Abstract wireless sensor networks is a growing class of highly dynamic, complex network environment on top of which a wide range of applications, such as habitat monitoring, object tracking, precision agriculture, building monitoring and military systems are built. The real time applications often generate urgent data and one-time event notifications that need to be communicated reliably. The successful delivery of such information has a direct effect on the overall performance of the system. Reliable communication is important for sensor networks. Urgent data transmission has been a serious problem for Wireless sensor networks. WSN face difficulties in handling urgent data like congestion and reliability due to their unique requirements and constraints. Various protocols for congestion avoidance and reliability achievement for WSN have been proposed recently. Few of them have also worked on congestion elimination. These protocols try to minimize the problem using different mechanism. This paper explores these mechanisms and tries to find their features and limitations which directed us for our research. Keywords: Congestion, Reliability, Transport layer Protocol, Urgent data transmission, Wireless Sensor Network.
The document discusses various data dissemination protocols in wireless sensor networks. It describes flooding, gossiping, rumor routing, sequential assignment routing, direct diffusion, SPIN, and geographic hash table protocols. Flooding broadcasts packets to all neighbors, causing implosion and resource blindness issues. Gossiping sends packets randomly to one neighbor to avoid implosion. Rumor routing and direct diffusion use flooding initially and then optimize routing. SPIN uses data advertisements before transmission. Geographic hash table hashes node locations to optimize routing.
This document presents a virtual grid-based dynamic routes adjustment (VGDRA) scheme for wireless sensor networks with a mobile sink. The scheme aims to minimize the energy consumed when sensor nodes adjust their routes to the sink's new location. It divides the sensor field into a virtual grid with cell headers. When the sink moves, only the cell headers participate in rerouting to the new location, reducing the communication cost compared to all nodes adjusting routes. The VGDRA scheme maintains nearly optimal routes to the mobile sink while minimizing the cost of route reconstruction as the sink moves.
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET Journal
This document summarizes research on improving energy efficiency and security in wireless sensor networks (WSNs). It discusses how WSNs have limitations like limited battery power, bandwidth, and storage in sensor nodes. Several energy efficient techniques and secure communication methods are described that aim to extend the lifetime of WSNs. This includes clustering protocols to select energy-efficient cluster heads, optimized multi-hop transmission to reduce energy consumption, and integrating routing and MAC protocols using techniques like honey bee optimization to further improve energy efficiency and security of data transmission in WSNs. The goal of these approaches is to minimize energy usage and maximize the reliable operation of resource-constrained WSNs.
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor NetworkIRJET Journal
This document discusses the PEGASIS routing protocol for wireless sensor networks. It begins with an abstract that introduces PEGASIS as an energy-efficient chain-based hierarchical protocol. It then provides background on wireless sensor networks and discusses challenges like energy efficiency and network lifetime. It explains how PEGASIS forms chains between sensor nodes so that each node only communicates with nearby neighbors, extending network lifetime. The document compares PEGASIS to LEACH, finding that PEGASIS provides more balanced energy distribution and longer network lifetime. It then outlines the PEGASIS algorithm and discusses potential improvements like minimizing delay. Simulation results show PEGASIS increases network efficiency and lifespan over LEACH. The conclusion is that
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...IRJET Journal
This document proposes a dynamic slot allocation algorithm to improve traffic performance in wireless sensor networks. It aims to reduce energy consumption and improve network lifetime by dynamically allocating channels based on traffic load. The algorithm works as follows:
1. Nodes initialize parameters like queue thresholds and check their congestion level based on queue length, channel utilization, and energy.
2. Based on the congestion level, nodes determine the frequency of transmitting data packets. If congestion is low, no action is taken. If medium, low data transmission is allowed. If high, an alternate path is established.
3. The algorithm also monitors the data packet distribution ratio and dynamically establishes an alternate path if it drops below a threshold, to
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...IRJET Journal
This document discusses enhancing real-time capabilities, fault tolerance, and energy efficiency in wireless sensor and actuator networks (WSANs). It proposes a new network architecture called REFER that embeds Kautz graphs for routing to provide these enhancements. REFER connects the Kautz graphs using a distributed hash table for scalability. It also develops an efficient fault-tolerant routing protocol that allows nodes to quickly identify alternate paths upon failures based on node IDs alone, without retransmission from the source. The document reviews related work on WSAN routing and discusses fault diagnosis and recovery techniques. It presents the methodology and simulation results demonstrating REFER's improvements over existing WSAN systems in real-time communication, energy efficiency, fault tolerance and scalability
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...IRJET Journal
The document discusses the Real-Time, Fault Tolerant and Energy-Efficient (REFER) protocol for wireless sensor and actuator networks (WSANs). It proposes embedding Kautz graphs into the physical topology of a WSAN to enable real-time communication and connecting the graphs using a distributed hash table for scalability. The REFER protocol also includes an efficient fault-tolerant routing mechanism that allows nodes to quickly identify alternate paths upon failures based on node IDs rather than retransmissions. Simulation results show REFER outperforms existing WSAN approaches in terms of real-time performance, energy-efficiency, fault-tolerance and scalability.
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...IOSR Journals
This document summarizes and compares four medium access control (MAC) protocols for wireless sensor networks: T-MAC, B-MAC, S-MAC, and DSMAC. It discusses the key constraints and characteristics of wireless sensor networks that impact MAC protocol design, including limited energy resources. For each protocol, it describes the protocol's operation, analyzes its power consumption and latency performance, and compares the protocols. It finds that T-MAC is more energy efficient than S-MAC due to its adaptive active period, but S-MAC has lower latency. DSMAC achieves lower power consumption than B-MAC through adaptive duty cycling.
The document discusses various data dissemination protocols in wireless sensor networks. It describes flooding, gossiping, rumor routing, sequential assignment routing, direct diffusion, SPIN, and geographic hash table protocols. Flooding broadcasts packets to all neighbors, causing implosion and resource blindness issues. Gossiping sends packets randomly to one neighbor to avoid implosion. Rumor routing and direct diffusion use flooding initially and then optimize routing. SPIN uses data advertisements before transmission. Geographic hash table hashes node locations to optimize routing.
This document presents a virtual grid-based dynamic routes adjustment (VGDRA) scheme for wireless sensor networks with a mobile sink. The scheme aims to minimize the energy consumed when sensor nodes adjust their routes to the sink's new location. It divides the sensor field into a virtual grid with cell headers. When the sink moves, only the cell headers participate in rerouting to the new location, reducing the communication cost compared to all nodes adjusting routes. The VGDRA scheme maintains nearly optimal routes to the mobile sink while minimizing the cost of route reconstruction as the sink moves.
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET Journal
This document summarizes research on improving energy efficiency and security in wireless sensor networks (WSNs). It discusses how WSNs have limitations like limited battery power, bandwidth, and storage in sensor nodes. Several energy efficient techniques and secure communication methods are described that aim to extend the lifetime of WSNs. This includes clustering protocols to select energy-efficient cluster heads, optimized multi-hop transmission to reduce energy consumption, and integrating routing and MAC protocols using techniques like honey bee optimization to further improve energy efficiency and security of data transmission in WSNs. The goal of these approaches is to minimize energy usage and maximize the reliable operation of resource-constrained WSNs.
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor NetworkIRJET Journal
This document discusses the PEGASIS routing protocol for wireless sensor networks. It begins with an abstract that introduces PEGASIS as an energy-efficient chain-based hierarchical protocol. It then provides background on wireless sensor networks and discusses challenges like energy efficiency and network lifetime. It explains how PEGASIS forms chains between sensor nodes so that each node only communicates with nearby neighbors, extending network lifetime. The document compares PEGASIS to LEACH, finding that PEGASIS provides more balanced energy distribution and longer network lifetime. It then outlines the PEGASIS algorithm and discusses potential improvements like minimizing delay. Simulation results show PEGASIS increases network efficiency and lifespan over LEACH. The conclusion is that
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...IRJET Journal
This document proposes a dynamic slot allocation algorithm to improve traffic performance in wireless sensor networks. It aims to reduce energy consumption and improve network lifetime by dynamically allocating channels based on traffic load. The algorithm works as follows:
1. Nodes initialize parameters like queue thresholds and check their congestion level based on queue length, channel utilization, and energy.
2. Based on the congestion level, nodes determine the frequency of transmitting data packets. If congestion is low, no action is taken. If medium, low data transmission is allowed. If high, an alternate path is established.
3. The algorithm also monitors the data packet distribution ratio and dynamically establishes an alternate path if it drops below a threshold, to
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...IRJET Journal
This document discusses enhancing real-time capabilities, fault tolerance, and energy efficiency in wireless sensor and actuator networks (WSANs). It proposes a new network architecture called REFER that embeds Kautz graphs for routing to provide these enhancements. REFER connects the Kautz graphs using a distributed hash table for scalability. It also develops an efficient fault-tolerant routing protocol that allows nodes to quickly identify alternate paths upon failures based on node IDs alone, without retransmission from the source. The document reviews related work on WSAN routing and discusses fault diagnosis and recovery techniques. It presents the methodology and simulation results demonstrating REFER's improvements over existing WSAN systems in real-time communication, energy efficiency, fault tolerance and scalability
IRJET-Multipath based Routing and Energy Efficient Multicasting for Wireless ...IRJET Journal
The document discusses the Real-Time, Fault Tolerant and Energy-Efficient (REFER) protocol for wireless sensor and actuator networks (WSANs). It proposes embedding Kautz graphs into the physical topology of a WSAN to enable real-time communication and connecting the graphs using a distributed hash table for scalability. The REFER protocol also includes an efficient fault-tolerant routing mechanism that allows nodes to quickly identify alternate paths upon failures based on node IDs rather than retransmissions. Simulation results show REFER outperforms existing WSAN approaches in terms of real-time performance, energy-efficiency, fault-tolerance and scalability.
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...IOSR Journals
This document summarizes and compares four medium access control (MAC) protocols for wireless sensor networks: T-MAC, B-MAC, S-MAC, and DSMAC. It discusses the key constraints and characteristics of wireless sensor networks that impact MAC protocol design, including limited energy resources. For each protocol, it describes the protocol's operation, analyzes its power consumption and latency performance, and compares the protocols. It finds that T-MAC is more energy efficient than S-MAC due to its adaptive active period, but S-MAC has lower latency. DSMAC achieves lower power consumption than B-MAC through adaptive duty cycling.
Congestion in Wireless Sensor Networks has negative impact on the Quality of Service.
Congestion effects the performance metrics, namely throughput and per-packet energy
consumption, network lifetime and packet delivery ratio. Reducing congestion allows better
utilization of the network resources and thus enhances the Quality of Service metrics of the
network. Traffic Aware Dynamic Routing to Alleviate Congestion in Wireless Sensor Networks
reduces congestion by considering one hop neighbor routing in the network. This paper
proposed an algorithm for Quality of Service Based Traffic-Aware Data forwarding for
congestion control in wireless sensor networks based on two hop neighbor information. On
detection of congestion, the algorithm forwards data packets around the congestion areas by
spreading the excessive packets through multiple paths. The path with light load or under
loaded nodes is efficiently utilized whenever congestion occurs. The main aspect of the
algorithm is to build path to the destination using two independent potential fields depth and
queue length. Queue length field solves the traffic-aware problem. Depth field creates a
backbone to forward packets to the sink. Both fields are combined to yield a hybrid potential
field to make dynamic decision for data forwarding. Network Simulator used for simulating the
algorithm is NS2. The proposed algorithm performs better.
This document discusses an energy-efficient multi-disjoint path opportunistic node connection routing protocol (EMOR) for wireless sensor networks deployed in neighborhood area networks for smart grids. EMOR utilizes the residual energy, availability of sensor node's buffer size, working-sleeping cycle, and link quality factor to calculate optimal path connectivity for both real-time and non-real-time traffic in order to improve packet delivery rate, network lifetime, end-to-end delay and reduce total energy consumption. The document provides background on wireless sensor networks, smart grids, opportunistic routing, and discusses related work on routing protocols for wireless sensor networks in smart grids and other applications.
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...divya_prabha
This document presents a synopsis for a seminar on an improved energy efficient routing protocol for wireless sensor networks. It begins with an introduction to wireless sensor networks and routing techniques, focusing on hierarchical routing protocols. It then describes the Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol and some of its variants. The main focus is on an Improved LEACH (I-LEACH) protocol, which aims to maximize network lifetime and minimize average energy consumption per node by selecting cluster heads based on residual energy, number of neighbors, and distance to the base station. The synopsis concludes with an outline of the seminar presentation and includes diagrams of the LEACH and I-LEACH protocols.
This document presents an introduction to a thesis that compares the performance of routing protocols in wireless sensor networks. It provides background on wireless sensor networks and discusses routing as an important issue. The introduction defines the problem, motivation, research questions, methodology, aims, assumptions, contributions, and organization of the thesis. It includes figures to illustrate typical wireless sensor network components, different network topologies, deployment densities, and a bar chart on simulation pause time.
The document discusses wireless sensor networks and describes their key characteristics. It notes that wireless sensor networks consist of low-power smart sensor nodes distributed over a large field to enable wireless sensing and data networking. The sensor nodes contain sensors, processors, memory, and radios. Wireless sensor networks can be either unstructured with dense node distribution or structured with few scattered nodes.
Qos group based optimal retransmission medium access protocol for wireless se...IJCNCJournal
This paper presents, a Group Based Optimal Retransmission Medium Access (GORMA) Protocol is
designed that combines protocol of Collision Avoidance (CA) and energy management for low-cost, shortrange,
low-data rate and low-energy sensor nodes applications in environment monitoring, agriculture,
industrial plants etc. In this paper, the GORMA protocol focuses on efficient MAC protocol to provide
autonomous Quality of Service (QoS) to the sensor nodes in one-hop QoS retransmission group and two
QoS groups in WSNs where the source nodes do not have receiver circuits. Hence, they can only transmit
data to a sink node, but cannot receive any control signals from the sink node. The proposed protocol
GORMA provides QoS to the nodes which work independently on predefined time by allowing them to
transmit each packet an optimal number of times within a given period. Our simulation results shows that
the performance of GORMA protocol, which maximize the delivery probability of one-hop QoS group and
two QoS groups and minimize the energy consumption.
Iaetsd quick detection technique to reduce congestion inIaetsd Iaetsd
This document proposes a quick detection technique (QDT) to avoid congestion in wireless sensor networks. QDT uses the queue buffer length of sensor nodes to estimate impending congestion and diffuses traffic across multiple paths to the base station. By dynamically routing traffic away from congested areas, QDT aims to improve packet delivery ratios and event reporting while avoiding congestion. The technique detects inactive nodes that do not properly forward or drop packets, and routes around them to reduce delays and maximize network lifetime. Simulation results show QDT significantly improves event reporting and packet delivery compared to other techniques.
The document presents a graduate project on efficient data aggregation from polling points in wireless sensor networks. The proposed system called Mobi-Cluster aims to minimize overall network overhead and energy expenditure associated with multi-hop data retrieval while ensuring balanced energy consumption and prolonged network lifetime. This is achieved through building cluster structures consisting of member nodes that route data to assigned cluster heads, and selecting appropriate polling points to act as intermediaries between clusters and a mobile collector. The key stages of the Mobi-Cluster protocol are described as cluster head selection, polling point selection, cluster head attachment to polling points, data aggregation and forwarding to polling points, and communication between polling points and the mobile collector.
A Survey of Routing Protocols for Structural Health MonitoringIJEEE
Wireless sensor networks have emerged in recent years as a promising technology that can impact the field of structural monitoring and infrastructure asset management. Various routing protocols are used to define communication among sensor nodes of the wireless sensor network for purpose of disseminating information. These routing protocols can be designed to improve the network performance in terms of energy consumption, delay and security issues. This paper discusses the requirements of routing protocol for Structural health monitoring and presents summary of various routing protocols used for WSNs for Structural health monitoring.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...IRJET Journal
This document summarizes a research paper on optimizing energy usage in wireless sensor networks through a trust-aware routing algorithm. The paper proposes the Cost Aware Secure Routing (CASER) protocol, which aims to balance energy consumption across all sensor nodes to maximize network lifetime. CASER supports multiple routing strategies to extend lifetime while increasing routing security. Simulation results show CASER achieves excellent energy balance and increases network lifetime by more than four times under non-uniform energy deployment compared to other approaches. The paper also discusses detecting and recovering from node failures in wireless sensor networks.
The popularity of Wireless Sensor Networks (WSN) have increased rapidly and tremendously due to the vast potential of the sensor networks to connect the physical world with the virtual world. Since sensor devices rely on battery power and node energy and may be placed in hostile environments, so replacing them becomes a difficult task. Thus, improving the energy of these networks i.e. network lifetime becomes important. The thesis provides methods for clustering and cluster head selection to WSN to improve energy efficiency using fuzzy logic controller. It presents a comparison between the different methods on the basis of the network lifetime. It compares existing ABC optimization method with BFO algorithm for different size of networks and different scenario. It provides cluster head selection method with good performance and reduced computational complexity. In addition it also proposes BFO as an algorithm for clustering of WSN which would result in improved performance with faster convergence.
A Survey of Fault Tolerance Methods in Wireless Sensor NetworksIRJET Journal
This document summarizes and analyzes various fault tolerance mechanisms for wireless sensor networks. It discusses mobile agent mechanisms, relay node mechanisms, and handover mechanisms. The document analyzes several existing fault tolerance methods, including Bayesian network models, probabilistic combinatorial optimization, dynamic power level adjustment, and integrated fault tolerance frameworks. Overall, the document provides an overview of important fault tolerance issues in wireless sensor networks and different approaches that have been proposed to address faults and improve reliability.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
This project report summarizes a wireless sensor network project completed by three students. It describes the objectives and types of routing protocols used in wireless sensor networks, focusing on the LEACH hierarchical routing protocol. It then discusses some weaknesses of LEACH and proposes an improved DECSA algorithm that selects cluster heads based on both distance and remaining energy to try to overcome LEACH's energy imbalance issues and extend network lifetime.
Congestion Control in Wireless Sensor Networks: A surveyIJERA Editor
Congestion is a major problem in almost all kinds of wireless networks such as mobile ad-hoc networks; wireless
sensor networks (WSNs). There are variety of applications of WSN such as defense, temperature monitoring,
health monitoring. Congestion occurs in the sensor network because of limited resources such as low processing
power of the sensor node. As all the sensor nodes are battery powered. Hence, congestion in the sensor network
results in waste of energy of sensor nodes. All the layers of protocol suite of the network can be involved in the
congestion control process. This paper gives a brief idea about various congestion control methods. In some of
the schemes, cross-layer design is applied for better results.
Routing Optimization with Load Balancing: an Energy Efficient ApproachEswar Publications
The area of Wireless Sensor Network (WSN) is covered with considerable range of problems, where majority of research attempts were carried out to enhance the network lifetime of WSN. But very few of the studies have proved successful. This manuscript discusses about a structure for optimizing routing and load balancing that uses standard radio and energy model to perform energy optimization by introducing a novel routing agent. The routing agent is built within aggregator node and base station to perform self motivated reconfiguration in case of energy depletion. Compared with standard LEACH algorithm, the proposed technique has better energy efficiency within optimal data aggregation duration.
The Image Transport Protocol (ITP) aims to more quickly transfer JPEG image files with less redundancy compared to TCP. ITP is implemented over UDP to avoid unnecessary overhead from handshaking and allow out-of-order delivery of data units, improving image quality. The receiver controls retransmissions to prioritize important data units and reduce sender overhead. Analysis shows ITP provides benefits like lower latency, higher image quality, and improved performance metrics compared to TCP-based image transfer.
Improved Video Transmission over MANETs using MDSR with MDCijsrd.com
MANET does not have any fixed infrastructure, so the mobile nodes are free to move within a network which results in dynamic change of network topology. The Real-time video transport has rigid bandwidth, delay, and a loss requirement to support this application in Mobile Ad-Hoc Networks is a challenge. MANET consists of mobile nodes that cause frequent link failures. This link failure causes two main problems. First, when a route break occurs, all packets that have already transmitted on that route are dropped which degrades the video quality and it decreases the average packet delivery ratio (PDR). Second, the transmission of data traffic is halted for the time till a new route is discovered and it increasing the average end-to-end delay. For that we have proposed Node-Disjoint Multipath Routing Based on DSR Protocol with Multiple Description Coding Technique (MDC). Node-Disjoint Path means there is no common node between two paths and MDC encode a media source into two or more sub-bit streams. The sub-streams, also called descriptions. The experiment has been done using NS2 simulator with Evalvid for evaluating the video quality. Our proposed scheme will improve Packet Delivery Ratio, Throughput and Decreased Average End-to-End Delay.
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
Efficient and stable route selection by using cross layer concept for highly mobile network with predictive features by Rupali Singh, Gajendra Singh Dhakad
published in International Journal of Research & Technology, Volume 3, Issue 4_November_2015
HANDLING CROSS-LAYER ATTACKS USING NEIGHBORS MONITORING SCHEME AND SWARM INTE...Editor IJCATR
The standard MAC protocol widely used for Mobile Adhoc Networks (MANETs) is IEEE 802.11.
When attacks in MAC layer are left as such without paying attention, it could possibly disturb channel access and
consequently may cause wastage of resources in terms of bandwidth and power. In this paper, a swarm based detection
and defense technique is proposed for routing and MAC layer attacks in MANET. Using forward and backward ants,
the technique obtains mean value of nodes between the first received RREQ and RREP packets. Based on this
estimation, the source node decides the node as valid or malicious. Moreover the MAC layer parameters namely
number of neighbors identified by the MAC layer, number of neighbors identified by the routing layer, the number of
recent MAC receptions and the number of recent routing protocol receptions are used to determine the node state. The
source node uses these two node state estimation techniques to construct the reliable path to the destination. This
proposed technique improves the network performance and at the same time prevents attackers intelligently.
NNTP is a protocol for transmitting news articles and posts between Usenet servers on the internet. It was developed in the 1980s at the University of California, San Diego and University of California, Berkeley to allow users to read and post to online newsgroups from personal computers connected to the internet, as the UUCP network did not support this capability across different file systems. The NNTP protocol is still widely used today for accessing online newsgroups, though some newer protocols like IMAP can also be used.
Congestion in Wireless Sensor Networks has negative impact on the Quality of Service.
Congestion effects the performance metrics, namely throughput and per-packet energy
consumption, network lifetime and packet delivery ratio. Reducing congestion allows better
utilization of the network resources and thus enhances the Quality of Service metrics of the
network. Traffic Aware Dynamic Routing to Alleviate Congestion in Wireless Sensor Networks
reduces congestion by considering one hop neighbor routing in the network. This paper
proposed an algorithm for Quality of Service Based Traffic-Aware Data forwarding for
congestion control in wireless sensor networks based on two hop neighbor information. On
detection of congestion, the algorithm forwards data packets around the congestion areas by
spreading the excessive packets through multiple paths. The path with light load or under
loaded nodes is efficiently utilized whenever congestion occurs. The main aspect of the
algorithm is to build path to the destination using two independent potential fields depth and
queue length. Queue length field solves the traffic-aware problem. Depth field creates a
backbone to forward packets to the sink. Both fields are combined to yield a hybrid potential
field to make dynamic decision for data forwarding. Network Simulator used for simulating the
algorithm is NS2. The proposed algorithm performs better.
This document discusses an energy-efficient multi-disjoint path opportunistic node connection routing protocol (EMOR) for wireless sensor networks deployed in neighborhood area networks for smart grids. EMOR utilizes the residual energy, availability of sensor node's buffer size, working-sleeping cycle, and link quality factor to calculate optimal path connectivity for both real-time and non-real-time traffic in order to improve packet delivery rate, network lifetime, end-to-end delay and reduce total energy consumption. The document provides background on wireless sensor networks, smart grids, opportunistic routing, and discusses related work on routing protocols for wireless sensor networks in smart grids and other applications.
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...divya_prabha
This document presents a synopsis for a seminar on an improved energy efficient routing protocol for wireless sensor networks. It begins with an introduction to wireless sensor networks and routing techniques, focusing on hierarchical routing protocols. It then describes the Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol and some of its variants. The main focus is on an Improved LEACH (I-LEACH) protocol, which aims to maximize network lifetime and minimize average energy consumption per node by selecting cluster heads based on residual energy, number of neighbors, and distance to the base station. The synopsis concludes with an outline of the seminar presentation and includes diagrams of the LEACH and I-LEACH protocols.
This document presents an introduction to a thesis that compares the performance of routing protocols in wireless sensor networks. It provides background on wireless sensor networks and discusses routing as an important issue. The introduction defines the problem, motivation, research questions, methodology, aims, assumptions, contributions, and organization of the thesis. It includes figures to illustrate typical wireless sensor network components, different network topologies, deployment densities, and a bar chart on simulation pause time.
The document discusses wireless sensor networks and describes their key characteristics. It notes that wireless sensor networks consist of low-power smart sensor nodes distributed over a large field to enable wireless sensing and data networking. The sensor nodes contain sensors, processors, memory, and radios. Wireless sensor networks can be either unstructured with dense node distribution or structured with few scattered nodes.
Qos group based optimal retransmission medium access protocol for wireless se...IJCNCJournal
This paper presents, a Group Based Optimal Retransmission Medium Access (GORMA) Protocol is
designed that combines protocol of Collision Avoidance (CA) and energy management for low-cost, shortrange,
low-data rate and low-energy sensor nodes applications in environment monitoring, agriculture,
industrial plants etc. In this paper, the GORMA protocol focuses on efficient MAC protocol to provide
autonomous Quality of Service (QoS) to the sensor nodes in one-hop QoS retransmission group and two
QoS groups in WSNs where the source nodes do not have receiver circuits. Hence, they can only transmit
data to a sink node, but cannot receive any control signals from the sink node. The proposed protocol
GORMA provides QoS to the nodes which work independently on predefined time by allowing them to
transmit each packet an optimal number of times within a given period. Our simulation results shows that
the performance of GORMA protocol, which maximize the delivery probability of one-hop QoS group and
two QoS groups and minimize the energy consumption.
Iaetsd quick detection technique to reduce congestion inIaetsd Iaetsd
This document proposes a quick detection technique (QDT) to avoid congestion in wireless sensor networks. QDT uses the queue buffer length of sensor nodes to estimate impending congestion and diffuses traffic across multiple paths to the base station. By dynamically routing traffic away from congested areas, QDT aims to improve packet delivery ratios and event reporting while avoiding congestion. The technique detects inactive nodes that do not properly forward or drop packets, and routes around them to reduce delays and maximize network lifetime. Simulation results show QDT significantly improves event reporting and packet delivery compared to other techniques.
The document presents a graduate project on efficient data aggregation from polling points in wireless sensor networks. The proposed system called Mobi-Cluster aims to minimize overall network overhead and energy expenditure associated with multi-hop data retrieval while ensuring balanced energy consumption and prolonged network lifetime. This is achieved through building cluster structures consisting of member nodes that route data to assigned cluster heads, and selecting appropriate polling points to act as intermediaries between clusters and a mobile collector. The key stages of the Mobi-Cluster protocol are described as cluster head selection, polling point selection, cluster head attachment to polling points, data aggregation and forwarding to polling points, and communication between polling points and the mobile collector.
A Survey of Routing Protocols for Structural Health MonitoringIJEEE
Wireless sensor networks have emerged in recent years as a promising technology that can impact the field of structural monitoring and infrastructure asset management. Various routing protocols are used to define communication among sensor nodes of the wireless sensor network for purpose of disseminating information. These routing protocols can be designed to improve the network performance in terms of energy consumption, delay and security issues. This paper discusses the requirements of routing protocol for Structural health monitoring and presents summary of various routing protocols used for WSNs for Structural health monitoring.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IRJET- Energy Optimization in Wireless Sensor Networks using Trust-Aware Rout...IRJET Journal
This document summarizes a research paper on optimizing energy usage in wireless sensor networks through a trust-aware routing algorithm. The paper proposes the Cost Aware Secure Routing (CASER) protocol, which aims to balance energy consumption across all sensor nodes to maximize network lifetime. CASER supports multiple routing strategies to extend lifetime while increasing routing security. Simulation results show CASER achieves excellent energy balance and increases network lifetime by more than four times under non-uniform energy deployment compared to other approaches. The paper also discusses detecting and recovering from node failures in wireless sensor networks.
The popularity of Wireless Sensor Networks (WSN) have increased rapidly and tremendously due to the vast potential of the sensor networks to connect the physical world with the virtual world. Since sensor devices rely on battery power and node energy and may be placed in hostile environments, so replacing them becomes a difficult task. Thus, improving the energy of these networks i.e. network lifetime becomes important. The thesis provides methods for clustering and cluster head selection to WSN to improve energy efficiency using fuzzy logic controller. It presents a comparison between the different methods on the basis of the network lifetime. It compares existing ABC optimization method with BFO algorithm for different size of networks and different scenario. It provides cluster head selection method with good performance and reduced computational complexity. In addition it also proposes BFO as an algorithm for clustering of WSN which would result in improved performance with faster convergence.
A Survey of Fault Tolerance Methods in Wireless Sensor NetworksIRJET Journal
This document summarizes and analyzes various fault tolerance mechanisms for wireless sensor networks. It discusses mobile agent mechanisms, relay node mechanisms, and handover mechanisms. The document analyzes several existing fault tolerance methods, including Bayesian network models, probabilistic combinatorial optimization, dynamic power level adjustment, and integrated fault tolerance frameworks. Overall, the document provides an overview of important fault tolerance issues in wireless sensor networks and different approaches that have been proposed to address faults and improve reliability.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
This project report summarizes a wireless sensor network project completed by three students. It describes the objectives and types of routing protocols used in wireless sensor networks, focusing on the LEACH hierarchical routing protocol. It then discusses some weaknesses of LEACH and proposes an improved DECSA algorithm that selects cluster heads based on both distance and remaining energy to try to overcome LEACH's energy imbalance issues and extend network lifetime.
Congestion Control in Wireless Sensor Networks: A surveyIJERA Editor
Congestion is a major problem in almost all kinds of wireless networks such as mobile ad-hoc networks; wireless
sensor networks (WSNs). There are variety of applications of WSN such as defense, temperature monitoring,
health monitoring. Congestion occurs in the sensor network because of limited resources such as low processing
power of the sensor node. As all the sensor nodes are battery powered. Hence, congestion in the sensor network
results in waste of energy of sensor nodes. All the layers of protocol suite of the network can be involved in the
congestion control process. This paper gives a brief idea about various congestion control methods. In some of
the schemes, cross-layer design is applied for better results.
Routing Optimization with Load Balancing: an Energy Efficient ApproachEswar Publications
The area of Wireless Sensor Network (WSN) is covered with considerable range of problems, where majority of research attempts were carried out to enhance the network lifetime of WSN. But very few of the studies have proved successful. This manuscript discusses about a structure for optimizing routing and load balancing that uses standard radio and energy model to perform energy optimization by introducing a novel routing agent. The routing agent is built within aggregator node and base station to perform self motivated reconfiguration in case of energy depletion. Compared with standard LEACH algorithm, the proposed technique has better energy efficiency within optimal data aggregation duration.
The Image Transport Protocol (ITP) aims to more quickly transfer JPEG image files with less redundancy compared to TCP. ITP is implemented over UDP to avoid unnecessary overhead from handshaking and allow out-of-order delivery of data units, improving image quality. The receiver controls retransmissions to prioritize important data units and reduce sender overhead. Analysis shows ITP provides benefits like lower latency, higher image quality, and improved performance metrics compared to TCP-based image transfer.
Improved Video Transmission over MANETs using MDSR with MDCijsrd.com
MANET does not have any fixed infrastructure, so the mobile nodes are free to move within a network which results in dynamic change of network topology. The Real-time video transport has rigid bandwidth, delay, and a loss requirement to support this application in Mobile Ad-Hoc Networks is a challenge. MANET consists of mobile nodes that cause frequent link failures. This link failure causes two main problems. First, when a route break occurs, all packets that have already transmitted on that route are dropped which degrades the video quality and it decreases the average packet delivery ratio (PDR). Second, the transmission of data traffic is halted for the time till a new route is discovered and it increasing the average end-to-end delay. For that we have proposed Node-Disjoint Multipath Routing Based on DSR Protocol with Multiple Description Coding Technique (MDC). Node-Disjoint Path means there is no common node between two paths and MDC encode a media source into two or more sub-bit streams. The sub-streams, also called descriptions. The experiment has been done using NS2 simulator with Evalvid for evaluating the video quality. Our proposed scheme will improve Packet Delivery Ratio, Throughput and Decreased Average End-to-End Delay.
Efficient and stable route selection by using cross layer concept for highly...Roopali Singh
Efficient and stable route selection by using cross layer concept for highly mobile network with predictive features by Rupali Singh, Gajendra Singh Dhakad
published in International Journal of Research & Technology, Volume 3, Issue 4_November_2015
HANDLING CROSS-LAYER ATTACKS USING NEIGHBORS MONITORING SCHEME AND SWARM INTE...Editor IJCATR
The standard MAC protocol widely used for Mobile Adhoc Networks (MANETs) is IEEE 802.11.
When attacks in MAC layer are left as such without paying attention, it could possibly disturb channel access and
consequently may cause wastage of resources in terms of bandwidth and power. In this paper, a swarm based detection
and defense technique is proposed for routing and MAC layer attacks in MANET. Using forward and backward ants,
the technique obtains mean value of nodes between the first received RREQ and RREP packets. Based on this
estimation, the source node decides the node as valid or malicious. Moreover the MAC layer parameters namely
number of neighbors identified by the MAC layer, number of neighbors identified by the routing layer, the number of
recent MAC receptions and the number of recent routing protocol receptions are used to determine the node state. The
source node uses these two node state estimation techniques to construct the reliable path to the destination. This
proposed technique improves the network performance and at the same time prevents attackers intelligently.
NNTP is a protocol for transmitting news articles and posts between Usenet servers on the internet. It was developed in the 1980s at the University of California, San Diego and University of California, Berkeley to allow users to read and post to online newsgroups from personal computers connected to the internet, as the UUCP network did not support this capability across different file systems. The NNTP protocol is still widely used today for accessing online newsgroups, though some newer protocols like IMAP can also be used.
A survey on different cross layer attacks and their defenses in manetsKhaleel Husain
This document summarizes various cross-layer attacks in mobile ad hoc networks (MANETs) and their defenses. It first introduces MANETs and discusses their vulnerabilities to security attacks. It then defines cross-layer attacks as attacks that are initiated at one layer but target another layer. The document surveys different types of cross-layer attacks that have been discovered, including interlayer attacks, denial of service attacks, and attacks against cooperation enforcement tools. It also discusses proposed defense mechanisms against these attacks. Finally, it suggests using particle swarm optimization instead of ant colony optimization to improve detection of cross-layer attacks in MANETs.
Ctcp a cross layer information based tcp for manetijasuc
Traditional TCP cannot detect link contention losses and route failure losses which occur in MANET and
considers every packet loss as congestion. This results in severe degradation of TCP performance. In this
research work, we modified the operations of TCP to adapt to network states. The cross-layer notifications
are used for adapting the congestion window and achieving better performance. We propose Cross-layer
information based Transmission Control Protocol (CTCP) which consists of four network states.
Decelerate state to recover from contention losses, Cautionary state to deal with route failures, Congested
state to handle network congestion and Normal state to be compatible with traditional TCP. Decelerate
state makes TCP slow down if the packet loss is believed to be due to contention rather than congestion.
Cautionary state suspends the TCP variables and after route reestablishment resumes with conservative
values. Congestion state calls congestion control when network is actually congested and normal state
works as standard TCP. Simulation results show that network state based CTCP is more appropriate for
MANET than packet loss based traditional TCP.
Vertical handoff and TCP performance optimizations using cross layer approachAnurag Mondal
This document discusses optimizing vertical handoffs and TCP performance in heterogeneous wireless networks using a cross-layer approach. It focuses on utilizing asymmetric data rates between overlapping networks. The objective is to develop a handoff method that provides better performance than one based solely on received signal strength. It involves considering handoff techniques from the physical layer alongside mobility management solutions from the transport layer. Various vertical handoff approaches are examined, including ones based on hysteresis, predictive RSS, and cross-layer techniques. Simulation results are presented comparing the proposed cross-layer approach to an existing one in terms of throughput, packet drops, and efficiency.
O documento discute o Wi-fi Direct e seu uso no Android. Explica que o Wi-fi Direct permite conexões diretas entre dispositivos sem a necessidade de uma rede Wi-fi e lista alguns aplicativos que usam essa tecnologia. Também descreve como o Android oferece APIs para desenvolvedores implementarem o Wi-fi Direct em seus aplicativos.
Qo s provisioning for scalable video streaming over ad hoc networks using cro...Mshari Alabdulkarim
This document discusses providing quality of service (QoS) for scalable video streaming over ad-hoc networks using cross-layer design. It begins by introducing multi-hop wireless networks and ad-hoc networks, noting their advantages and challenges. It then discusses QoS and cross-layer design approaches. The document proposes using cross-layer design to provision QoS for scalable video streaming over ad-hoc networks in order to overcome challenges like variable topology, limited resources and interference.
Cross Layer- Performance Enhancement Architecture (CL-PEA) for MANETijcncs
This document summarizes a proposed Cross Layer- Performance Enhancement Architecture (CL-PEA) for mobile ad hoc networks (MANETs). The key points are:
1) Existing TCP/IP architecture is not well-suited for the dynamic topology and limited resources of MANETs. A cross-layer design where all layers can exchange information is proposed to better optimize protocol performance.
2) The proposed CL-PEA adds a new hardware layer where parameters from the hardware, operating system, and other layers can be stored. This allows all layers to access information to make more informed decisions.
3) By exchanging parameters across layers, CL-PEA aims to enhance protocol performance in
Wifi Direct Based Chat And File Transfer Android ApplicationNitin Bhasin
This App allows you to share any kind of file present in SD card to other mobile phone directly at speed of 5+MBps. It even allows to click images shoot videos and directly dend to other device.It also allows to send drawings by having drawing pad in it in various colours and various brush sizes. Web-View is also implemented in it.
Link Of App At Amazon Store: http://www.amazon.com/Wifi-Direct-Chat-Transfer-Application/dp/B00TKFFMZO/ref=sr_1_1?s=mobile-apps&ie=UTF8&qid=1424009545&sr=1-1&keywords=Wifi+Direct+Chat+and+File+Transfer+Application
The document discusses the differences between packets and frames, and provides details on the transport layer. It explains that the transport layer is responsible for process-to-process delivery and uses port numbers for addressing. Connection-oriented protocols like TCP use three-way handshaking for connection establishment and termination, and implement flow and error control using mechanisms like sliding windows. Connectionless protocols like UDP are simpler but unreliable, treating each packet independently.
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
Advances in embedded systems have resulted in the development of wireless sensor networks, which not
only provide unique opportunities for monitoring but also controlling homes, cities and the environments.
Recent advancements in wireless sensor network have resulted into many new protocols some of them are
specifically designed for sensor network for detecting the event and routing the event related information to
the base station in efficient manner. This paper surveys recent event driven routing protocols for wireless
sensor network. We have compared various event driven routing protocols using different parameters like
Sink Centric, Node Centric, Reliability, Congestion control, Energy Efficiency, Loss reliability and loss
recovery. We have also described LEACH and MECN protocols but as they are not e
Mtadf multi hop traffic aware data for warding for congestion control in wir...ijwmn
The document summarizes a proposed algorithm called MTADF (Multi Hop Traffic-Aware Data Forwarding) for congestion control in wireless sensor networks. The algorithm uses two potential fields - depth potential field and queue length potential field - to route data packets around congested areas along multiple paths. This helps distribute traffic more evenly and utilize less busy nodes, reducing packet drops and improving throughput compared to existing one-hop routing algorithms. The algorithm constructs the two potential fields independently and then combines them to make dynamic forwarding decisions for data packets. Simulations show the MTADF algorithm performs better than previous work in mitigating congestion.
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...cscpconf
Congestion in Wireless Sensor Networks has negative impact on the Quality of Service.
Congestion effects the performance metrics, namely throughput and per-packet energy
consumption, network lifetime and packet delivery ratio. Reducing congestion allows better
utilization of the network resources and thus enhances the Quality of Service metrics of the
network. Traffic Aware Dynamic Routing to Alleviate Congestion in Wireless Sensor Networks
reduces congestion by considering one hop neighbor routing in the network. This paper
proposed an algorithm for Quality of Service Based Traffic-Aware Data forwarding for
congestion control in wireless sensor networks based on two hop neighbor information. On
detection of congestion, the algorithm forwards data packets around the congestion areas by
spreading the excessive packets through multiple paths. The path with light load or under
loaded nodes is efficiently utilized whenever congestion occurs. The main aspect of the
algorithm is to build path to the destination using two independent potential fields depth and
queue length. Queue length field solves the traffic-aware problem. Depth field creates a
backbone to forward packets to the sink. Both fields are combined to yield a hybrid potential
field to make dynamic decision for data forwarding. Network Simulator used for simulating the
algorithm is NS2. The proposed algorithm performs better.
Wireless Sensor Network (WSN) is partially distributed autonomous sensors to monitor physical or environmental conditions such as temperature, pressure etc. and to cooperatively pass their data through the network to the central location. The technique referred to as multi-hop wireless communications is used by the WSN’s to communicate. Due to the limited processing power and the finite power accessible to each sensor nodes, the application of regular routing techniques is not recommended. Hence recent advances in wireless sensor networks have made the routing protocols more efficient. This paper surveys and compares the advanced routing protocols. The three main categories discussed here are flat based, hierarchical based and location based. The paper concludes with open research issues.
Enhancement of energy efficiency and throughput using csmaca dcf operation fo...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...IRJET Journal
This document presents a virtual grid-based dynamic routes adjustment (VGDRA) scheme for wireless sensor networks with a mobile sink. The scheme aims to conserve network energy while dynamically routing information towards the moving sink. It divides the sensor field into a virtual grid with cell header nodes. These cell header nodes participate in adjusting routes according to the latest location of the mobile sink, reducing communication costs and energy consumption compared to having all nodes participate. The VGDRA scheme balances energy expenditure of nodes and allows data to be efficiently disseminated to the mobile sink as it changes locations through dynamic routing reconstruction using the virtual grid structure.
Improvement of quality of service parameters using reinvented fsmac protocol ...eSAT Journals
This document discusses improving quality of service parameters in wireless sensor networks using a reinvented FSMAC protocol. The FSMAC protocol first uses fuzzy logic to detect intrusions based on two new parameters: the number of times a node senses a free channel and the variation in channel sense periods. If an intrusion is detected, appropriate countermeasures are taken to reduce the effects of attacks. Simulations with 20 nodes show that the reinvented FSMAC protocol increases successful data transmission rates and network throughput.
This document discusses improving quality of service parameters in wireless sensor networks using a reinvented fuzzy logic secure media access control (FSMAC) protocol. It proposes using two new intrusion detection parameters - the number of times a node senses a free channel and the variation in the channel sense period. The protocol uses fuzzy logic to detect intrusions based on these parameters. If an intrusion is detected, the defense module is triggered to switch nodes to a different radio frequency band or stop transmissions to avoid attacks. Simulations with 20 nodes show this approach can increase successful data transmission rates and network throughput.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Performance evaluation of tcp sack1 in wimax network asymmetryeSAT Journals
Abstract The WiMAX technology support to different channel bandwidth, cyclic prefix, modulation coding scheme, frame duration, simultaneous two way data transfer and propagation model. The WiMAX network asymmetry is largely depends on DL: UL ratio. This paper evaluate the performance of TCP Sack1 by considering Channel Bandwidth, Cyclic Prefix, Modulation Coding Scheme, Frame Duration, Two way transfer and Propagation model in WiMAX network with network asymmetry. The performance of TCP Sack1 in WiMAX network is evaluating by varying MAC layer parameter such as channel bandwidth, cyclic prefix, modulation coding scheme, frame duration, DL: UL ratio and physical layer parameter such as propagation model and full duplex mode of data transfer and other operating parameter such as downloading traffic and these parameters really affect the performance of TCP Sack1 in WiMAX network. The performance of WiMAX network is measured in terms of throughput, goodput and number of packets dropped. Keywords: World Wide interoperability for microwave access (WiMAX), Subscriber Stations (SSs), Downlink (DL), Uplink (UL), Medium access control (MAC), Transmission Control Protocol (TCP), OFDM, IEEE 802.16, Throughput, Goodput and Packets drop
Transmitting urgent data using ANKM method.IRJET Journal
This document proposes a new mechanism called ANKM to transmit urgent data in wireless sensor networks. It discusses existing transport layer protocols that provide reliability but do not prioritize urgent data transmission. The ANKM mechanism uses an assured path to transmit urgent data with reliability while blocking normal data packets. It operates in three phases - selecting an assured path, transmitting urgent data along that path using reliability mechanisms, and then resuming normal network operations. The goal is to transmit urgent data with reliability and congestion control while still allowing normal data to flow when the urgent transmission is not occurring.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Abstract Now a day’s wireless sensor network has become an interesting research field. Network life time and energy efficiency are one of the main concerns for wireless sensor networks. Sensors are constrained in terms of battery power, storage, limited processing capacity etc. Because of these reasons new protocols are proposed for wireless sensor network. This paper only deals with cluster based hierarchical protocol TEEN (Threshold Sensitive Energy Efficient Sensor Network Protocol). The sensor network architecture in TEEN is based on a hierarchical clustering. TEEN is data-centric, reactive, event-driven protocol which is best suited for time critical application. It transmits data based on hard threshold and soft threshold values. If the thresholds are not reached, then nodes will never communicate. The user will not get any data from network and will not come to know if all the nodes die. So, user will not be able to distinguish between how many nodes are alive or dead in network and will not be able to know about network lifetime. This paper deals with that node will be able to tell base station or sink before leaving network and base station will be aware of alive and dead nodes in the network. Keywords: WSN; TEEN (Threshold Sensitive Energy Efficient Clustering); Hard Threshold; Soft Threshold;
This document summarizes and compares several routing protocols for wireless sensor networks. It begins with an introduction to wireless sensor networks and discusses some of the key challenges in routing for these networks, such as large numbers of sensor nodes, energy constraints, and random node deployment. The document then categorizes routing protocols as flat-based, hierarchical-based, or location-based and focuses on reviewing various dynamic and static hierarchical/clustering-based routing protocols. Several popular protocols are described in detail, including LEACH, EECS, PEGASIS, and EEPSC. The pros and cons of each approach are discussed.
Energy efficient routing in wireless sensor network based on mobile sink guid...IJECEIAES
In wireless sensor networks (WSNs), the minimization of usage of energy in the sensor nodes is a key task. Three salient functions are performed by WSNs’ sensor nodes namely data sensing, transmitting and relaying. Routing technique is one of the methods to enhance the sensor nodes battery lifetime. Energy optimization is done by using one of the heuristic routing methods for data sensing and transmission. To enhance the energy optimization mainly concentrated on data relaying. In this work stochastic hill climbing is adapted. The proposed solution for data relaying utilizes geographical routing and mobile sink technique. The sink collects the data from cluster heads and movement of the sink is routed by stochastic hill climbing. Experimentation is done on the network simulator 2 Platform. The existing routing techniques like threshold sensitive energy efficient sensor network, energy-efficient low duty cycle, and adaptive clustering protocol are compared with the obtained results of chosen algorithm. The proposed work shows promising results with respect to lifetime, average energy of nodes and packet delivery ratio.
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
A wireless sensor network is composed of many sensor nodes, that have beengiven out in a
specific zoneandeach of them hadanability of collecting information from the environment and
sending collected data to the sink. The most significant issues in wireless sensor networks,
despite the recent progress is the trouble of the severe limitations of energy resources.Since that
in different applications of sensor nets, we could throw a static or mobile sink, then all aspects of
such networks should be planned with an awareness of energy.One of the most significant topics
related to these networks, is routing. One of the most widely used and efficient methods of
routing isa hierarchy (based on clustering) method.
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
The document summarizes an algorithm proposed to reduce energy consumption in wireless sensor networks using duty cycling and multi-hop routing. The key aspects of the algorithm are:
1) Layering the network environment based on size and identifying the optimal number of cluster heads in each layer.
2) Selecting the first layer closest to the sink as the "gateway layer" and stopping energy usage in half of these sensors to extend the network lifespan.
3) Using multi-hop routing whereby cluster heads send data to heads in the above layer until the gateway layer, which then sends to the static or mobile sink.
4) Simulation results showed the proposed algorithm performs better than LEACH and ELEACH in terms of
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...ijcncs
This document presents a study on an energy aware routing protocol called Energy Aware DSR (EADSR) for wireless sensor networks. EADSR is an extension of the Dynamic Source Routing (DSR) protocol that adds energy awareness to improve network lifetime. The study compares the performance of DSR and EADSR through simulations. Results show that EADSR outperforms DSR in terms of energy savings and avoids early network partitioning caused by nodes draining their energy quickly. EADSR selects routes based on the total energy of nodes along the path and notifies neighbors when a node's energy is low to find alternative routes before it fails.
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET Journal
This document summarizes a research paper on node deployment strategies to improve coverage area in wireless sensor networks. It discusses how node deployment is a key design issue that affects network performance metrics like coverage, connectivity, lifetime and robustness. There are two main types of node deployment - manual and random. Manual deployment precisely positions nodes but is not feasible for large-scale networks. Random deployment using techniques like aerial dropping can achieve wide coverage but results may not be optimal. The paper then reviews several node deployment algorithms proposed in other research to optimize coverage through approaches like virtual force-based mobility and bee colony optimization algorithms. It concludes node deployment is important for wireless sensor network effectiveness.
This document summarizes a paper on the challenges of wireless sensor networks, with a focus on time synchronization issues. It discusses how wireless sensor networks face many constraints including limited energy, bandwidth, and resources. It also outlines various challenges such as security, deployment, and design constraints. The document then discusses the importance of time synchronization for applications requiring coordination between sensor nodes. It describes issues that can cause clocks to drift like clock skew. It also analyzes different communication methods and synchronization protocols for wireless sensor networks, comparing their advantages and disadvantages.
Human: Thank you, that is a concise 3 sentence summary that captures the key aspects of the document.
Similar to Transport layer protocol for urgent data transmission in wsn (20)
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
Abstract
The effect of addition of mono fibers and hybrid fibers on the mechanical properties of concrete mixture is studied in the present
investigation. Steel fibers of 1% and polypropylene fibers 0.036% were added individually to the concrete mixture as mono fibers and
then they were added together to form a hybrid fiber reinforced concrete. Mechanical properties such as compressive, split tensile and
flexural strength were determined. The results show that hybrid fibers improve the compressive strength marginally as compared to
mono fibers. Whereas, hybridization improves split tensile strength and flexural strength noticeably.
Keywords:-Hybridization, mono fibers, steel fiber, polypropylene fiber, Improvement in mechanical properties.
Material management in construction – a case studyeSAT Journals
Abstract
The objective of the present study is to understand about all the problems occurring in the company because of improper application
of material management. In construction project operation, often there is a project cost variance in terms of the material, equipments,
manpower, subcontractor, overhead cost, and general condition. Material is the main component in construction projects. Therefore,
if the material management is not properly managed it will create a project cost variance. Project cost can be controlled by taking
corrective actions towards the cost variance. Therefore a methodology is used to diagnose and evaluate the procurement process
involved in material management and launch a continuous improvement was developed and applied. A thorough study was carried
out along with study of cases, surveys and interviews to professionals involved in this area. As a result, a methodology for diagnosis
and improvement was proposed and tested in selected projects. The results obtained show that the main problem of procurement is
related to schedule delays and lack of specified quality for the project. To prevent this situation it is often necessary to dedicate
important resources like money, personnel, time, etc. To monitor and control the process. A great potential for improvement was
detected if state of the art technologies such as, electronic mail, electronic data interchange (EDI), and analysis were applied to the
procurement process. These helped to eliminate the root causes for many types of problems that were detected.
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
Abstract
Drought management needs multidisciplinary action. Interdisciplinary efforts among the experts in various fields of the droughts
prone areas are helpful to achieve tangible and permanent solution for this recurring problem. The Gulbarga district having the total
area around 16, 240 sq.km, and accounts 8.45 per cent of the Karnataka state area. The district has been situated with latitude 17º 19'
60" North and longitude of 76 º 49' 60" east. The district is situated entirely on the Deccan plateau positioned at a height of 300 to
750 m above MSL. Sub-tropical, semi-arid type is one among the drought prone districts of Karnataka State. The drought
management is very important for a district like Gulbarga. In this paper various short term strategies are discussed to mitigate the
drought condition in the district.
Keywords: Drought, South-West monsoon, Semi-Arid, Rainfall, Strategies etc.
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
Abstract
Pavements are subjected to severe condition of stresses and weathering effects from the day they are constructed and opened to traffic
mainly due to its fatigue behavior and environmental effects. Therefore, pavement rehabilitation is one of the most important
components of entire road systems. This paper highlights the design of concrete pavement with added mono fibers like polypropylene,
steel and hybrid fibres for a widened portion of existing concrete pavement and various overlay alternatives for an existing
bituminous pavement in an urban road in Bangalore. Along with this, Life cycle cost analyses at these sections are done by Net
Present Value (NPV) method to identify the most feasible option. The results show that though the initial cost of construction of
concrete overlay is high, over a period of time it prove to be better than the bituminous overlay considering the whole life cycle cost.
The economic analysis also indicates that, out of the three fibre options, hybrid reinforced concrete would be economical without
compromising the performance of the pavement.
Keywords: - Fatigue, Life cycle cost analysis, Net Present Value method, Overlay, Rehabilitation
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
Abstract
The issue of growing demand on our nation’s roadways over that past couple of decades, decreasing budgetary funds, and the need to
provide a safe, efficient, and cost effective roadway system has led to a dramatic increase in the need to rehabilitate our existing
pavements and the issue of building sustainable road infrastructure in India. With these emergency of the mentioned needs and this
are today’s burning issue and has become the purpose of the study.
In the present study, the samples of existing bituminous layer materials were collected from NH-48(Devahalli to Hassan) site.The
mixtures were designed by Marshall Method as per Asphalt institute (MS-II) at 20% and 30% Reclaimed Asphalt Pavement (RAP).
RAP material was blended with virgin aggregate such that all specimens tested for the, Dense Bituminous Macadam-II (DBM-II)
gradation as per Ministry of Roads, Transport, and Highways (MoRT&H) and cost analysis were carried out to know the economics.
Laboratory results and analysis showed the use of recycled materials showed significant variability in Marshall Stability, and the
variability increased with the increase in RAP content. The saving can be realized from utilization of recycled materials as per the
methodology, the reduction in the total cost is 19%, 30%, comparing with the virgin mixes.
Keywords: Reclaimed Asphalt Pavement, Marshall Stability, MS-II, Dense Bituminous Macadam-II
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
This document summarizes a study on stabilizing expansive black cotton soil with the natural inorganic stabilizer RBI-81. Laboratory tests were conducted to evaluate the effect of RBI-81 on the soil's engineering properties. The tests showed that with 2% RBI-81 and 28 days of curing, the unconfined compressive strength increased by around 250% and the CBR value improved by approximately 400% compared to the untreated soil. Overall, the study found that RBI-81 effectively improved the strength properties of the black cotton soil and its suitability as a soil stabilizer was supported.
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
Abstract
Reinforced masonry was developed to exploit the strength potential of masonry and to solve its lack of tensile strength. Experimental
and analytical studies have been carried out to investigate the effect of reinforcement on the behavior of hollow concrete block
masonry prisms under compression and to predict ultimate failure compressive strength. In the numerical program, three dimensional
non-linear finite elements (FE) model based on the micro-modeling approach is developed for both unreinforced and reinforced
masonry prisms using ANSYS (14.5). The proposed FE model uses multi-linear stress-strain relationships to model the non-linear
behavior of hollow concrete block, mortar, and grout. Willam-Warnke’s five parameter failure theory has been adopted to model the
failure of masonry materials. The comparison of the numerical and experimental results indicates that the FE models can successfully
capture the highly nonlinear behavior of the physical specimens and accurately predict their strength and failure mechanisms.
Keywords: Structural masonry, Hollow concrete block prism, grout, Compression failure, Finite element method,
Numerical modeling.
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
This document summarizes a study on the influence of compaction energy on soil stabilized with a chemical stabilizer. Laboratory tests were conducted on locally available loamy soil treated with a patented polymer liquid stabilizer and compacted at four different energy levels. The study found that increasing the compaction effort increased the density of both untreated and treated soil, but the rate of increase was lower for stabilized soil. Treating the soil with the stabilizer improved its unconfined compressive strength and resilient modulus, and reduced accumulated plastic strain, with these properties further improved by higher compaction efforts. The stabilized soil exhibited strength and performance benefits compared to the untreated soil.
Geographical information system (gis) for water resources managementeSAT Journals
This document describes a hydrological framework developed in the form of a Hydrologic Information System (HIS) to meet the information needs of various government departments related to water management in a state. The HIS consists of a hydrological database coupled with tools for collecting and analyzing spatial and non-spatial water resources data. It also incorporates a hydrological model to indirectly assess water balance components over space and time. A web-based GIS portal was created to allow users to access and visualize the hydrological data, as well as outputs from the SWAT hydrological model. The framework is intended to facilitate integrated water resources planning and management across different administrative levels.
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
Abstract
The study demonstrate the potentiality of satellite remote sensing technique for the generation of baseline information on forest types
including tree plantation details in Bidar forest division, Karnataka covering an area of 5814.60Sq.Kms. The Total Area of Bidar
forest division is 5814Sq.Kms analysis of the satellite data in the study area reveals that about 84% of the total area is Covered by
crop land, 1.778% of the area is covered by dry deciduous forest, 1.38 % of mixed plantation, which is very threatening to the
environmental stability of the forest, future plantation site has been mapped. With the use of latest Geo-informatics technology proper
and exact condition of the trees can be observed and necessary precautions can be taken for future plantation works in an appropriate
manner
Keywords:-RS, GIS, GPS, Forest Type, Tree Plantation
Factors influencing compressive strength of geopolymer concreteeSAT Journals
Abstract
To study effects of several factors on the properties of fly ash based geopolymer concrete on the compressive strength and also the
cost comparison with the normal concrete. The test variables were molarities of sodium hydroxide(NaOH) 8M,14M and 16M, ratio of
NaOH to sodium silicate (Na2SiO3) 1, 1.5, 2 and 2.5, alkaline liquid to fly ash ratio 0.35 and 0.40 and replacement of water in
Na2SiO3 solution by 10%, 20% and 30% were used in the present study. The test results indicated that the highest compressive
strength 54 MPa was observed for 16M of NaOH, ratio of NaOH to Na2SiO3 2.5 and alkaline liquid to fly ash ratio of 0.35. Lowest
compressive strength of 27 MPa was observed for 8M of NaOH, ratio of NaOH to Na2SiO3 is 1 and alkaline liquid to fly ash ratio of
0.40. Alkaline liquid to fly ash ratio of 0.35, water replacement of 10% and 30% for 8 and 16 molarity of NaOH and has resulted in
compressive strength of 36 MPa and 20 MPa respectively. Superplasticiser dosage of 2 % by weight of fly ash has given higher
strength in all cases.
Keywords: compressive strength, alkaline liquid, fly ash
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
Abstract
Composite Circular hollow Steel tubes with and without GFRP infill for three different grades of Light weight concrete are tested for
ultimate load capacity and axial shortening , under Cyclic loading. Steel tubes are compared for different lengths, cross sections and
thickness. Specimens were tested separately after adopting Taguchi’s L9 (Latin Squares) Orthogonal array in order to save the initial
experimental cost on number of specimens and experimental duration. Analysis was carried out using ANN (Artificial Neural
Network) technique with the assistance of Mini Tab- a statistical soft tool. Comparison for predicted, experimental & ANN output is
obtained from linear regression plots. From this research study, it can be concluded that *Cross sectional area of steel tube has most
significant effect on ultimate load carrying capacity, *as length of steel tube increased- load carrying capacity decreased & *ANN
modeling predicted acceptable results. Thus ANN tool can be utilized for predicting ultimate load carrying capacity for composite
columns.
Keywords: Light weight concrete, GFRP, Artificial Neural Network, Linear Regression, Back propagation, orthogonal
Array, Latin Squares
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
This document summarizes an experimental study that tested circular concrete-filled steel tube columns with varying parameters. 45 specimens were tested with different fiber percentages (0-2%), tube diameter-to-wall-thickness ratios (D/t from 15-25), and length-to-diameter (L/d) ratios (from 2.97-7.04). The results found that columns filled with fiber-reinforced concrete exhibited higher stiffness, equal ductility, and enhanced energy absorption compared to those filled with plain concrete. The load carrying capacity increased with fiber content up to 1.5% but not at 2.0%. The analytical predictions of failure load closely matched the experimental values.
Evaluation of punching shear in flat slabseSAT Journals
Abstract
Flat-slab construction has been widely used in construction today because of many advantages that it offers. The basic philosophy in
the design of flat slab is to consider only gravity forces; this method ignores the effect of punching shear due to unbalanced moments
at the slab column junction which is critical. An attempt has been made to generate generalized design sheets which accounts both
punching shear due to gravity loads and unbalanced moments for cases (a) interior column; (b) edge column (bending perpendicular
to shorter edge); (c) edge column (bending parallel to shorter edge); (d) corner column. These design sheets are prepared as per
codal provisions of IS 456-2000. These design sheets will be helpful in calculating the shear reinforcement to be provided at the
critical section which is ignored in many design offices. Apart from its usefulness in evaluating punching shear and the necessary
shear reinforcement, the design sheets developed will enable the designer to fix the depth of flat slab during the initial phase of the
design.
Keywords: Flat slabs, punching shear, unbalanced moment.
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
Abstract
Intake towers are typically tall, hollow, reinforced concrete structures and form entrance to reservoir outlet works. A parametric
study on dynamic behavior of circular cylindrical towers can be carried out to study the effect of depth of submergence, wall thickness
and slenderness ratio, and also effect on tower considering dynamic analysis for time history function of different soil condition and
by Goyal and Chopra accounting interaction effects of added hydrodynamic mass of surrounding and inside water in intake tower of
dam
Key words: Hydrodynamic mass, Depth of submergence, Reservoir, Time history analysis,
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
This document evaluates the operational efficiency of an urban road network in Tiruchirappalli, India using travel time reliability measures. Traffic volume and travel times were collected using video data from 8-10 AM on various roads. Average travel times, 95th percentile travel times, and buffer time indexes were calculated to assess reliability. Non-motorized vehicles were found to most impact reliability on one road. A relationship between buffer time index and traffic volume was developed. Finally, a travel time model was created and validated based on length, speed, and volume.
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
Abstract
The development of watershed aims at productive utilization of all the available natural resources in the entire area extending from
ridge line to stream outlet. The per capita availability of land for cultivation has been decreasing over the years. Therefore, water and
the related land resources must be developed, utilized and managed in an integrated and comprehensive manner. Remote sensing and
GIS techniques are being increasingly used for planning, management and development of natural resources. The study area, Nallur
Amanikere watershed geographically lies between 110 38’ and 110 52’ N latitude and 760 30’ and 760 50’ E longitude with an area of
415.68 Sq. km. The thematic layers such as land use/land cover and soil maps were derived from remotely sensed data and overlayed
through ArcGIS software to assign the curve number on polygon wise. The daily rainfall data of six rain gauge stations in and around
the watershed (2001-2011) was used to estimate the daily runoff from the watershed using Soil Conservation Service - Curve Number
(SCS-CN) method. The runoff estimated from the SCS-CN model was then used to know the variation of runoff potential with different
land use/land cover and with different soil conditions.
Keywords: Watershed, Nallur watershed, Surface runoff, Rainfall-Runoff, SCS-CN, Remote Sensing, GIS.
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
This document summarizes a study that used remote sensing and GIS techniques to estimate morphometric parameters and runoff for the Yagachi catchment area in India over a 10-year period. Morphometric analysis was conducted to understand the hydrological response at the micro-watershed level. Daily runoff was estimated using the SCS curve number model. The results showed a positive correlation between rainfall and runoff. Land use/land cover changes between 2001-2010 were found to impact estimated runoff amounts. Remote sensing approaches provided an effective means to model runoff for this large, ungauged area.
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
Abstract The nonlinear Static procedure also well known as pushover analysis is method where in monotonically increasing loads are applied to the structure till the structure is unable to resist any further load. It is a popular tool for seismic performance evaluation of existing and new structures. In literature lot of research has been carried out on conventional pushover analysis and after knowing deficiency efforts have been made to improve it. But actual test results to verify the analytically obtained pushover results are rarely available. It has been found that some amount of variation is always expected to exist in seismic demand prediction of pushover analysis. Initial study is carried out by considering user defined hinge properties and default hinge length. Attempt is being made to assess the variation of pushover analysis results by considering user defined hinge properties and various hinge length formulations available in literature and results compared with experimentally obtained results based on test carried out on a G+2 storied RCC framed structure. For the present study two geometric models viz bare frame and rigid frame model is considered and it is found that the results of pushover analysis are very sensitive to geometric model and hinge length adopted. Keywords: Pushover analysis, Base shear, Displacement, hinge length, moment curvature analysis
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
Abstract
Depletion of natural resources and aggregate quarries for the road construction is a serious problem to procure materials. Hence
recycling or reuse of material is beneficial. On emphasizing development in sustainable construction in the present era, recycling of
asphalt pavements is one of the effective and proven rehabilitation processes. For the laboratory investigations reclaimed asphalt
pavement (RAP) from NH-4 and crumb rubber modified binder (CRMB-55) was used. Foundry waste was used as a replacement to
conventional filler. Laboratory tests were conducted on asphalt concrete mixes with 30, 40, 50, and 60 percent replacement with RAP.
These test results were compared with conventional mixes and asphalt concrete mixes with complete binder extracted RAP
aggregates. Mix design was carried out by Marshall Method. The Marshall Tests indicated highest stability values for asphalt
concrete (AC) mixes with 60% RAP. The optimum binder content (OBC) decreased with increased in RAP in AC mixes. The Indirect
Tensile Strength (ITS) for AC mixes with RAP also was found to be higher when compared to conventional AC mixes at 300C.
Keywords: Reclaimed asphalt pavement, Foundry waste, Recycling, Marshall Stability, Indirect tensile strength.
Home security is of paramount importance in today's world, where we rely more on technology, home
security is crucial. Using technology to make homes safer and easier to control from anywhere is
important. Home security is important for the occupant’s safety. In this paper, we came up with a low cost,
AI based model home security system. The system has a user-friendly interface, allowing users to start
model training and face detection with simple keyboard commands. Our goal is to introduce an innovative
home security system using facial recognition technology. Unlike traditional systems, this system trains
and saves images of friends and family members. The system scans this folder to recognize familiar faces
and provides real-time monitoring. If an unfamiliar face is detected, it promptly sends an email alert,
ensuring a proactive response to potential security threats.
Generative AI Use cases applications solutions and implementation.pdfmahaffeycheryld
Generative AI solutions encompass a range of capabilities from content creation to complex problem-solving across industries. Implementing generative AI involves identifying specific business needs, developing tailored AI models using techniques like GANs and VAEs, and integrating these models into existing workflows. Data quality and continuous model refinement are crucial for effective implementation. Businesses must also consider ethical implications and ensure transparency in AI decision-making. Generative AI's implementation aims to enhance efficiency, creativity, and innovation by leveraging autonomous generation and sophisticated learning algorithms to meet diverse business challenges.
https://www.leewayhertz.com/generative-ai-use-cases-and-applications/
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Mechatronics is a multidisciplinary field that refers to the skill sets needed in the contemporary, advanced automated manufacturing industry. At the intersection of mechanics, electronics, and computing, mechatronics specialists create simpler, smarter systems. Mechatronics is an essential foundation for the expected growth in automation and manufacturing.
Mechatronics deals with robotics, control systems, and electro-mechanical systems.
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...PriyankaKilaniya
Energy efficiency has been important since the latter part of the last century. The main object of this survey is to determine the energy efficiency knowledge among consumers. Two separate districts in Bangladesh are selected to conduct the survey on households and showrooms about the energy and seller also. The survey uses the data to find some regression equations from which it is easy to predict energy efficiency knowledge. The data is analyzed and calculated based on five important criteria. The initial target was to find some factors that help predict a person's energy efficiency knowledge. From the survey, it is found that the energy efficiency awareness among the people of our country is very low. Relationships between household energy use behaviors are estimated using a unique dataset of about 40 households and 20 showrooms in Bangladesh's Chapainawabganj and Bagerhat districts. Knowledge of energy consumption and energy efficiency technology options is found to be associated with household use of energy conservation practices. Household characteristics also influence household energy use behavior. Younger household cohorts are more likely to adopt energy-efficient technologies and energy conservation practices and place primary importance on energy saving for environmental reasons. Education also influences attitudes toward energy conservation in Bangladesh. Low-education households indicate they primarily save electricity for the environment while high-education households indicate they are motivated by environmental concerns.
Accident detection system project report.pdfKamal Acharya
The Rapid growth of technology and infrastructure has made our lives easier. The
advent of technology has also increased the traffic hazards and the road accidents take place
frequently which causes huge loss of life and property because of the poor emergency facilities.
Many lives could have been saved if emergency service could get accident information and
reach in time. Our project will provide an optimum solution to this draw back. A piezo electric
sensor can be used as a crash or rollover detector of the vehicle during and after a crash. With
signals from a piezo electric sensor, a severe accident can be recognized. According to this
project when a vehicle meets with an accident immediately piezo electric sensor will detect the
signal or if a car rolls over. Then with the help of GSM module and GPS module, the location
will be sent to the emergency contact. Then after conforming the location necessary action will
be taken. If the person meets with a small accident or if there is no serious threat to anyone’s
life, then the alert message can be terminated by the driver by a switch provided in order to
avoid wasting the valuable time of the medical rescue team.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELijaia
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Transport layer protocol for urgent data transmission in wsn
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 81
TRANSPORT LAYER PROTOCOL FOR URGENT DATA
TRANSMISSION IN WSN
AshwiniD.Karanjawane1
, Atul W. Rohankar2
, S. D. Mali3
, A. A. Agarkar4
1, 3
Department of E&TC, Sinhgad College of Engineering, Maharashtra, India, ashwini_karanjawane@yahoo.co.in
2, 4
Department of IT, Sinhgad College of Engineering, Maharashtra, India, rohankar@sinhgad.edu
Abstract
wireless sensor networks is a growing class of highly dynamic, complex network environment on top of which a wide range of
applications, such as habitat monitoring, object tracking, precision agriculture, building monitoring and military systems are built.
The real time applications often generate urgent data and one-time event notifications that need to be communicated reliably. The
successful delivery of such information has a direct effect on the overall performance of the system. Reliable communication is
important for sensor networks. Urgent data transmission has been a serious problem for Wireless sensor networks. WSN face
difficulties in handling urgent data like congestion and reliability due to their unique requirements and constraints. Various protocols
for congestion avoidance and reliability achievement for WSN have been proposed recently. Few of them have also worked on
congestion elimination. These protocols try to minimize the problem using different mechanism. This paper explores these mechanisms
and tries to find their features and limitations which directed us for our research.
Keywords: Congestion, Reliability, Transport layer Protocol, Urgent data transmission, Wireless Sensor Network.
----------------------------------------------------------------------***------------------------------------------------------------------------
1. INTRODUCTION
A WSN as a social infrastructure must transmit urgent
information faster and more reliable than other information[1].
This sort of WSNs would carry both urgent and non-urgent
information, which apparently should not be handled equally.
The urgent information, in areas like security, disaster,
environmental, and vital conditions monitoring applications,
has to be carried through a WSN with higher reliability and
lower delay than other non-urgent information such that for
regular monitoring for living and working space control. It
means that a WSN must be capable of differentiating and
prioritizing packets depending on their urgency and importance
according to requests from the application layer. Main
motivating scenario for this concept is the realization of
quality-enabled networks for environmental monitoring in
disaster prevention and emergency response scenarios such as
underground mines.
The traditional transport protocols are not directly useful for
wireless sensor network. There is a need to synthesize the WSN
characteristics and transport layer requirement for the same. In
this paper, we present survey of transport layer work cited in
the literature. Classification and relevance to the WSN scenario
is discussed to formulate the specification and guidelines for
our protocol. Further we discuss the core functionalities of the
transport layer protocol and its implementation issues.
Rest of the paper is organized as follows: WSNs transport layer
requirements are discussed in Section2. In section 3 we will
briefly summarize Transport layer design issues. Section 4
provides brief overview of the related work on transport
protocols and urgent information transmission Section 5
provides comparative summary of the surveyed protocols and
finally we conclude in section 6
2. TRANSPORT LAYER REQUIREMENT
The transport layer protocols for wireless sensor networks
should support:
2.1 Reliability
For Wireless Sensor Networks[2] packet loss in wireless sensor
networks is usually due to the quality of the wireless channel,
sensor failure, and congestion. Most of the applications need
reliable transmission of each packet, and thus packet-level
reliability is required. Reliability in wireless sensor networks
can be realized by different characteristics such as,
a) Reliability Level : Packet Reliability and Event
Reliability
b) Loss Detection and Notification :
Acknowledgment (ACK)
Negative Acknowledgment (NACK)
Selective Acknowledgment (SACK)
c) Error Recovery: End-to-End and Hop-by-Hop
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 82
2.2 Congestion Control
For Wireless Sensor Networks In wireless sensor networks, the
main sources of congestion are interference between concurrent
data transmissions, the addition or removal of sensor nodes in
the network, high data rates, many-to-one network topology,
huge bursts of event data, and collision in the physical channel
Congestion generally occurs due to the packet-arrival rate
exceeding the packet service rate. This is more likely to occur
at sensor nodes close to the sink, as they usually carry more
combined upstream traffic. Congestion also arises on the
wireless link due to noise, interference, contention, or bit
synchronization errors. Congestion control can be perform in
following ways,
1) Congestion Detection: Protocols employ a mechanism
whether or not a congestion occurred and at what location.
Combinations of parameters like Buffer Occupancy,
Packet rate, Packet Service Time/Packet Inter-Arrival
Time, Node Delay, Channel Status can be used to detect
congestion.
2) Congestion Notification: After detecting congestion, the
congestion notification information needs to be conveyed
from the congested nodes to their neighbors or to the
source nodes or destination nodes in wireless sensor
networks.
3) Congestion Avoidance: A direct way of avoiding
congestion is to simply stop sending packets into the
network, or to send at a lower rate. It also requires that
sensor nodes limit their flow to their next-hop neighbors
and help them to deal with congestion. There are three
different techniques for congestion avoidance as rate
adjustment, traffic redirection and polite gossip policy.
2.3 Energy Efficiency
In wireless sensor networks, transport layer protocols should
avoid packet loss as much as possible since loss translates to
energy waste. A sensor node consists of one or more integrated
sensors, embedded processors with limited capability, and
short-range radio communication ability. These sensor nodes
are powered using batteries and have limited energy. Since the
nodes in the wireless sensor networks are battery powered, the
energy consumed during their operation equates directly to the
overall network life-time. A packet loss in wireless sensor
networks can be common due to bit error and/or congestion. In
case of congestion, significant amount of packet loss takes
place due to lack of huge buffer space for the overwhelming
number of packets. This results in packet retransmission and
causes a significant amount of energy loss and delivery delay.
3. TRANSPORT PROTOCOL DESIGN ISSUES
Following are major issues in transport protocol design.
3.1 Congestion Control and Reliability
Transport layer is responsible for congestion control and
reliable delivery of data[2]. Since most data are from the sensor
nodes to the sink, congestion might occur around the sink.
Although MAC protocol can recover packets loss as a result of
bit error, it has no way handling packet loss as a result of buffer
overflow. WSNs need a mechanism for packet loss recovery,
such as ACK and selective ACK used in TCP. Furthermore,
reliable delivery in WSNs may have a different meaning than
that in traditional networks; correct transmission of every
packet is guaranteed. For certain sensor applications, WSNs
only need to receive packets correctly from a fraction of
sensors in that area, not from every sensor node in that area.
This observation can result in an important input for the design
of WSN transport protocols. Energy efficiency can be
improved by reducing packet loss. For this purpose we should
use hop-by-hop congestion control and packet loss recovery
mechanism. The hop-by- hop approach can also reduce the
buffer requirement at the central nodes.
3.2 Quality of Service (QoS)
Transport protocols for wireless sensor networks should
simplify the initial connection establishment process or use a
connectionless protocol to speed up the connection process,
improve throughput, and lower transmission delay[2]. Most
applications in WSNs are reactive, which means that they
monitor passively and wait for events to occur before sending
data to the sink. These applications may have only a few
packets to send as the result of an event.
3.3 Packets Dropping Rate
Transport protocols for WSNs should avoid packet loss as
much as possible since loss translates to energy waste[2]. To
avoid packet loss, the transport protocol should use an active
congestion control (ACC) at the cost of slightly lower link
utilization. ACC triggers congestion avoidance before
congestion actually occurs. As an example of ACC, the sender
(or intermediate nodes) may reduce its sending (or forwarding)
rate when the buffer size of the downstream neighbors exceeds
a certain threshold.
3.4 Throughput
The transport control protocols should guarantee fairness for
different nodes in order that each node can achieve fair
throughput.
3.5 Cross-Layer Optimization
If possible, a transport protocol should be designed with cross-
layer optimization in mind. For example, if a routing algorithm
informs the transport protocol of route failure, the protocol will
be able to deduce that packet loss is not from congestion but
from route failure. In this case, the sender may maintain its
current rate.
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 83
4. LITERATURE SURVEY
A larger number of wireless sensor network applications
require urgent data delivery. However, due to the nature of
sensor networks, designing a data transport protocol for urgent
transmission faces many challenges, such reliability and
congestion. This section presents an overview of general
reliability and congestion control issues in the data transport
protocol for wireless sensor networks and discusses some
recently proposed data transport protocols.
There are several transport protocols that have been designed
for wireless sensor networks. The existing transport protocols
are distinguished by three different categories which are
protocol providing only reliability, few provides only
congestion control and protocol that provides both reliability
and congestion control. Followings are few protocols which we
have studied and summarized in Table 1.
4.1 Protocol with Reliability Guarantee
Wan et al. proposed PSFQ (Pump Slowly Fetch Quickly)
[3]protocol . It provides reliable communication in downstream
direction (i.e. from sink to sensor nodes). It is designed to be
scalable and energy efficient. It uses multiple local timers and
minimizes the number of signaling messages. It transmit data
from sink to sensors at comparatively slow-speed, and allow
nodes experiencing data loss to recover any missing segments
from immediate neighbors very aggressively. It operates in
three steps: Pump operation, Fetch operation, and Report
operation. It makes use of NACK for data recovery. Sensors
will send data delivery status information to sink using a simple
and scalable hop-by-hop report mechanism.
F. Stann et. al. proposed RMST [4](Reliable Multi-segment
Transport Protocol) which provides reliability for upstream
direction. RMST implements a cross layer between network
layer and MAC layer to provide guaranteed hop-by-hop
reliability. It is also designed to run above Directed diffusion
(to use its discovered path from sensors to sink) in order to
provide guaranteed reliability from sensors to sink (delivery
and fragmentation/reassembly) for applications.
4.2 Protocol with Congestion Control
Wan et. al proposed CODA[5] (Congestion Detection and
Avoidance) protocol. In this protocol they have introduced
three schemes as congestion detection, open loop hop-by-hop
backpressure and end-to-end multi-source regulation. It
improves energy efficiency by controlling congestion. It uses
parameters like current buffer occupancy and wireless channel
load to detect congestion. Node detecting congestion will notify
its upstream nodes to decrease rate accordingly those nodes
will trigger to decrease output rate like AIMD. In this way this
protocol can regulate multi-source rate using closed-loop end-
to-end approach. When a sensor rate value reaches beyond
theoretical throughput, it will set regulation bit in event packet.
If the event packet received by sink has “regulation” bit, sink
should send ACK control message to sensors to inform them to
decrease their rate. If congestion is cleared, sink will actively
send ACK control message to sensors to inform them to
increase their rate.
Wang at el. proposed SenTCP[6] an open-loop hop-by-hop
congestion control protocol for upstream traffic with two
special features. This protocol uses packet arrival time and
packet inter-arrival time to calculate the congestion degree in
every intermediate sensor node. For congestion regulation it
uses hop-by-hop feedback control. This process also reduces
packet dropping, which in turn save energy and increases the
throughput. Neighboring sensor nodes will adjust their sending
rate in response to the feedback signal, carrying information
like local congestion degree and the buffer occupancy ratio.
Wang et. al. have proposed PCCP [7] (Priority-based
Congestion Control Protocol) provides congestion control in
upward direction. Ratio of mean packet arrival time to the mean
packet service time is used to calculate a congestion degree. It
uses implicit congestion notification by piggybacking the
congestion information in the header of data packets. This will
avoid additional control packets. PCCP uses priority-based rate
adjustment (PRA), a hop-by-hop rate adjustment scheme. It
provides three priorities which are source traffic priority, transit
traffic priority and global priority based on node priority index.
4.3 Protocol with both Reliability &Congestion
Control Guarantee
Currently, there are many protocols that provides both
reliability and congestion control. But each protocol still has
some drawbacks. Further we will categorize these protocols
based on congestion detection technique.
4.3.1 Congestion Control with Queue Occupancy
Detection Technique
Akan et al. proposed ESRT [8] an Event to Sink Reliable
Transport Protocol for End to End reliability. This protocol
achieves reliable event detection in WSN with minimum
energy expenditure. For reliable detection of an event and
congestion avoidance sink will control the transmission rate of
each source. It provides reliability for applications. by
controlling sensor report frequency ESRT improves energy
efficiency.
Sundaresanat.el. had proposed ATP[9](Ad-hoc Transport
protocol), it decouples congestion control and uses feedback
from intermediate forwarding nodes to judge precise estimate
of the network state. ATP is designed on the basis of receiver
based and network-assisted end-to-end feedback control
algorithm. The transmission delay (D) is calculated by the
intermediate network nodes. The value of delay is calculated
over the entire packet traversing the node and used to update
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 84
the value piggybacked in every outgoing packet, if the current
calculated value of D is higher than the older value. After that
receiver calculates the required end-to-end rate (Inverse of D)
and sends it back to the sender. Finally, the sender can adjust
the sending rate according to the value received from the
receiver. To achieve reliability, ATP uses a selective ACK that
allows the receiver to state number of packets it has received
and the remaining number of packets to be received in the
future. To accomplish congestion control, the intermediate
nodes in the network provide congestion information in terms
of the available rate to the sink node.
Yogesh et al. proposed STCP [10] Sensor Transmission
Control Protocol is a generic, scalable and reliable transport
layer protocol in which base station is responsible for all major
functionalities STCP controls variable reliability, congestion
detection and avoidance, and supports multiple flows in the
network. Congestion information is carried by data packets.
Base station will store all the information from received session
initiation packet. Accordingly initiate the timers and other
parameters for each flow, and provide acknowledgment of this
packet. . STCP supports two types of data flow traffics:
continuous for which reliability is measured as the fraction of
packets successfully received and event-driven flows where the
base station calculates reliability as a ratio of packets received
to the highest sequence numbered packet received. Every
sensor node maintains two thresholds in its buffer and on the
basis of buffer value node will set the congestion notification
bit in every packet it forwards. On receiving this packet, the
base station informs the source of the congested path by setting
the congestion bit in the acknowledgment packet. Accordingly
the source will either route successive packets along a different
path or slow down the transmission rate.
Kim et al. proposed Flush [11] a reliable transport protocol for
Radio network designed for transferring bulk data across a
multi-hop path from a source to a sink. Flush uses a sink-
initiated control protocol to coordinate transfers, with E2E
selective NACK and retransmissions to provide reliability.
Flush moves through four phases: topology query, data transfer,
acknowledgment, and integrity check. The sink uses an
estimate of the Round Trip Time (RTT) to decide when to send
a request for packet loss. On long paths, flush pipelines packets
over multiple hops. To minimize the transfer time, Flush
proposed a distributed rate control algorithm, which
dynamically estimates the sending rate that maximizes the
pipeline utilization. The sink also needs to keep track of
packets it received. In the acknowledgment phase, the sink
sends the sequence numbers of the lost packets back to the data
source. Flush is designed for bulk data transfer. This protocols
aim to achieve 100 % reliability and high throughput.
Alam and Hong have designed CRRT [12] protocol
(Congestion-Aware and Rate-Controlled Reliable Transport) as
hop-by-hop and end-to-end upstream reliable and congestion
control transport layer protocol for wireless sensor networks.
CRRT provides an efficient MAC layer retransmission method
to increase the hop-by-hop reliability. CRRT is based on
reservation-based retransmission mechanism, in which the
sender reserves the medium to retransmit a packet to the
receiver. In CRRT, packet is only retransmitted when the
packet is dropped due to collision or wireless link error and if
the sender does not receive the ACK. CRRT requires end-to-
end acknowledgment of the sent packets in order to provide
100% reliability and in-order delivery of packets. This can be
achieved by using either the positive Acknowledgment (ACK)
or the Negative Acknowledgment (NACK). In CRRT, packet
loss is detected by observing the sequence number of the
received packets. It uses congestion Sensor Networks
avoidance technique to avoid unnecessary packet dropping and
thus tries to detect the incipient congestion. The level of
congestion is measured by using both buffer occupancy and the
forwarding rate of the node. Sink node is responsible for
controlling the congestion and the rate of every source node
based on the Congestion Notification (CN) of the intermediate
nodes.
Giancoliet. al. proposed CTCP [13] (Collaborative Transport
Control Protocol). It is designed as upstream end to- end
reliability and congestion control transport layer protocol for
wireless sensor network. The performance of CTCP is
evaluated by using Fraction of packets successfully received
and Energy Consumption. The different features of CTCP are:
(1) reliable delivery of all packets to base station, even in the
case of nodes failures and frequent disconnections. (2) To
accomplish energy efficiency, it defines two reliability profiles.
(3) It is capable to distinguish congestion loss from
transmission error loss. (4) It controls congestion through the
interruption of packets forwards, if their buffer is up the
threshold.
4.3.2 Congestion Control with Decentralized
Parameters
Previous researchers mainly utilize queue occupancy to predict
the congestion in a single sensor node. Few researches point
out that the queue length alone is not enough to reflect the
congestion level in the sensor node accurately, as the essential
damage of congestion is the packet drop caused by queue
overflows so they have proposed few scheme, in which
congestion is detected by not only the queue length but also the
queue length change rate or some other decentralized
parameters.
Zhou et al. proposed PORT [14] a Price-Oriented Reliable
Transport protocol. PORT employs node price to measure the
congestion. Node price is defined as the total number of
transmissions attempts across the network from a source to a
sink for achieving successful packet delivery. To ensure the
fidelity of the collected events, PORT estimates the optimal
reporting rate for each source. To improve the data reliability
from a sensor source to a sink, each node in the network
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 85
dynamically allocates its outgoing traffic based on the
neighboring nodes’ feedback of their node prices and the link
loss rates between the neighbors. This approach can alleviate
network congestion. PORT also employs a source reporting
rate control mechanism which controls the source reporting
rates based on the node prices of the source. The in-network
congestion-avoidance mechanism and the E2E reporting-rate
adjustment mechanism can provide fidelity of interested events
while minimizing energy consumption.
Tezcan and Wang proposed ART [15] (Asymmetric and
Reliable Transport) which is designed as upstream end to- end
event reliability, upstream congestion control and downstream
end-to-end query reliability. ART consist of three main
operations, reliable query transfer, reliable event transfer and
distributed congestion control. ART classify nodes as essential
node (E-nodes) which is a subset of sensor nodes and
nonessential node (N-nodes) .in congestion less network , both
E-node and N-node will transmit message to the sink. For
upstream and downstream reliability, ART uses both ACK and
NACK mechanisms.
Paek and Govindan proposed RCRT [16] (Rate-Controlled
Reliable Transport). It is designed as multipoint to- point
reliable transport layer protocol. It provides end to-end explicit
loss recovery and places all the congestion detection, rate
adaptation and rate allocation functionality in the sinks. The
different goals of RCRT protocol are: (1) reliable end-to-end
transmission of all data transmitted by each sensor to a sink. (2)
to sustain network efficiency by avoiding congestion collapse.
In congestion collapse, sources are sending data faster than the
network can transport them to the base station. (3) Provides
flexibility to choose capacity allocation policies by different
applications. (4) be robust to routing dynamics and to nodes
entering and leaving the system.
Zhou et. al. have proposed RTMC[17] (Reliable Transport with
Memory Consideration). It is inspired from pipe-flow method.
RTMC provides hop-by-hop retransmission of data packets to
make sure all of the packets can be received by the sink with
100% reliability. In wireless sensor networks, the technique of
rate adjustment is not suitable to adapt the rapid change of the
traffic. Wireless sensor networks with lossy links and rapid
changing traffic, results in loss of the control messages. This
protocol includes memory information in the header of the
packets and exchange information between the neighbors and
in this way it allows preventing memory overflow. It also
results in maximization of throughput and reduces the transport
time. It is much more energy-effective, and has less memory
cost and less transport time.
4.4 Protocol with Congestion Elimination Mechanism
The urgent information produced in event driven applications
has some special characteristics compared with the traditional
periodic collecting scenarios.
1. When an emergency happens, a large amount of traffic
are injected into the network simultaneously and in a
very short time
2. In emergent situations, it is urgent to get the information
about the event as quickly as possible
There are various types of traffic with different priorities,
which should be handled with different qualities of service.
Various protocols are designed for communication in WSN.
But, it is observed that very few of them describe the assured
transmission of urgent data. The methods which are developed
till dates are application specific. Most of them detect
congestion in a sensor node by a metric such as the queue
length or the ratio between packet service time and packet
arrival time. They also assume that the congestion occurs just
on the moment which is inconsistent with the real environment.
Meanwhile, all of their rate adjustment schemes do not take the
urgent information’s reliable transmission into consideration.
There are few protocols which try to eliminate congestion and
provide reliable transmission of urgent data. Few of them are
summarized in table 2.
Lulu Liang et al. proposed (RETP-UI)[18]a reliable
transmission protocol for urgent information in wireless sensor
networks. This protocol classifies the traffic into three classes
and correspondingly maintains three kinds of priority queues in
each sensor node. To predict the congestion more accurately, it
detects congestion by combining the queue length and its
fluctuation together. Furthermore, state machine is also
introduced in evaluating the congestion level to alleviate
congestion; they have design a multistage rate adjustment
scheme. Finally, conduct the detail simulations by comparing
the performance of RETPUI with PCCP. The simulation results
show that proposed RETP-UI can provide a reliable
transmission service for urgent information with lower packet
loss probability, shorter delay, and higher throughput.
Tetsuya Kawai et al. had proposed a [19]fast and reliable
transmission mechanism for urgent information in sensor
networks. An emergency packet first establishes an assured
corridor from the origin node to the BS. In the corridor, all
nodes keep awake for fast transmission of emergency packets.
Along the corridor, all nodes refrain from the emission of
normal packets to avoid disturbing transmission of emergency
packets in the corridor. The other nodes stay in normal
operation. They also introduced a retransmission scheme to
achieve reliable transmission of the first emergency packets.
Their experiments showed that the corridor was quickly
established and then emergency packets are transmitted to the
BS with a high reliability of more than 90 % delivery ratio and
a low latency of less than 90 ms. In this protocol congestion has
been eliminated by suppressing normal data transmission and
establishing assured path for emergency data.
6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 86
Manikanden Balakrishnan et al. have introduced Channel
Preemptive EDCA[20] (CP-EDCA) scheme, an in-channel
emergency preemption methodology for the EDCA framework.
In CP-EDCA, the emergency traffic preempted the services of
other routine traffic in the network for achieving deterministic
MAC delay bounds. The simulation results of emergency
frames depicted up to 50% uniform decrease in MAC delays
and insensitivity to routine traffic competition, even under
network overloads. CP-EDCA will retain all the advantages of
random MAC, while still guaranteeing deterministic QoS
bounds for sporadic emergencies. The initial work aimed at
validating the CP-EDCA method and the importance of
preemptions to expand the applicability of 802.11e standards to
distributed emergency reporting.
Rachid Haji et. al. have proposed a framework for [21]Adaptive
Management of QoS in different situations (Ad-M-QoS-DS)
that guarantees a level of QoS using the following parameters.
The situation, the degree of importance of information and QoS
parameters Under normal circumstances, the Framework
focuses on the efficiency of energy consumption. Upon
detection of an event of emergency, the proposed framework
adapts its behavior to minimize delay and ensure reliability.
And if that requires the intervention of operators, the
framework ensures mobility management, collaboration, and
security. Upon detection of an event, sensors transmit the
information on multi-hop to the base station which is
responsible for transmitting them to the Coordination
Committee. The latter analyzes the information received. If the
event is safe, the data will be stored in a database and if the
event presents a danger the Committee takes appropriate
decisions and informs the operators on the appropriate actions.
Authors have proposed different modules of Framework that
are necessary for the proper management of rescue operations
and cooperation during a disaster. 1) Message Classification
and Prioritization Module 2) Aggregation Management
Module3) Adaptive Energy Management Module4)Adaptive
Load Management Module5) Mobility Management
Module6)Routing Security Module 7)MAC Filter Module 8)
Two security modules need to be taken into account Routing
Security module and MAC Filter module.
S. Sharma and D. Kumar [22] presents a Framework for
adaptive routing protocol. It makes use of priority for data
routing. According to data priority the framework describes
two paths for transmission. It discovers and maintains the
shortest path by using their routing protocol which is an
enhanced version of Ad hoc On-Demand Distance Vector
Routing (AODV). This will also improve transmission delay.
For improving energy efficiency they have used an ant-based
protocol. The WSN present much essential liabilities that
increases the security risk. Deny Of service attack will reduce
energy efficiency for which WNS requires efficient and
effective security mechanism.
Koichi Ishibashiet. al. proposed [23] a forwarding method for
urgent messages on the ubiquitous wireless sensor network.
The proposed method provides a reliable forwarding method
for urgent messages, even if packet loss on the wireless links
exists. Evaluated the effect of traffic and message's loss rate for
an urgent message by computer simulation and confirmed that
the proposed method achieves the lower message's loss rate
than the existing routing protocol in the region where the
packet loss probability on the wireless links are higher. The
urgent messages are sent from a monitoring node, appreciating
the detected event as emergency situation, to a specific node
such as the network management node. To meet specified
requirements, they have invented a new design scheme of the
ad hoc routing protocol to overcome poor quality of error-prone
wireless channel, in order to support the reliable forwarding
method for the urgent messages on the UWSN.
A D Karanjawaneet. al [24] proposed the path assured data
transfer protocol(PAT) which operates in three stages. In the
first stage the ED node desiring to transfer urgent information
initiates blocking operation for rest of the devices to assure
clear path for urgent data packets. In the second stage, the
urgent data packets are transferred with software
acknowledgment from the receiver towards the destination
master node. When all the packets are transferred, the master
initiates release message for the network. The assured path
guarantees collision less data transfer towards the destination
devices and avoid delays due to retry transmissions. The PAT
is designed for reliable transfer of single as well blocks of
urgent packets. The PAT protocol improves the data transfer
reliability over normal data transfer protocols by 20-40%.
5. COMPARATIVE ANALYSIS
This section presents comparative analysis of the above cited
transport protocols based on reliability, congestion control and
energy efficiency. Table 5.1resents the comparison based on
congestion detection technique and reliability support.
Reliability is the main function at transport layer which ensure
the proper delivery information from source to destination or
sink node. There are difference reliability mechanisms for
different proposed protocols because most of the protocols
were designed to solve problem based on the application.
Protocols like ATP, STCP, ART, Flush, RCRT, CTCP, CRRT,
offer end-to-end error recovery in which only the final
destination node is responsible for detecting loss and requesting
for retransmission. This approach will cause large delay and
low throughput. Other protocols like RTMC, CRRT, PSFQ,
RMST offer hop-by-hop error recovery which is widely
accepted recovery mechanism in sensor networks. In this
method intermediate nodes, rather than just the final node,
perform loss detection and recovery. Pair of neighboring nodes
is responsible for loss detection and can enable local
retransmission that is more energy efficient. The biggest
advantages is that recovery from packet loss can occur quickly,
and progress made in early hops is not lost if a failure occurs in
later hop.
7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 87
Among these RMST and PSFQ do not provide any congestion
control scheme. PSFQ can’t detect the loss of single packet
since it used only NACK not ACK. It uses statically and slowly
pump that result in large delay. Besides that, most of the
protocols used negative acknowledgement (NACK) and time
out for loss detection and notification stage and used packet
retransmission for loss recovery stage. Each proposed method
has advantages and disadvantage that appropriate with the
application itself.
Protocols like CODA, PCCP and SenTCP do not provide any
reliability mechanism and have only congestion control
mechanism. In PCCP, the priority is defined from a node
viewpoint instead of the traffic flow viewpoint. Thus, the traffic
flows from a node cannot be differentiated.
Congestion detection refers to identification of possible events,
which may build-up congestion in the network. Combinations
of parameters like queue occupancy, packet rate, node price,
link-loss rates, node delay, link interference, ACK received to
core nodes, time to recover loss, transmission error loss, and
memory overflow are used by different protocols to detect
congestion.
Now we discuss how different protocols use these parameters
to detect congestion. STCP, ATP, Flush and ESRT solely
detect the congestion when the buffer usage is higher than the
predefined threshold, whereas CRRT and SenTCP use packet
rate addition to the buffer occupancy. CTCP uses both
transmission error loss rates and the buffer usage. CODA uses
channel status with QO. In CODA the delay or response time of
closed-loop multi-source regulation will be increased under
heavy congestion since the ACK issued from sink would loss
with high probability at this time. ESRT have the drawbacks,
such as this protocol may not applicable to many of the WSN
application because ESRT assume that the base station is one-
hop away from all sensor nodes. STCP and ESRT are not as
energy efficient as HBH loss recovery schemes since the rate
decision is controlled centrally. ESRT also has some
performance problem i.e. it assumes that all the sensor nodes
within the WSN have a clock synchronization. Flush is not
designed for data streaming applications in which energy
efficiency is highly concern but not throughput. ART have the
disadvantages where any packet loss due to congestion at non-
essential nodes will unnoticed and their recovery is not
guaranteed because congestion control and the two-way
reliability is maintained by only E-node. Rest of the protocols
detects the congestion based on feedback parameters of the
reliability module.
Table-1: Transport protocols for congestion control and reliability.
Protocol Name Congestion Detection Congestion Avoidance Reliability level Type Reliability Confirmation
PSFQ - - Packet H-B-H NACK
RMST - - Packet H-B-H NACK
CODA QO ,Chan. Status RateAdjs. - - -
Sen TCP QO , Packet rate Rate Adjs. - - -
PCCP Metric ratio Rate adjs. - - -
ESRT QO Rate Adjs. Event E-to-E -
ATP QO Rate Adjs. Packet E-to-E SACK
STCP QO Rate Adjs. Packet E-to-E NACK
Flush QO Rate Adjs. Packet E-to-E NACK
CRRT QO, pkt. Rate Rate Adjs. Packet
E-to-E
H-B-H
NACK,Ack
CTCP QO, Trans error loss Rate Adjs. Packet E-to-E eAck
PORT Node price Rate Adjs. Event E-to-E -
ART Ack to core node
Reduce Traffic of
Noncore node
Packet E-to-E NACK
RCRT Time to recover loss RateAdjs. Packet E-to-E NACK Cumm. Ack
RTMC Memory overflow HeaderMemoryInfo Packet H-B-H -
The congestion warning is notified to other nodes explicitly or
implicitly. Transport protocols are designed with three different
congestion avoidance techniques, with two common
techniques; rate adjustment and traffic redirection and one
rarely used mechanism; polite gossip policy. From existing
protocols, most of them follow centralized rate adjustment
scheme, whereas STCP, Flush, ART and RTMC use
decentralized scheme. Exact rate adjustment is a popular
method because the node simply schedules the sending of its
packet using specific timings in order to fulfill that calculated
rate in order to implement accurate rate adjustment.
8. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 88
Energy conservation can be divided into three categories, which
are good, fair and no energy efficient. Most of the existing
transport protocol do not concern about the energy efficient.
The energy conservation for protocols that provide both
reliability and congestion control mechanism is low compared
with the protocols that provide only reliability or congestion
control. Energy efficient need to be emphasized in future
transport protocol for WSN. This is due to sensor nodes have a
limited operating system lifetime. Thus, mechanism for energy
efficient is very crucial in WSN.
Reliable routing is more difficult to achieve in wireless
networks than in wired networks, because the wireless
bandwidth is shared among no. of nodes and the network
topology changes unpredictably as the node move. Also to
achieve Quality of services in wireless sensor networks,
limitation in power, computational capacities, and memory
space should be taken into consideration. This requires
extensive collaboration between the nodes, both to establish the
route and to guarantee the resources necessary to provide the
reliability.
Wireless Sensor Network would carry both urgent and non-
urgent information, which apparently should not be handled
equally. Previous protocols basically aim at providing a best-
effort packet delivery, so that all messages including urgent
messages are processed equally. Therefore, when the network
is congested, packets with high priority experiences large delay,
and possibly could be discarded. It means that a WSN must be
capable of differentiating and prioritizing packets depending on
their urgency and importance.
Table-2: Congestion elimination in urgent protocol.
Protocol Name Congestion Detection Congestion Avoidance
Reliability
level
Type
Reliability
Confirmation
RETPUI QO and Fluctuation Multistage Rate Adjs. Event H-B-H ACK
FARTM
Urgent data
Occurrence
Establishing assured path by
suspension of normal data
transmission
Event H-B-H ACK
CP-EDCA Emergency detection Normal data preemption Event H-B-H ACK
ADMQOS Event detection Priority wise categorization Event H-B-H ACK
OD-AODV Event classification
Priority wise shortest path
transmission
Event H-B-H ACK
FMUMUWSN Event classification Multipath transmission Event H-B-H ACK
PAT Urgent event Blocking of normal data Event H-B-H ACK
There is need to design such a protocol which assure about the
reliable and fast transmission of urgent data.
For congestion control, a proper rate adjustment schemes
should be implemented to mitigate congestion. Many
mechanisms have been proposed in recent years. However,
most of the proposed rate adjustment mechanisms decrease the
source rate at the cost of event reliability. PAT protocol implies
simple mechanism to provide assured path for urgent data
transmission. When WSN is used for urgent message
transmission, its important purpose is to inform its user about
the urgency reliably and timely without loss of fidelity.
CONCLUSIONS
In this paper, we have presented a comparative analysis of the
various existing protocol providing reliable & congestion free
transmission and also protocols provided for urgent data
transmission. In this work first we elaborate problems of using
existing protocols for urgent data transmission. We have
discussed requirement and design issues of transport layer
protocol. We briefly review several existing reliable and
congestion control protocols for wireless sensor networks, and
list out several problems of the existing protocols. This survey
directed us to explore transport layer issues in urgent data
transmission.
Although a number of research works on transport layer has
been done so far, many of them assume that all of the
information transmitted in a WSN is of the same type, which
means the network handles all packets equally. Some
researchers have provided the reliable and congestion free
transmission considering urgent data transmission over WSN
by using different mechanisms and modules. However, they
involve some complicated communication and calculation and
this could be a burden for a resource-constrained sensor node.
Our aim is to provide simple mechanism where the
transmission of urgent information to controlling device is
guaranteed with high reliability and low transmission delay.
9. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 02 Issue: 11 | Nov-2013, Available @ http://www.ijret.org 89
REFERENCES
[1] I. Khemapech, et al., "A survey of wireless sensor
networks technology," in 6th Annual Postgraduate
Symposium on the Convergence of
Telecommunications, Networking and Broadcasting,
2005.
[2] K. S. Chonggang Wang1, Bo Li, and Weiwen Tang,
"Issues of Transport Control Protocols for Wireless
Sensor Networks," University of Arkansas, Fayetteville,
AR, USA,.
[3] C.-Y. Wan, et al., "PSFQ: a reliable transport protocol
for wireless sensor networks," in Proceedings of the 1st
ACM international workshop on Wireless sensor
networks and applications, 2002, pp. 1-11.
[4] F. Stann and J. Heidemann, "RMST: reliable data
transport in sensor networks," in Sensor Network
Protocols and Applications, 2003. Proceedings of the
First IEEE. 2003 IEEE International Workshop on,
2003, pp. 102-112.
[5] S. B. E. a. A. T. C. C.-Y. Wan, "CODA: Congestion
detection and avoidance in sensor networks," in
Proceedings of ACM Sensys’03, November 5-7, 2003
2003.
[6] K. S. C. Wang, and B. Li, "SenTCP: A hop-by-hop
congestion control protocol for wireless sensor
networks," in Proceedings of IEEE INFOCOM 2005
(Poster Paper), Mar. 2005.
[7] K. S. C. Wang, V. Lawrence, B. Li, and Y. Hu,
"Priority-based congestion control in wireless sensor
networks," in in Proc. IEEE International Conference on
Sensor Networks,Ubiquitous, and Trustworthy
Computing (SUTC’06), pp. 22–31.
[8] O. B. A. Y. Sankarasubramaniam, and I. F. Akyidiz,
"ESRT: Event-to-sink reliable transport in wireless
sensor networks," in Proceedings of ACM Mobihoc’03,
June 1-3, 2003.
[9] V. A. K. Sundaresan, H. Y. Hseeh, and R. Sivakumar,
"ATP: a reliable transport protocol for ad-hoc networks,"
in in Proceedings of the ACM Symposium on Mobile Ad
Hoc Networking and Computing (MobiHoc ’03), pp.
64–75.
[10] Y. G. Iyer, et al., "STCP: a generic transport layer
protocol for wireless sensor networks," in Computer
Communications and Networks, 2005. ICCCN 2005.
Proceedings. 14th International Conference on, 2005, pp.
449-454.
[11] S. Kim, et al., "Flush: a reliable bulk transport protocol
for multihop wireless networks," in Proceedings of the
5th international conference on Embedded networked
sensor systems, Sydney, Australia, 2007, pp. 351-365.
[12] M. M. A. a. C. S. Hong, "CRRT: congestion-aware and
rate-controlled reliable transport in wireless sensor
networks," in IEICE Transactions on Communications,
pp. 184–199.
[13] F. J. E. Giancoli, and A. Pedroza, "CTCP: reliable
transport control protocol for Sensor networks," in
Proceedings of the International Conference on
Intelligent Sensors, Sensor Networks and Information
Processing (ISSNIP ’08), pp. 493– 498, December 2008.
[14] Y. Z. a. M. R. Lyu, "PORT: a price-oriented reliable
transport protocol for wireless sensor network," in
Proceedings of 16th IEEE International Symposium on
Software Reliability Engineering, pp. 117–126, 2005.
[15] N. T. a. W. Wang, "ART: an asymmetric and reliable
transport mechanism for wireless sensor networks,"
International Journal of Sensor Networks, vol. vol. 2, pp.
188–200, 2007.
[16] J. P. a. R. Govindan, "RCRT: rate-controlled reliable
transport for wireless sensor networks," in Proceedings
of the 5th International Conference on Embedded
Networked Sensor Systems, pp. 305–319, 2007.
[17] X. G. H. Zhou, and C.Wu, "Reliable transport with
memory consideration in wireless sensor networks," in
Proceedings of the IEEE International Conference on
Communications (ICC ’08), pp. 2819–2824, May 2008.
[18] L. Lulu, et al., "A Novel Reliable Transmission Protocol
for Urgent Information in Wireless Sensor Networks," in
Global Telecommunications Conference (GLOBECOM
2010), 2010 IEEE, 2010, pp. 1-6.
[19] T. Kawai, et al., "A fast and reliable transmission
mechanism of urgent information in sensor networks,"
Proceedings of the 3rd International Conference on
Networked Sensing Systems (INSS 2006), 2006.
[20] M. Balakrishnan, et al., "Service preemptions for
guaranteed emergency medium access in Wireless
Sensor Networks," in Military Communications
Conference, 2008. MILCOM 2008. IEEE, 2008, pp. 1-7.
[21] R. Haji, et al., "Towards an adaptive QoS-oriented and
secure framework for wireless sensor networks in
emergency situations," in Multimedia Computing and
Systems (ICMCS), 2012 International Conference on,
2012, pp. 1007-1011.
[22] S. S. a. D. Kumar, "An approach to optimize adaptive
Routing Framework to provide QOS in Wireless Sensor
Networks," in proceeding of International Journal of
wireless Networks and Communication, vol. 1(1), pp.
55-692009.
[23] K. Ishibashi and M. Yano, "A Proposal of Forwarding
Method for Urgent Messages on an Ubiquitous Wireless
Sensor Network," in Information and
Telecommunication Technologies, 2005. APSITT 2005
Proceedings. 6th Asia-Pacific Symposium on, 2005, pp.
293-298.
[24] A. W. R. A D Karanjawane, S D Mali, A A Agarkar,
"Designing Path Assured Data Transfer Protocol for
Wireless Sensor Network," In proceeding of
International Journal of Engineering Research and
Technology(IJERT), vol. 2, pp. 1151-1160, 2013.