SlideShare a Scribd company logo
PRIORITIZED CONGESTIONFOR
DETECTION AND AVOIDANCE BY
TADR ALGORITHM TO ALEMORITE
THROUGHPUT IN WIRELESS SENSOR
NETWORKS
Ram Kumar C
Assistant Professor
INTRODUCTION TO WSN
• Wireless Sensor Network (WSN) is an emerging technology
consisting of spatially scattered independent devices.
• WSN is a self- organize network with a large number of
small sensors nodes
• Sensor nodes are equipped with self-supported battery
power.
• It is used and organized to sense, observe and recognize the
physical entity
WSN MODEL
 Major components of WSN model are sensor field, sensor
node, sink node or base station and Internet.
 Sensor nodes are made up of four basic components - a
sensor, a processor, a radio transceiver and a power Supply.
OBJECTIVES
• To design, share resource allocation and channel bandwidth
• To calculate buffer length and rate control packets
• To avoid unnecessary traffic at input and output side
• To detect and avoid congestion in the network
• To Improve parameters like Throughput, Energy efficiency, Packet
Drop, Delay, Packet Delivery Ratio using various protocols
CONGESTION IN WSN
• Congestion occurs due to more sensors, packet drop, receiving more
packets than transmitting and buffer queue size.
• A congestion control technique relates the detection, notification and
avoidance at either node or link.
• Congestion takes place when several nodes can transmit packets to a single
channel.
• Traffic and Congestion are the main issues in designing the network.
CONGESTION CONTROL PROTOCOLS
• Stream Control Transmission Protocol (SCTP)
• Datagram Congestion Control Protocol (DCCP)
• Congestion Detection and Avoidance (CODA)
• Destination Sequenced Distance Vector (DSDV)
• Ad-hoc On demand Distance Vector (AODV)
• Prioritized Congestion Control Protocol (PCCP)
• Hop by hop Congestion Control Protocol (HCCP)
LITERATURE REVIEW
1. CONGESTION DETECTION AND AVOIDANCE (CODA)
(Wan, C-Y, Eisenman, SB & Campbell - ACM Transactions on Sensor Networks – 2011)
•CODA has accurate and efficient congestion over the wireless sensor
networks.
•The congestion should prefer the previous and the past channel for
transmission.
PROBLEM IDENTIFIED:
Buffer overflow and link failure is not identified in this research
work leads to failure of the network
LITERATURE REVIEW- Contd
2. QOS ADAPTIVE CONGESTION CONTROL
(K.Sindhuja & Reddy – IJIRT – 2015)
•QoS which provides better networking services over various
technologies and also provides guarantee for the delivery of packets.
•Some of the routing protocols are SAR, PCCP and SPEED.
PROBLEM IDENTIFIED:
Node deployment and resource allocation is not allocated based on
the priority to the nodes in the network
LITERATURE REVIEW- Contd
3. TADR TO ALLEVIATE CONGESTION
(Naik, G, Kulkarn, H, Gaikwad, P & Yadav , T - Int.J. Computer Technology &
Applications – 2014) (Das, SK & Lin, C - IEEE Transactions on Systems – 2011)
•(TADR) algorithm which is proposed to route packets around the
congestion areas and scatter the excessive packets along multiple paths
consisting of idle and under loaded nodes.
•TADR is designed for congestion control techniques to improve the
throughput of the network. It can be increased by sending excess
packets through multiple paths in the congestion area.
PROBLEM IDENTIFIED:
In multipath scheme, more number of packets are kept in idle state
leads to energy waste
CONGESTION CONTROL TECHNIQUES
• Congestion takes place when several nodes can transmit packets to a
single channel.
• When nodes get closer to the sink, the traffic increases, leading to
congestion.
• Congestion control scheme which is necessary to improve the
Quality of Service (QoS) and System life time.
CONGESTION DETECTION
Some of the methods for congestion detection are packet loss, queue
length, channel load and transmission delay.
CONGESTION NOTIFICATION
• Explicit Congestion Notification (ECN) allows end to end
notification from sender to receiver
• The goal is to reduce packet loss and delay by decreasing the
transmission rate without dropping packets.
CONGESTION AVOIDANCE
• When the Queue occupancy is less than the congestion threshold,
congestion is avoided in the buffer state.
• Congestion can be avoided by TCP over RTT technique in which the
congestion takes place in the slow start region.
• Congestion is mainly related to the window size of the network.
• If the window size exceeds the threshold value then congestion will
be avoided.
BLOCK DIAGRAM
SIMULATION, RESULTS & DISCUSSIONS
The existing method with link failure has 53,272 successful
packets transmitted and 38,342 packets received in the sink,
whereas proposed method has 64,882 packets transmitted and
50,219 packets received at the receiver end.
CONCULSION
• This new technique TADR with geographical features
will improve the QoS and system performance.
• A TADR algorithm in MAC layer is implemented to
segment the packets
• With the new technique, the packet loss has been
minimized and throughput has been increased.
FUTURE SCOPE
• It can be implemented on cognitive radio networks
and wireless multimedia sensor networks for
commercial and industrial purposes.
• This research work can be extended in future using
mobile sensor nodes with security measures to
improve the performance of WSN.
REFERENCES
• Ahmad, MZ &Turgut, D 2008, 'Congestion Avoidance and Fairness in Wireless Sensor
Networks', IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications
Conference.
• Akyildiz, IF 2003, 'ESRT : Event-to-Sink Reliable Transport in Wireless Sensor',
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking &
computing, pp. 177-188.
• Antoniou, P, Pitsillides, A, Blackwell, T, Engelbrecht, A & Michael, L 2013, 'Congestion
control in wireless sensor networks based on bird flocking behavior', Computer
Networks, vol. 57, no. 5, pp. 1167-1191.
• Arya, A & Singh, J 2014, 'Comparative Study of AODV , DSDV and DSR Routing
Protocols in Wireless Sensor Network Using NS-2 Simulator', International Journal of
Computer Science and Information Technologies, vol. 5, no. 4, pp. 5053-5056.
• Azizi, R 2015, 'Comparative Study of Transport Protocols in WSN', International
Journal of Computer Applications (0975-8887), vol. 113, no. 6, pp. 1-9.
• Balen, J, Zagar, D &Martinovic, G 2011, 'Quality of Service in Wireless Sensor
Networks: A Survey and Related Patents', Recent Patents on Computer Science, vol. 4,
no. 3, pp. 188-202.
REFERENCES – Contd.
• Bhuyan, B 2010, 'Quality of Service (QoS) Provisions in Wireless Sensor Networks
and Related Challenges', Wireless Sensor Network, vol. 02, no. 11, pp. 861-868.
• Cecchetti, G &Ruscelli, AL 2011, 'Improving the Design of Wireless Sensor
Networks Using Qos-Aware Opportunistic Techniques', IADIS International
Conference Applied Computing, pp. 171-178.
• Chawla, H 2014, 'Some issues and challenges of Wireless Sensor Networks',
International Journal of Advanced Research in Computer Science and Software
Engineering, vol. 4, no. 7, pp. 236-239.
• Chelli, K 2015, 'Security Issues in Wireless Sensor Networks: Attacks and Counter
measures', Proceedings of the World Congress on Engineering 2015 Vol I WCE
2015, July 1 - 3, 2015, London, U.K.
• Chen, S & Zhang, Z 2006, 'Localized algorithm for aggregate fairness in wireless
sensor networks', Proc. ACM Annual International Conference on Mobile
Computing and Networking, pp. 274-274.
• Chen, S, Fang, Y & Xia, Y 2007, 'Lexicographic maxmin fairness for data
collection in wireless sensor networks', IEEE Transactions on Mobile Computing,
vol. 6, no. 7.
REFERENCES – Contd.
• Dashkova, E &Gurtov, A 2012, 'Survey on Congestion Control Mechanisms for
Wireless Sensor Networks', Internet of Things, Smart Spaces, and Next Generation
Networking. Springer Berlin Heidelberg, no. Cc, pp. 75-85.
• Gowrishankar, S, Basavaraju, TG, Manjaiah, DH &Sarkar, SK 2008, 'Issues in
Wireless Sensor Networks', Proceedings of the World Congress on Engineering,
vol. I, pp. 978-988.
• Gowthaman, P & Chakravarthi, R 2013, 'Survey on Various Congestion Detection
and Control Protocols in Wireless Sensor Networks', International Journal
Advanced Computer Engineering Commun Technol, vol. 11, pp. 15-19.
• Gupta, S &Sinha, P 2014, 'Overview of Wireless Sensor Network: A Survey',
International Journal of Advanced Research in Computer and Communication
Engineering, vol. 3, no. 1, pp. 5201-5207.
• Jadhav, P &Satao, R 2016, 'A Survey on Opportunistic Routing Protocols for
Wireless Sensor Networks', Procedia Computer Science, vol. 79, pp. 603-609.

More Related Content

Similar to Veltech university.pptx

A Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkA Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor Network
IJMER
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
IRJET Journal
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET Journal
 
Priority Based Congestion Avoidance Hybrid Scheme published in IEEE
Priority Based Congestion Avoidance Hybrid Scheme published in IEEE Priority Based Congestion Avoidance Hybrid Scheme published in IEEE
Priority Based Congestion Avoidance Hybrid Scheme published in IEEE
Jasleen Kaur (Chandigarh University)
 
performanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdfperformanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdf
ABYTHOMAS46
 
Performance and traffic management for WSNs
Performance and traffic management for WSNsPerformance and traffic management for WSNs
Performance and traffic management for WSNs
University of Technology - Iraq
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
theijes
 
J031101064069
J031101064069J031101064069
J031101064069theijes
 
Unit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptxUnit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptx
ABYTHOMAS46
 
Study Of Coded Based Mechanism In WSN System
Study Of Coded Based Mechanism In WSN SystemStudy Of Coded Based Mechanism In WSN System
Study Of Coded Based Mechanism In WSN System
IJERA Editor
 
ID727_Helina_MitigationTechnique_uday.pptx
ID727_Helina_MitigationTechnique_uday.pptxID727_Helina_MitigationTechnique_uday.pptx
ID727_Helina_MitigationTechnique_uday.pptx
DrSNAVANEETHAN
 
Sem
SemSem
Reliable and Efficient Routing in WLAN
Reliable and Efficient Routing in WLANReliable and Efficient Routing in WLAN
Reliable and Efficient Routing in WLAN
ijtsrd
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET Journal
 
Mtadf multi hop traffic aware data for warding for congestion control in wir...
Mtadf  multi hop traffic aware data for warding for congestion control in wir...Mtadf  multi hop traffic aware data for warding for congestion control in wir...
Mtadf multi hop traffic aware data for warding for congestion control in wir...
ijwmn
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
Jasleen Kaur (Chandigarh University)
 
B0470208027
B0470208027B0470208027
B0470208027
ijceronline
 
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
Umang Singh
 
Challenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksChallenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networks
Auwal Amshi
 
Research Issues on WSN
Research Issues on WSNResearch Issues on WSN
Research Issues on WSN
Kathirvel Ayyaswamy
 

Similar to Veltech university.pptx (20)

A Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkA Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor Network
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
 
Priority Based Congestion Avoidance Hybrid Scheme published in IEEE
Priority Based Congestion Avoidance Hybrid Scheme published in IEEE Priority Based Congestion Avoidance Hybrid Scheme published in IEEE
Priority Based Congestion Avoidance Hybrid Scheme published in IEEE
 
performanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdfperformanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdf
 
Performance and traffic management for WSNs
Performance and traffic management for WSNsPerformance and traffic management for WSNs
Performance and traffic management for WSNs
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
 
J031101064069
J031101064069J031101064069
J031101064069
 
Unit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptxUnit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptx
 
Study Of Coded Based Mechanism In WSN System
Study Of Coded Based Mechanism In WSN SystemStudy Of Coded Based Mechanism In WSN System
Study Of Coded Based Mechanism In WSN System
 
ID727_Helina_MitigationTechnique_uday.pptx
ID727_Helina_MitigationTechnique_uday.pptxID727_Helina_MitigationTechnique_uday.pptx
ID727_Helina_MitigationTechnique_uday.pptx
 
Sem
SemSem
Sem
 
Reliable and Efficient Routing in WLAN
Reliable and Efficient Routing in WLANReliable and Efficient Routing in WLAN
Reliable and Efficient Routing in WLAN
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
 
Mtadf multi hop traffic aware data for warding for congestion control in wir...
Mtadf  multi hop traffic aware data for warding for congestion control in wir...Mtadf  multi hop traffic aware data for warding for congestion control in wir...
Mtadf multi hop traffic aware data for warding for congestion control in wir...
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
 
B0470208027
B0470208027B0470208027
B0470208027
 
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
Delivered Guest Talk in Faculty Development Programme held on 27th July 2017 ...
 
Challenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksChallenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networks
 
Research Issues on WSN
Research Issues on WSNResearch Issues on WSN
Research Issues on WSN
 

Recently uploaded

H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 

Recently uploaded (20)

H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 

Veltech university.pptx

  • 1. PRIORITIZED CONGESTIONFOR DETECTION AND AVOIDANCE BY TADR ALGORITHM TO ALEMORITE THROUGHPUT IN WIRELESS SENSOR NETWORKS Ram Kumar C Assistant Professor
  • 2. INTRODUCTION TO WSN • Wireless Sensor Network (WSN) is an emerging technology consisting of spatially scattered independent devices. • WSN is a self- organize network with a large number of small sensors nodes • Sensor nodes are equipped with self-supported battery power. • It is used and organized to sense, observe and recognize the physical entity
  • 3. WSN MODEL  Major components of WSN model are sensor field, sensor node, sink node or base station and Internet.  Sensor nodes are made up of four basic components - a sensor, a processor, a radio transceiver and a power Supply.
  • 4. OBJECTIVES • To design, share resource allocation and channel bandwidth • To calculate buffer length and rate control packets • To avoid unnecessary traffic at input and output side • To detect and avoid congestion in the network • To Improve parameters like Throughput, Energy efficiency, Packet Drop, Delay, Packet Delivery Ratio using various protocols
  • 5. CONGESTION IN WSN • Congestion occurs due to more sensors, packet drop, receiving more packets than transmitting and buffer queue size. • A congestion control technique relates the detection, notification and avoidance at either node or link. • Congestion takes place when several nodes can transmit packets to a single channel. • Traffic and Congestion are the main issues in designing the network.
  • 6. CONGESTION CONTROL PROTOCOLS • Stream Control Transmission Protocol (SCTP) • Datagram Congestion Control Protocol (DCCP) • Congestion Detection and Avoidance (CODA) • Destination Sequenced Distance Vector (DSDV) • Ad-hoc On demand Distance Vector (AODV) • Prioritized Congestion Control Protocol (PCCP) • Hop by hop Congestion Control Protocol (HCCP)
  • 7. LITERATURE REVIEW 1. CONGESTION DETECTION AND AVOIDANCE (CODA) (Wan, C-Y, Eisenman, SB & Campbell - ACM Transactions on Sensor Networks – 2011) •CODA has accurate and efficient congestion over the wireless sensor networks. •The congestion should prefer the previous and the past channel for transmission. PROBLEM IDENTIFIED: Buffer overflow and link failure is not identified in this research work leads to failure of the network
  • 8. LITERATURE REVIEW- Contd 2. QOS ADAPTIVE CONGESTION CONTROL (K.Sindhuja & Reddy – IJIRT – 2015) •QoS which provides better networking services over various technologies and also provides guarantee for the delivery of packets. •Some of the routing protocols are SAR, PCCP and SPEED. PROBLEM IDENTIFIED: Node deployment and resource allocation is not allocated based on the priority to the nodes in the network
  • 9. LITERATURE REVIEW- Contd 3. TADR TO ALLEVIATE CONGESTION (Naik, G, Kulkarn, H, Gaikwad, P & Yadav , T - Int.J. Computer Technology & Applications – 2014) (Das, SK & Lin, C - IEEE Transactions on Systems – 2011) •(TADR) algorithm which is proposed to route packets around the congestion areas and scatter the excessive packets along multiple paths consisting of idle and under loaded nodes. •TADR is designed for congestion control techniques to improve the throughput of the network. It can be increased by sending excess packets through multiple paths in the congestion area. PROBLEM IDENTIFIED: In multipath scheme, more number of packets are kept in idle state leads to energy waste
  • 10. CONGESTION CONTROL TECHNIQUES • Congestion takes place when several nodes can transmit packets to a single channel. • When nodes get closer to the sink, the traffic increases, leading to congestion. • Congestion control scheme which is necessary to improve the Quality of Service (QoS) and System life time.
  • 11. CONGESTION DETECTION Some of the methods for congestion detection are packet loss, queue length, channel load and transmission delay.
  • 12. CONGESTION NOTIFICATION • Explicit Congestion Notification (ECN) allows end to end notification from sender to receiver • The goal is to reduce packet loss and delay by decreasing the transmission rate without dropping packets.
  • 13. CONGESTION AVOIDANCE • When the Queue occupancy is less than the congestion threshold, congestion is avoided in the buffer state. • Congestion can be avoided by TCP over RTT technique in which the congestion takes place in the slow start region. • Congestion is mainly related to the window size of the network. • If the window size exceeds the threshold value then congestion will be avoided.
  • 15. SIMULATION, RESULTS & DISCUSSIONS The existing method with link failure has 53,272 successful packets transmitted and 38,342 packets received in the sink, whereas proposed method has 64,882 packets transmitted and 50,219 packets received at the receiver end.
  • 16. CONCULSION • This new technique TADR with geographical features will improve the QoS and system performance. • A TADR algorithm in MAC layer is implemented to segment the packets • With the new technique, the packet loss has been minimized and throughput has been increased.
  • 17. FUTURE SCOPE • It can be implemented on cognitive radio networks and wireless multimedia sensor networks for commercial and industrial purposes. • This research work can be extended in future using mobile sensor nodes with security measures to improve the performance of WSN.
  • 18. REFERENCES • Ahmad, MZ &Turgut, D 2008, 'Congestion Avoidance and Fairness in Wireless Sensor Networks', IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference. • Akyildiz, IF 2003, 'ESRT : Event-to-Sink Reliable Transport in Wireless Sensor', Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing, pp. 177-188. • Antoniou, P, Pitsillides, A, Blackwell, T, Engelbrecht, A & Michael, L 2013, 'Congestion control in wireless sensor networks based on bird flocking behavior', Computer Networks, vol. 57, no. 5, pp. 1167-1191. • Arya, A & Singh, J 2014, 'Comparative Study of AODV , DSDV and DSR Routing Protocols in Wireless Sensor Network Using NS-2 Simulator', International Journal of Computer Science and Information Technologies, vol. 5, no. 4, pp. 5053-5056. • Azizi, R 2015, 'Comparative Study of Transport Protocols in WSN', International Journal of Computer Applications (0975-8887), vol. 113, no. 6, pp. 1-9. • Balen, J, Zagar, D &Martinovic, G 2011, 'Quality of Service in Wireless Sensor Networks: A Survey and Related Patents', Recent Patents on Computer Science, vol. 4, no. 3, pp. 188-202.
  • 19. REFERENCES – Contd. • Bhuyan, B 2010, 'Quality of Service (QoS) Provisions in Wireless Sensor Networks and Related Challenges', Wireless Sensor Network, vol. 02, no. 11, pp. 861-868. • Cecchetti, G &Ruscelli, AL 2011, 'Improving the Design of Wireless Sensor Networks Using Qos-Aware Opportunistic Techniques', IADIS International Conference Applied Computing, pp. 171-178. • Chawla, H 2014, 'Some issues and challenges of Wireless Sensor Networks', International Journal of Advanced Research in Computer Science and Software Engineering, vol. 4, no. 7, pp. 236-239. • Chelli, K 2015, 'Security Issues in Wireless Sensor Networks: Attacks and Counter measures', Proceedings of the World Congress on Engineering 2015 Vol I WCE 2015, July 1 - 3, 2015, London, U.K. • Chen, S & Zhang, Z 2006, 'Localized algorithm for aggregate fairness in wireless sensor networks', Proc. ACM Annual International Conference on Mobile Computing and Networking, pp. 274-274. • Chen, S, Fang, Y & Xia, Y 2007, 'Lexicographic maxmin fairness for data collection in wireless sensor networks', IEEE Transactions on Mobile Computing, vol. 6, no. 7.
  • 20. REFERENCES – Contd. • Dashkova, E &Gurtov, A 2012, 'Survey on Congestion Control Mechanisms for Wireless Sensor Networks', Internet of Things, Smart Spaces, and Next Generation Networking. Springer Berlin Heidelberg, no. Cc, pp. 75-85. • Gowrishankar, S, Basavaraju, TG, Manjaiah, DH &Sarkar, SK 2008, 'Issues in Wireless Sensor Networks', Proceedings of the World Congress on Engineering, vol. I, pp. 978-988. • Gowthaman, P & Chakravarthi, R 2013, 'Survey on Various Congestion Detection and Control Protocols in Wireless Sensor Networks', International Journal Advanced Computer Engineering Commun Technol, vol. 11, pp. 15-19. • Gupta, S &Sinha, P 2014, 'Overview of Wireless Sensor Network: A Survey', International Journal of Advanced Research in Computer and Communication Engineering, vol. 3, no. 1, pp. 5201-5207. • Jadhav, P &Satao, R 2016, 'A Survey on Opportunistic Routing Protocols for Wireless Sensor Networks', Procedia Computer Science, vol. 79, pp. 603-609.