require rerouting, reorganization of the
network and retransmitting the packets.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-
7308
_______________________________________________________________________________________
Volume: 03 Issue: 07 | Jul-2014, Available @ http://www.ijret.org 406
1.1 Motivation
Retransmission during link failure will be reduced by
compression technique, in wireless network the route
failures. The data can be recovered faster than any other
existing technique. With the help of this technique the
bandwidth utilized through the multiple or mirrored
transmission is reduced. The technique will help to provide
protection against multiple failures.
1.2 Problem Definition
Current system will get the NACK (Negative
Acknowledgment) during link failure and retransmission
will be done until the data has to be delivered to the end
(destination) node. So this will be the time consuming and
energy consumption task.
Proposed system overcomes the issues of existing system
such that energy and time consumption will be reduced by
sending the Data to the destination using disjoint path. Such
a way that in first path sending uncompressed data .Where
as in second path we are sending compressed data. So no
need to retransmit the data so energy and time consumed
will be less compare to retransmission. And System can
compare the energy utilization between normal data and
compressed data.
1.3 Proposed Model
In the event of compression and decompression even
smaller data are to be padded with fixed length. So this will
cause overhead in the transmission, hence it will cause
inefficient transmission. Hence in order to solve the
problems multipath based solution for multiple node (multi -
hop) link stability. The technique can be adopted to both
wireless and wired network where on demand routing
scheme like DSDV and AODV are employed. The protocol
is simulated in MATLAB. The technique is described as
bellow.
This technique will compare the entropy of the received
compressed data that is transmitted through one link and
original data at the receiver as a measure of information
change. And this technique is simulated with large number
of session of multiple paths and node is labelled in arbitrary
order, so that intruder is not able to get the path.
2. ALGORITHM
1) Source will send the Repeat request packet to all the
neighboring nodes in the network. Each neighboring node
forwards the same to its neighbors until the hop traverse will
be less than six. This will reduce the further Route Request
packet congestion.
2) Receiver responds to source with shortest delay. And this
Delay is manipulated from Timestamp from source to
destination transmission. Based on repeat request strategies.
destination puts the packets in the queue, checks for node
disjoins and forwards the route reply packet
3) Receiving node keep the packets in the queue .and check
for the disjoint path to forward the route reply packet.
4) After receiving both primary and secondary routes, the
source node starts the transmission. The source first saves
the packets in the queue and then compresses the packets
using Huffman coding.
5) While transmitting nodes are randomized so to make the
header unpredictable.
6) The header is transmitted through the first path and the
compressed data is send through the secondary path. Total
packets to be decompressed with the current header are put
in the header itself.
7) Destination node uncompressed the packets using the
header.
3. METHODOLOGY
1) Node disjoint multipaths are used transmit data from
source to destination
2) Encode the data with Huffman coding, transmit the
uncompressed data through path1 and compressed data
through path2.
3) Data is divided into multiple packets and each packet is
assigned with a sequence number.
4) The destination checks the sequence numbers.
5) If sequence number in the packets coming from a path is
missing then the node discards all previously acquired
packets through that path.
6) Compressed data is uncompressed at the destination.
7) Comparing the energy utilization between compressed
and actual data.
3.1 Compression of Data
This technique is used for ensuring lossless data
compression. variable-length code table for encoding a
source symbol (such as a character in a file) where the
variable-length code table has been derived in a particular
way based on the estimated probability of occurrence for
each possible value of the source symbol.
3.2 Construction of a Tree
1)Specifying number leaves based on number values.
2)Based on probability leaf nodes are to specify as the head
of the queue.
3) If there are two nodes in the queue: Then select
two nodes with least weights. Then create new node
by adding weights of these two nodes. Then place
this node rear end of the queue.
4) All other nodes are the root node; the tree has now been
generated.
4. RESULTS AND DISCUSSON
The graph shows the parallel transmission of the packets
containing compressed and secured data and compression
header with 20 nodes. Both the transmission can be
performed parallel for increasing the speed of the technique
and for improving the security.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-
7308
_______________________________________________________________________________________
Volume: 03 Issue: 07 | Jul-2014, Available @ http://www.ijret.org 407
Fig 1: Parallel Transmission of the header and compressed
data packets over 2 paths with 20 nodes
The performance of both shortest path based and spanning
tree based routing approaches are simulated. But it is clearly
deputed that network coding over multiple shortest path as
in proposed system yields better result due to end to end
homomorphic symmetric transmission.
Fig 2: Above Graph shows the difference between existing
and proposedSystem
5. CONCLUSIONS
Data transmission between multiple nodes in the wireless
network is one where data from one node traverses or route,
For example mobile ad-hoc network, wireless sensor
network. Due to energy constraints of the node one of the
important requirement for such network’s arc to limit the
data flow.
Energy and time consumption will be reduced by sending
the Data to the destination using disjoint path. Such a way
that in first path sending uncompressed data. where as in
second path we are sending compressed data. So no need to
retransmit the data so energy and time consumed will be less
compare to retransmission. and it can compare the energy
utilization between normal data and compressed data.
5.1 Scope for Further Research
The system can be improved by adopting split transmission
where half data can transmitted through primary path as
uncompressed data and the rest half can be compressed and
transmitted through the secondary path.
REFERENCES
[1]. Ahmed E.Kamal, Aditya Ramamoorthy,” Overlay
Protection Against Link Failure Using Network Coding”.
This paper introduces network coding-based protection
scheme against single-and multiple-link failures.IEEE/ACM
transaction on networking ,vol.19.NO,4,Aug-2011.
[2]. J. Vygen, “NP-completeness of some edge- disjoint
paths problems,” Discr. Appl. Math., vol. 46, 1995, pp. 83–
90.
[3]. A. E. Kamal, “Network protection for mesh networks:
Network coding-based protection using p-cycles,”
IEEE/ACM Trans. Netw., vol. 18, no. 1, Feb. 2010, pp. 67–
80.
[4]. A. E. Kamal, “Protection in optical mesh networks
using network coding on p-cycles,” in Proc. IEEE
GLOBECOM, 2006, pp. 1–6.
[5]. W. He, M. Sridharan, and A. K. Somani, “Capacity
optimization for surviving double-link failures in mesh-
restorable optical networks,” Photon. Netw. Commun., vol.
9, Jan. 2005, pp. 99–111.
[6]. J. Zhang, K. Zhu, and B. Mukherjee, “Backup
provisioning to remedy the effect of multiple link failures in
WDM mesh networks,” IEEE J. Sel. Areas Commun., vol.
24, no. 8, Aug. 2006, pp. 57–67.
[7]. D. Schupke and R. Prinz, “Performance of path
protection and rerouting for WDM networks subject to dual
failures,” in Proc. OFC, 2003, pp. 209–210.
[8]. W. D. Grover, Mesh-based Survivable Networks:
Options and Strategies for Optical, MPLS, SONET, and
ATMNetworking. Upper Saddle River, NJ: Prentice-Hall,
2004.
[9]. S. Li and A. Ramamurthy, “Protection against link
errors and failures using network coding,” IEEE Trans.
Commun., 2010
[10]. D. Zhou and S. Subramaniam, “Survivability in optical
networks,” IEEE Netw., vol. 14, no. 6, Nov/Dec. 2000, pp.
16–23.

More Related Content

What's hot

Replica Placement In Unstable Radio Links
Replica Placement In Unstable Radio LinksReplica Placement In Unstable Radio Links
Replica Placement In Unstable Radio Links
CSCJournals
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
cscpconf
 
Effective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh NetworksEffective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh Networks
IDES Editor
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop Communication
IJCSIS Research Publications
 
Ed33777782
Ed33777782Ed33777782
Ed33777782
IJERA Editor
 
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
IJEACS
 
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ijcsa
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr traffic
eSAT Journals
 
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
IJCERT
 
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...
ijfcstjournal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Communication synchronization in cluster based wireless sensor network a re...
Communication synchronization in cluster based wireless sensor network   a re...Communication synchronization in cluster based wireless sensor network   a re...
Communication synchronization in cluster based wireless sensor network a re...
eSAT Journals
 
Review on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor NetworkReview on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor Network
Editor IJCATR
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Ali Habeeb
 
Iaetsd load stabilizing and energy conserving routing
Iaetsd load stabilizing and energy conserving routingIaetsd load stabilizing and energy conserving routing
Iaetsd load stabilizing and energy conserving routing
Iaetsd Iaetsd
 
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Jaipal Dhobale
 
Intra cluster routing with backup
Intra cluster routing with backupIntra cluster routing with backup
Intra cluster routing with backup
csandit
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 

What's hot (18)

Replica Placement In Unstable Radio Links
Replica Placement In Unstable Radio LinksReplica Placement In Unstable Radio Links
Replica Placement In Unstable Radio Links
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
 
Effective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh NetworksEffective Path Identification Protocol for Wireless Mesh Networks
Effective Path Identification Protocol for Wireless Mesh Networks
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 
Ed33777782
Ed33777782Ed33777782
Ed33777782
 
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
Enhancing the Network Life Using Reliable Energy Efficient Routing in Wireles...
 
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
 
Performance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr trafficPerformance study of adhoc routing protocols for cbr traffic
Performance study of adhoc routing protocols for cbr traffic
 
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
Consistent Data Release in MANET Using Light Weight Verification Algorithm wi...
 
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR HET...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Communication synchronization in cluster based wireless sensor network a re...
Communication synchronization in cluster based wireless sensor network   a re...Communication synchronization in cluster based wireless sensor network   a re...
Communication synchronization in cluster based wireless sensor network a re...
 
Review on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor NetworkReview on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor Network
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
 
Iaetsd load stabilizing and energy conserving routing
Iaetsd load stabilizing and energy conserving routingIaetsd load stabilizing and energy conserving routing
Iaetsd load stabilizing and energy conserving routing
 
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
 
Intra cluster routing with backup
Intra cluster routing with backupIntra cluster routing with backup
Intra cluster routing with backup
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 

Viewers also liked

“Influence of particle index of coarse aggregate and its influences on proper...
“Influence of particle index of coarse aggregate and its influences on proper...“Influence of particle index of coarse aggregate and its influences on proper...
“Influence of particle index of coarse aggregate and its influences on proper...
eSAT Publishing House
 
Evaluating paas scalability and improving performance using scalability impro...
Evaluating paas scalability and improving performance using scalability impro...Evaluating paas scalability and improving performance using scalability impro...
Evaluating paas scalability and improving performance using scalability impro...
eSAT Publishing House
 
Use of scc and rca for sustainable construction –
Use of scc and rca for sustainable construction – Use of scc and rca for sustainable construction –
Use of scc and rca for sustainable construction –
eSAT Publishing House
 
Usability analysis of sms alert system for immunization
Usability analysis of sms alert system for immunizationUsability analysis of sms alert system for immunization
Usability analysis of sms alert system for immunization
eSAT Publishing House
 
Comparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodvComparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodv
eSAT Publishing House
 
Production of malto dextrin from broken rice
Production of malto dextrin from broken riceProduction of malto dextrin from broken rice
Production of malto dextrin from broken rice
eSAT Publishing House
 
Measurement and model validation of specific heat of
Measurement and model validation of specific heat ofMeasurement and model validation of specific heat of
Measurement and model validation of specific heat of
eSAT Publishing House
 
Fpga based 128 bit customised vliw processor for executing dual scalarvector ...
Fpga based 128 bit customised vliw processor for executing dual scalarvector ...Fpga based 128 bit customised vliw processor for executing dual scalarvector ...
Fpga based 128 bit customised vliw processor for executing dual scalarvector ...
eSAT Publishing House
 
Analysis of multiport dc dc converter in renewable energy sources
Analysis of multiport dc dc converter in renewable energy sourcesAnalysis of multiport dc dc converter in renewable energy sources
Analysis of multiport dc dc converter in renewable energy sources
eSAT Publishing House
 
Performance characteristics of a hybrid wing for uav
Performance characteristics of a hybrid wing for uavPerformance characteristics of a hybrid wing for uav
Performance characteristics of a hybrid wing for uav
eSAT Publishing House
 
Synthesis and characterization of zno thin films
Synthesis and characterization of zno thin filmsSynthesis and characterization of zno thin films
Synthesis and characterization of zno thin films
eSAT Publishing House
 
Production of plaster of paris using solar energy
Production of plaster of paris using solar energyProduction of plaster of paris using solar energy
Production of plaster of paris using solar energy
eSAT Publishing House
 
Development and validation of eevc wg17 lower
Development and validation of eevc wg17 lowerDevelopment and validation of eevc wg17 lower
Development and validation of eevc wg17 lower
eSAT Publishing House
 
Open switch fault diagnosis in three phase inverter
Open switch fault diagnosis in three phase inverterOpen switch fault diagnosis in three phase inverter
Open switch fault diagnosis in three phase inverter
eSAT Publishing House
 
Low cost 50 watts inverter for fluorescent lamp using
Low cost 50 watts inverter for fluorescent lamp usingLow cost 50 watts inverter for fluorescent lamp using
Low cost 50 watts inverter for fluorescent lamp using
eSAT Publishing House
 
A comparative study of omrf & smrf structural system
A comparative study of omrf & smrf structural systemA comparative study of omrf & smrf structural system
A comparative study of omrf & smrf structural system
eSAT Publishing House
 
An android based advisor system for efficient vehicle driving directions
An android based advisor system for efficient vehicle driving directionsAn android based advisor system for efficient vehicle driving directions
An android based advisor system for efficient vehicle driving directions
eSAT Publishing House
 
Classification of text data using feature clustering algorithm
Classification of text data using feature clustering algorithmClassification of text data using feature clustering algorithm
Classification of text data using feature clustering algorithm
eSAT Publishing House
 
Transmission and reception of data through usb using
Transmission and reception of data through usb usingTransmission and reception of data through usb using
Transmission and reception of data through usb usingeSAT Publishing House
 
A survey on road extraction from color image using
A survey on road extraction from color image usingA survey on road extraction from color image using
A survey on road extraction from color image using
eSAT Publishing House
 

Viewers also liked (20)

“Influence of particle index of coarse aggregate and its influences on proper...
“Influence of particle index of coarse aggregate and its influences on proper...“Influence of particle index of coarse aggregate and its influences on proper...
“Influence of particle index of coarse aggregate and its influences on proper...
 
Evaluating paas scalability and improving performance using scalability impro...
Evaluating paas scalability and improving performance using scalability impro...Evaluating paas scalability and improving performance using scalability impro...
Evaluating paas scalability and improving performance using scalability impro...
 
Use of scc and rca for sustainable construction –
Use of scc and rca for sustainable construction – Use of scc and rca for sustainable construction –
Use of scc and rca for sustainable construction –
 
Usability analysis of sms alert system for immunization
Usability analysis of sms alert system for immunizationUsability analysis of sms alert system for immunization
Usability analysis of sms alert system for immunization
 
Comparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodvComparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodv
 
Production of malto dextrin from broken rice
Production of malto dextrin from broken riceProduction of malto dextrin from broken rice
Production of malto dextrin from broken rice
 
Measurement and model validation of specific heat of
Measurement and model validation of specific heat ofMeasurement and model validation of specific heat of
Measurement and model validation of specific heat of
 
Fpga based 128 bit customised vliw processor for executing dual scalarvector ...
Fpga based 128 bit customised vliw processor for executing dual scalarvector ...Fpga based 128 bit customised vliw processor for executing dual scalarvector ...
Fpga based 128 bit customised vliw processor for executing dual scalarvector ...
 
Analysis of multiport dc dc converter in renewable energy sources
Analysis of multiport dc dc converter in renewable energy sourcesAnalysis of multiport dc dc converter in renewable energy sources
Analysis of multiport dc dc converter in renewable energy sources
 
Performance characteristics of a hybrid wing for uav
Performance characteristics of a hybrid wing for uavPerformance characteristics of a hybrid wing for uav
Performance characteristics of a hybrid wing for uav
 
Synthesis and characterization of zno thin films
Synthesis and characterization of zno thin filmsSynthesis and characterization of zno thin films
Synthesis and characterization of zno thin films
 
Production of plaster of paris using solar energy
Production of plaster of paris using solar energyProduction of plaster of paris using solar energy
Production of plaster of paris using solar energy
 
Development and validation of eevc wg17 lower
Development and validation of eevc wg17 lowerDevelopment and validation of eevc wg17 lower
Development and validation of eevc wg17 lower
 
Open switch fault diagnosis in three phase inverter
Open switch fault diagnosis in three phase inverterOpen switch fault diagnosis in three phase inverter
Open switch fault diagnosis in three phase inverter
 
Low cost 50 watts inverter for fluorescent lamp using
Low cost 50 watts inverter for fluorescent lamp usingLow cost 50 watts inverter for fluorescent lamp using
Low cost 50 watts inverter for fluorescent lamp using
 
A comparative study of omrf & smrf structural system
A comparative study of omrf & smrf structural systemA comparative study of omrf & smrf structural system
A comparative study of omrf & smrf structural system
 
An android based advisor system for efficient vehicle driving directions
An android based advisor system for efficient vehicle driving directionsAn android based advisor system for efficient vehicle driving directions
An android based advisor system for efficient vehicle driving directions
 
Classification of text data using feature clustering algorithm
Classification of text data using feature clustering algorithmClassification of text data using feature clustering algorithm
Classification of text data using feature clustering algorithm
 
Transmission and reception of data through usb using
Transmission and reception of data through usb usingTransmission and reception of data through usb using
Transmission and reception of data through usb using
 
A survey on road extraction from color image using
A survey on road extraction from color image usingA survey on road extraction from color image using
A survey on road extraction from color image using
 

Similar to “Optimizing the data transmission between multiple nodes during link failure in wireless network”

Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
IJERA Editor
 
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETProviding A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
Editor IJCATR
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Editor IJARCET
 
A comparative study in wireless sensor networks
A comparative study in wireless sensor networksA comparative study in wireless sensor networks
A comparative study in wireless sensor networks
ijwmn
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
IJTET Journal
 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
IRJET Journal
 
Energy efficient neighbour selection for flat wireless sensor networks
Energy efficient neighbour selection for flat wireless sensor networksEnergy efficient neighbour selection for flat wireless sensor networks
Energy efficient neighbour selection for flat wireless sensor networks
csandit
 
ENERGY EFFICIENT ROUTING ALGORITHM
ENERGY EFFICIENT ROUTING ALGORITHMENERGY EFFICIENT ROUTING ALGORITHM
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
theijes
 
J031101064069
J031101064069J031101064069
J031101064069theijes
 
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
IJCNCJournal
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...
eSAT Journals
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
acijjournal
 
Analysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetsAnalysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manets
eSAT Publishing House
 
7. 7775 8118-1-pb
7. 7775 8118-1-pb7. 7775 8118-1-pb
7. 7775 8118-1-pb
IAESIJEECS
 
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
International Journal of Technical Research & Application
 
Aa35152156
Aa35152156Aa35152156
Aa35152156
IJERA Editor
 
Analyzing performance of zrp by varying node density and transmission range
Analyzing performance of zrp by varying node density and transmission rangeAnalyzing performance of zrp by varying node density and transmission range
Analyzing performance of zrp by varying node density and transmission range
Alexander Decker
 
Optimized Traffic Flow over Multipath in Optical Networks
Optimized Traffic Flow over Multipath in Optical NetworksOptimized Traffic Flow over Multipath in Optical Networks
Optimized Traffic Flow over Multipath in Optical Networks
paperpublications3
 

Similar to “Optimizing the data transmission between multiple nodes during link failure in wireless network” (20)

Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
Energy Efficient Wireless Sensor Network Using Network Coding Based Multipath...
 
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETProviding A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581
 
A comparative study in wireless sensor networks
A comparative study in wireless sensor networksA comparative study in wireless sensor networks
A comparative study in wireless sensor networks
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
Performance Analysis of Energy Efficient Cross Layer Load Balancing in Tactic...
 
Energy efficient neighbour selection for flat wireless sensor networks
Energy efficient neighbour selection for flat wireless sensor networksEnergy efficient neighbour selection for flat wireless sensor networks
Energy efficient neighbour selection for flat wireless sensor networks
 
ENERGY EFFICIENT ROUTING ALGORITHM
ENERGY EFFICIENT ROUTING ALGORITHMENERGY EFFICIENT ROUTING ALGORITHM
ENERGY EFFICIENT ROUTING ALGORITHM
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
 
J031101064069
J031101064069J031101064069
J031101064069
 
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
AN EFFICIENT BANDWIDTH OPTIMIZATION AND MINIMIZING ENERGY CONSUMPTION UTILIZI...
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
 
Analysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetsAnalysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manets
 
7. 7775 8118-1-pb
7. 7775 8118-1-pb7. 7775 8118-1-pb
7. 7775 8118-1-pb
 
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
 
Aa35152156
Aa35152156Aa35152156
Aa35152156
 
Aa35152156
Aa35152156Aa35152156
Aa35152156
 
Analyzing performance of zrp by varying node density and transmission range
Analyzing performance of zrp by varying node density and transmission rangeAnalyzing performance of zrp by varying node density and transmission range
Analyzing performance of zrp by varying node density and transmission range
 
Optimized Traffic Flow over Multipath in Optical Networks
Optimized Traffic Flow over Multipath in Optical NetworksOptimized Traffic Flow over Multipath in Optical Networks
Optimized Traffic Flow over Multipath in Optical Networks
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 

Recently uploaded (20)

Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 

“Optimizing the data transmission between multiple nodes during link failure in wireless network”

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 07 | Jul-2014, Available @ http://www.ijret.org 405 “OPTIMIZING THE DATA TRANSMISSION BETWEEN MULTIPLE NODES DURING LINK FAILURE IN WIRELESS NETWORK” Santosh S.Chinchali 1 , Vasudha V.Ayyannavar2 1 Department of Computer Science and engineering, Basaveshwar College Of Engineering,Bagalkot / Visvesvaraya Technological University,Belagum 2 Department of Computer Science and engineering, Basaveshwar College Of Engineering,Bagalkot / Visvesvaraya Technological University,Belagum Abstract The nodes in wireless network are mobile resulting in dynamic topology with high rate of link breakage and network partitions leading to interruptions in the ongoing communication in contrast to wired network. In the networks the link failure may be occurred due to a loss of energy in nodes, congestion, and power loss in nodes. Routing techniques help in path establishment for transmission. The existing routing protocols suffer from overhead causing energy loss which may be further aggravated by link failures. Different techniques can be used to prevent one path failure and this system uses multipath routing to overcome this issue. In this technique the system uses network coding protection for both single and multiple link failures. The system states that in connection each node receives a multiple copies of same data, first copy from the primary path and second copy from secondary path. In order to improve the performance, data is to be transmitted through the secondary path is compressed using Huffman coding in order to save the energy consumption. And encoding mechanism is used for providing security for the data transmitted between source to destination. This will ensure the recovery of data in failure of working path. ---------------------------------------------------------------------***-------------------------------------------------------------------- 1. INTRODUCTION Wireless network works in the situations where certain number of nodes comes together within the transmission range of each other and they can be able to communicate. Wireless network topology frequently changes and nodes will be having limited power. Because of this the routing is challenging issue in wireless network. Most of the energy related study has been done at routing layer to reduce energy consumption in transmission. And few have explored the idea to reduce the energy consumption due to routing overheads, which requires the cross layer design approach. In the transmission of data if link failure occurs, the source node of that link has to wait for timeout interval. And also has to inform all the nodes using the same path by sending (Route Error) RERR packets, to find another route. So the transmission interrupts for a significant amount of time. In performing these activities amount of energy is consumed. So this survey gives an insight by studying the various routing techniques that the energy consumption is due to Routing overheads and link failures. Transmission of data in the network during congestion will not ensure the end to end delivery. When huge number of users send the data to the destination by using same link, if the link fails due to congestion, then it is not possible to provide end to end delivery in short time. So by using an optimization technique for data transmission between the nodes will provide the guaranteed delivery to the destination during link failure. The system should adopt the concept of backup paths and should transmit data through two paths such that the destination receives multiple copies of data. If the transmission line is withdrawn or corrupted, then the data received from the other path is used. This increases the packet delivery ratio and latency as number of retransmissions is substantially minimized. Despite the innumerable applications of wireless networks, these networks have several limitations such as limited energy supply, limited computing power, and limited bandwidth of the wireless links connecting nodes. One of the main design goals of wireless network is to prolong the lifetime of the network and prevent connectivity degradation by employing aggressive energy management techniques. The design of routing protocols in wireless network is influenced by many challenging issues. One of the challenging design issues in routing is energy consumption without losing accuracy. Nodes can use their limited amount of energy in computations and transmitting information in a wireless environment. So energy- conserving forms of communication and computation are essential. In a multihop wireless network, each node plays dual role as data sender and data router. The malfunctioning of some nodes due to power failure leads topological changes and might require rerouting, reorganization of the network and retransmitting the packets.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321- 7308 _______________________________________________________________________________________ Volume: 03 Issue: 07 | Jul-2014, Available @ http://www.ijret.org 406 1.1 Motivation Retransmission during link failure will be reduced by compression technique, in wireless network the route failures. The data can be recovered faster than any other existing technique. With the help of this technique the bandwidth utilized through the multiple or mirrored transmission is reduced. The technique will help to provide protection against multiple failures. 1.2 Problem Definition Current system will get the NACK (Negative Acknowledgment) during link failure and retransmission will be done until the data has to be delivered to the end (destination) node. So this will be the time consuming and energy consumption task. Proposed system overcomes the issues of existing system such that energy and time consumption will be reduced by sending the Data to the destination using disjoint path. Such a way that in first path sending uncompressed data .Where as in second path we are sending compressed data. So no need to retransmit the data so energy and time consumed will be less compare to retransmission. And System can compare the energy utilization between normal data and compressed data. 1.3 Proposed Model In the event of compression and decompression even smaller data are to be padded with fixed length. So this will cause overhead in the transmission, hence it will cause inefficient transmission. Hence in order to solve the problems multipath based solution for multiple node (multi - hop) link stability. The technique can be adopted to both wireless and wired network where on demand routing scheme like DSDV and AODV are employed. The protocol is simulated in MATLAB. The technique is described as bellow. This technique will compare the entropy of the received compressed data that is transmitted through one link and original data at the receiver as a measure of information change. And this technique is simulated with large number of session of multiple paths and node is labelled in arbitrary order, so that intruder is not able to get the path. 2. ALGORITHM 1) Source will send the Repeat request packet to all the neighboring nodes in the network. Each neighboring node forwards the same to its neighbors until the hop traverse will be less than six. This will reduce the further Route Request packet congestion. 2) Receiver responds to source with shortest delay. And this Delay is manipulated from Timestamp from source to destination transmission. Based on repeat request strategies. destination puts the packets in the queue, checks for node disjoins and forwards the route reply packet 3) Receiving node keep the packets in the queue .and check for the disjoint path to forward the route reply packet. 4) After receiving both primary and secondary routes, the source node starts the transmission. The source first saves the packets in the queue and then compresses the packets using Huffman coding. 5) While transmitting nodes are randomized so to make the header unpredictable. 6) The header is transmitted through the first path and the compressed data is send through the secondary path. Total packets to be decompressed with the current header are put in the header itself. 7) Destination node uncompressed the packets using the header. 3. METHODOLOGY 1) Node disjoint multipaths are used transmit data from source to destination 2) Encode the data with Huffman coding, transmit the uncompressed data through path1 and compressed data through path2. 3) Data is divided into multiple packets and each packet is assigned with a sequence number. 4) The destination checks the sequence numbers. 5) If sequence number in the packets coming from a path is missing then the node discards all previously acquired packets through that path. 6) Compressed data is uncompressed at the destination. 7) Comparing the energy utilization between compressed and actual data. 3.1 Compression of Data This technique is used for ensuring lossless data compression. variable-length code table for encoding a source symbol (such as a character in a file) where the variable-length code table has been derived in a particular way based on the estimated probability of occurrence for each possible value of the source symbol. 3.2 Construction of a Tree 1)Specifying number leaves based on number values. 2)Based on probability leaf nodes are to specify as the head of the queue. 3) If there are two nodes in the queue: Then select two nodes with least weights. Then create new node by adding weights of these two nodes. Then place this node rear end of the queue. 4) All other nodes are the root node; the tree has now been generated. 4. RESULTS AND DISCUSSON The graph shows the parallel transmission of the packets containing compressed and secured data and compression header with 20 nodes. Both the transmission can be performed parallel for increasing the speed of the technique and for improving the security.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321- 7308 _______________________________________________________________________________________ Volume: 03 Issue: 07 | Jul-2014, Available @ http://www.ijret.org 407 Fig 1: Parallel Transmission of the header and compressed data packets over 2 paths with 20 nodes The performance of both shortest path based and spanning tree based routing approaches are simulated. But it is clearly deputed that network coding over multiple shortest path as in proposed system yields better result due to end to end homomorphic symmetric transmission. Fig 2: Above Graph shows the difference between existing and proposedSystem 5. CONCLUSIONS Data transmission between multiple nodes in the wireless network is one where data from one node traverses or route, For example mobile ad-hoc network, wireless sensor network. Due to energy constraints of the node one of the important requirement for such network’s arc to limit the data flow. Energy and time consumption will be reduced by sending the Data to the destination using disjoint path. Such a way that in first path sending uncompressed data. where as in second path we are sending compressed data. So no need to retransmit the data so energy and time consumed will be less compare to retransmission. and it can compare the energy utilization between normal data and compressed data. 5.1 Scope for Further Research The system can be improved by adopting split transmission where half data can transmitted through primary path as uncompressed data and the rest half can be compressed and transmitted through the secondary path. REFERENCES [1]. Ahmed E.Kamal, Aditya Ramamoorthy,” Overlay Protection Against Link Failure Using Network Coding”. This paper introduces network coding-based protection scheme against single-and multiple-link failures.IEEE/ACM transaction on networking ,vol.19.NO,4,Aug-2011. [2]. J. Vygen, “NP-completeness of some edge- disjoint paths problems,” Discr. Appl. Math., vol. 46, 1995, pp. 83– 90. [3]. A. E. Kamal, “Network protection for mesh networks: Network coding-based protection using p-cycles,” IEEE/ACM Trans. Netw., vol. 18, no. 1, Feb. 2010, pp. 67– 80. [4]. A. E. Kamal, “Protection in optical mesh networks using network coding on p-cycles,” in Proc. IEEE GLOBECOM, 2006, pp. 1–6. [5]. W. He, M. Sridharan, and A. K. Somani, “Capacity optimization for surviving double-link failures in mesh- restorable optical networks,” Photon. Netw. Commun., vol. 9, Jan. 2005, pp. 99–111. [6]. J. Zhang, K. Zhu, and B. Mukherjee, “Backup provisioning to remedy the effect of multiple link failures in WDM mesh networks,” IEEE J. Sel. Areas Commun., vol. 24, no. 8, Aug. 2006, pp. 57–67. [7]. D. Schupke and R. Prinz, “Performance of path protection and rerouting for WDM networks subject to dual failures,” in Proc. OFC, 2003, pp. 209–210. [8]. W. D. Grover, Mesh-based Survivable Networks: Options and Strategies for Optical, MPLS, SONET, and ATMNetworking. Upper Saddle River, NJ: Prentice-Hall, 2004. [9]. S. Li and A. Ramamurthy, “Protection against link errors and failures using network coding,” IEEE Trans. Commun., 2010 [10]. D. Zhou and S. Subramaniam, “Survivability in optical networks,” IEEE Netw., vol. 14, no. 6, Nov/Dec. 2000, pp. 16–23.