The document discusses congestion detection and avoidance in wireless sensor networks. It begins with an introduction to wireless sensor networks and their components. It then discusses objectives like improving throughput and issues like congestion. Several existing congestion control protocols are reviewed, with problems identified in each. The document proposes a new TADR algorithm to prioritize congestion detection and avoidance to improve throughput. Simulation results show the proposed method improves packet delivery over existing methods. The conclusion states the new technique will improve quality of service and performance in wireless sensor networks.
Wireless Sensor Network Using Six Sigma Multi Hop RoutingIOSR Journals
Abstract: The most significant problem in the design of wireless sensor networks is to coordinate the sensors with dynamism into a wireless communication network and route sensed data to the base station. The energy efficiency is the most important key point of the network routing designing. This paper presents the efficient multi hop routing algorithm to extend the lifetime of sensor networks and focuses by employing six sigma principles to obtain the Quality of Service. To attain QoS support, we have to find either a route to assure the application requirements or offering network response to the application when the requirements cannot be met. Keywords: Wireless Sensor Networks, Multi hop routing, six sigma, QoS
Wireless Sensor Network Using Six Sigma Multi Hop RoutingIOSR Journals
The most significant problem in the design of wireless sensor networks is to coordinate the sensors
with dynamism into a wireless communication network and route sensed data to the base station. The energy
efficiency is the most important key point of the network routing designing. This paper presents the efficient
multi hop routing algorithm to extend the lifetime of sensor networks and focuses by employing six sigma
principles to obtain the Quality of Service. To attain QoS support, we have to find either a route to assure the
application requirements or offering network response to the application when the requirements cannot be met.
Congestion in Wireless Sensor Networks has negative impact on the Quality of Service.
Congestion effects the performance metrics, namely throughput and per-packet energy
consumption, network lifetime and packet delivery ratio. Reducing congestion allows better
utilization of the network resources and thus enhances the Quality of Service metrics of the
network. Traffic Aware Dynamic Routing to Alleviate Congestion in Wireless Sensor Networks
reduces congestion by considering one hop neighbor routing in the network. This paper
proposed an algorithm for Quality of Service Based Traffic-Aware Data forwarding for
congestion control in wireless sensor networks based on two hop neighbor information. On
detection of congestion, the algorithm forwards data packets around the congestion areas by
spreading the excessive packets through multiple paths. The path with light load or under
loaded nodes is efficiently utilized whenever congestion occurs. The main aspect of the
algorithm is to build path to the destination using two independent potential fields depth and
queue length. Queue length field solves the traffic-aware problem. Depth field creates a
backbone to forward packets to the sink. Both fields are combined to yield a hybrid potential
field to make dynamic decision for data forwarding. Network Simulator used for simulating the
algorithm is NS2. The proposed algorithm performs better.
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...cscpconf
Congestion in Wireless Sensor Networks has negative impact on the Quality of Service.
Congestion effects the performance metrics, namely throughput and per-packet energy
consumption, network lifetime and packet delivery ratio. Reducing congestion allows better
utilization of the network resources and thus enhances the Quality of Service metrics of the
network. Traffic Aware Dynamic Routing to Alleviate Congestion in Wireless Sensor Networks
reduces congestion by considering one hop neighbor routing in the network. This paper
proposed an algorithm for Quality of Service Based Traffic-Aware Data forwarding for
congestion control in wireless sensor networks based on two hop neighbor information. On
detection of congestion, the algorithm forwards data packets around the congestion areas by
spreading the excessive packets through multiple paths. The path with light load or under
loaded nodes is efficiently utilized whenever congestion occurs. The main aspect of the
algorithm is to build path to the destination using two independent potential fields depth and
queue length. Queue length field solves the traffic-aware problem. Depth field creates a
backbone to forward packets to the sink. Both fields are combined to yield a hybrid potential
field to make dynamic decision for data forwarding. Network Simulator used for simulating the
algorithm is NS2. The proposed algorithm performs better.
Wireless Sensor Network Using Six Sigma Multi Hop RoutingIOSR Journals
Abstract: The most significant problem in the design of wireless sensor networks is to coordinate the sensors with dynamism into a wireless communication network and route sensed data to the base station. The energy efficiency is the most important key point of the network routing designing. This paper presents the efficient multi hop routing algorithm to extend the lifetime of sensor networks and focuses by employing six sigma principles to obtain the Quality of Service. To attain QoS support, we have to find either a route to assure the application requirements or offering network response to the application when the requirements cannot be met. Keywords: Wireless Sensor Networks, Multi hop routing, six sigma, QoS
Wireless Sensor Network Using Six Sigma Multi Hop RoutingIOSR Journals
The most significant problem in the design of wireless sensor networks is to coordinate the sensors
with dynamism into a wireless communication network and route sensed data to the base station. The energy
efficiency is the most important key point of the network routing designing. This paper presents the efficient
multi hop routing algorithm to extend the lifetime of sensor networks and focuses by employing six sigma
principles to obtain the Quality of Service. To attain QoS support, we have to find either a route to assure the
application requirements or offering network response to the application when the requirements cannot be met.
Congestion in Wireless Sensor Networks has negative impact on the Quality of Service.
Congestion effects the performance metrics, namely throughput and per-packet energy
consumption, network lifetime and packet delivery ratio. Reducing congestion allows better
utilization of the network resources and thus enhances the Quality of Service metrics of the
network. Traffic Aware Dynamic Routing to Alleviate Congestion in Wireless Sensor Networks
reduces congestion by considering one hop neighbor routing in the network. This paper
proposed an algorithm for Quality of Service Based Traffic-Aware Data forwarding for
congestion control in wireless sensor networks based on two hop neighbor information. On
detection of congestion, the algorithm forwards data packets around the congestion areas by
spreading the excessive packets through multiple paths. The path with light load or under
loaded nodes is efficiently utilized whenever congestion occurs. The main aspect of the
algorithm is to build path to the destination using two independent potential fields depth and
queue length. Queue length field solves the traffic-aware problem. Depth field creates a
backbone to forward packets to the sink. Both fields are combined to yield a hybrid potential
field to make dynamic decision for data forwarding. Network Simulator used for simulating the
algorithm is NS2. The proposed algorithm performs better.
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...cscpconf
Congestion in Wireless Sensor Networks has negative impact on the Quality of Service.
Congestion effects the performance metrics, namely throughput and per-packet energy
consumption, network lifetime and packet delivery ratio. Reducing congestion allows better
utilization of the network resources and thus enhances the Quality of Service metrics of the
network. Traffic Aware Dynamic Routing to Alleviate Congestion in Wireless Sensor Networks
reduces congestion by considering one hop neighbor routing in the network. This paper
proposed an algorithm for Quality of Service Based Traffic-Aware Data forwarding for
congestion control in wireless sensor networks based on two hop neighbor information. On
detection of congestion, the algorithm forwards data packets around the congestion areas by
spreading the excessive packets through multiple paths. The path with light load or under
loaded nodes is efficiently utilized whenever congestion occurs. The main aspect of the
algorithm is to build path to the destination using two independent potential fields depth and
queue length. Queue length field solves the traffic-aware problem. Depth field creates a
backbone to forward packets to the sink. Both fields are combined to yield a hybrid potential
field to make dynamic decision for data forwarding. Network Simulator used for simulating the
algorithm is NS2. The proposed algorithm performs better.
A Review of Routing Protocols for Wireless Sensor NetworkIJMER
A wireless sensor network is a collection of nodes organized into a cooperative network. Each node consists of processing capability, may contain multiple types of memory, have a RF transceiver, have a power source, and accommodate various sensors and actuators. The nodes
communicate wirelessly and often self-organize after being deployed in an ad hoc fashion. Routing protocols for wireless sensor networks are responsible for maintaining the routes in the network and have to ensure reliable multi-hop communication .The performance of the network is
greatly influenced by the routing techniques. Routing is to find out the path to route the sensed data to the base station. In this paper the features of WSNs are introduced and routing protocols are reviewed for Wireless Sensor Network
Nowadays, Wireless Sensor Network has been greatly used
with RFID technology because of its certain advantages. RFID
is abbreviated as radio frequency identification. The frequency
identification RFID technology is similar to a Wireless Sensor
Network (WSN) as it also captures the physical environment
data, process it and provide the rapid response about location
and target tracking [3]. RFID active tags are connected with
sensors to communicate with users [4]. RFID technology uses
radio waves to communicate the data and other necessary
information. It includes RFID tags and RFID readers. The
tags are equipped on an object which we want to sense. It
can discover the information about that object even without
coming in contact with it. The data is then send to the host
system through intranet. RFID can easily discern the objects
and can trace the location even if no information about the
physical position is provided. The main difference is that RFID
provides much more and accurate information about physical
environment than a Wireless Sensor Network could provide.
There is a major drawback of this technology which is its
lowest communication range up to 12m only due to limited
battery problem. This drawback can be made insignificant by
integrating it with WSN. As a result, combination of RFID and
WSN can provide us with a bundle of environment related
information such as how the data is routed by the nodes,
which routing protocol is used, resource ID, location and ID of
communicating nodes and also the physical condition of nodes.
80 percent of the node’s energy is utilized during the process
of communication, processing, and activation [3]. Figure 1
shows the advantages that we can have by integrating these
two technologies.
Introduction
Background
WSN Design Issues: MAC Protocols, Routing Protocols, Transport Protocols
Performance Modeling of WSNs: Performance Metrics, Basic Models, Network Models
Case Study: Simple Computation of the System Life Span
Practical Example.
Energy Proficient and Security Protocol for WSN: A Reviewtheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation
Study Of Coded Based Mechanism In WSN SystemIJERA Editor
Wireless Sensor networks (WSN) is an emerging technology and have great potential to be employed in critical
situations like battlefields and commercial applications such as building, traffic surveillance, habitat monitoring
and smart homes and many more scenarios.One of the major challenges wireless sensor networks face today is
QoS. In order to ensure data security and quality of service required by an application in an energy efficient
way, we propose a mechanism for QoS routing with coding and selective encryption scheme for WSNs.Our
approach provides reliable and secure data transmission and can adapt to the resource constraints of WSNs.
The rapid need of wireless demands a great deal of security and reliable routing in order to keep all the data sources and equipments secure. In order to develop efficient and robust protocols, it is essential to understand the inherent characteristics of wireless networks such as connectivity, coverage and varying channel conditions. Wireless LAN introduces the concept that use can connect to any one at any place at anytime by using various mobile appliances that can be carried at any place. Now Communication is no longer limited to a one place by holding wired phones. This is the big boom to the I.T industry but it also brings a lot of opportunities and challenges for the Network Administrator who is looking after the Wireless LANs (WLAN). WLAN traffic travels over radio waves that cannot be constrained by the walls or any Simranjeet Kaur"Reliable and Efficient Routing in WLAN" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd3585.pdf http://www.ijtsrd.com/computer-science/computer-network/3585/reliable-and-efficient-routing-in-wlan/simranjeet-kaur
Mtadf multi hop traffic aware data for warding for congestion control in wir...ijwmn
In the past few years there is a remarkable change in the field of wireless sensor networks. Congestion occurs when there is a heavy traffic in the network. The heavy traffic in the network leads to wastage of energy and packet loss. Traffic Aware Dynamic Routing algorithm mitigates congestion by using one hop neighbor routing, hence throughput of the network is low. This paper proposed a Multi hop based Data Forwarding Technique to mitigate congestion. Queue length field and depth potential field play a major role to divert the traffic in the network to the alternate paths. The high traffic load leads to data queue overflow in the sensor nodes, these results in loss of important information about important events. Multi hop Traffic-Aware Dynamic Routing algorithm addresses congestion using depth potential field and queue length potential field. The algorithm forwards data packets around the congestion areas and scatters the excessive along multiple paths. The nodes with less load are efficiently utilized in response to congestion. The main aspect of the algorithm is to construct two independent potential fields using depth and queue length. Queue length field solves the traffic-aware problem. Depth field creates a backbone to forward packets to the sink. Both fields are combined to yield a hybrid potential field to make dynamic decision for data forwarding. Simulations are conducted to evaluate the performance of our proposed algorithm and our proposed scheme performs better compared to previous work.
This presentation is all about the wireless sensor networks, how they collect data using aggregation, and how they evaluate or calculate the parameters
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
A Review of Routing Protocols for Wireless Sensor NetworkIJMER
A wireless sensor network is a collection of nodes organized into a cooperative network. Each node consists of processing capability, may contain multiple types of memory, have a RF transceiver, have a power source, and accommodate various sensors and actuators. The nodes
communicate wirelessly and often self-organize after being deployed in an ad hoc fashion. Routing protocols for wireless sensor networks are responsible for maintaining the routes in the network and have to ensure reliable multi-hop communication .The performance of the network is
greatly influenced by the routing techniques. Routing is to find out the path to route the sensed data to the base station. In this paper the features of WSNs are introduced and routing protocols are reviewed for Wireless Sensor Network
Nowadays, Wireless Sensor Network has been greatly used
with RFID technology because of its certain advantages. RFID
is abbreviated as radio frequency identification. The frequency
identification RFID technology is similar to a Wireless Sensor
Network (WSN) as it also captures the physical environment
data, process it and provide the rapid response about location
and target tracking [3]. RFID active tags are connected with
sensors to communicate with users [4]. RFID technology uses
radio waves to communicate the data and other necessary
information. It includes RFID tags and RFID readers. The
tags are equipped on an object which we want to sense. It
can discover the information about that object even without
coming in contact with it. The data is then send to the host
system through intranet. RFID can easily discern the objects
and can trace the location even if no information about the
physical position is provided. The main difference is that RFID
provides much more and accurate information about physical
environment than a Wireless Sensor Network could provide.
There is a major drawback of this technology which is its
lowest communication range up to 12m only due to limited
battery problem. This drawback can be made insignificant by
integrating it with WSN. As a result, combination of RFID and
WSN can provide us with a bundle of environment related
information such as how the data is routed by the nodes,
which routing protocol is used, resource ID, location and ID of
communicating nodes and also the physical condition of nodes.
80 percent of the node’s energy is utilized during the process
of communication, processing, and activation [3]. Figure 1
shows the advantages that we can have by integrating these
two technologies.
Introduction
Background
WSN Design Issues: MAC Protocols, Routing Protocols, Transport Protocols
Performance Modeling of WSNs: Performance Metrics, Basic Models, Network Models
Case Study: Simple Computation of the System Life Span
Practical Example.
Energy Proficient and Security Protocol for WSN: A Reviewtheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Theoretical work submitted to the Journal should be original in its motivation or modeling structure. Empirical analysis should be based on a theoretical framework and should be capable of replication. It is expected that all materials required for replication (including computer programs and data sets) should be available upon request to the authors.
The International Journal of Engineering & Science would take much care in making your article published without much delay with your kind cooperation
Study Of Coded Based Mechanism In WSN SystemIJERA Editor
Wireless Sensor networks (WSN) is an emerging technology and have great potential to be employed in critical
situations like battlefields and commercial applications such as building, traffic surveillance, habitat monitoring
and smart homes and many more scenarios.One of the major challenges wireless sensor networks face today is
QoS. In order to ensure data security and quality of service required by an application in an energy efficient
way, we propose a mechanism for QoS routing with coding and selective encryption scheme for WSNs.Our
approach provides reliable and secure data transmission and can adapt to the resource constraints of WSNs.
The rapid need of wireless demands a great deal of security and reliable routing in order to keep all the data sources and equipments secure. In order to develop efficient and robust protocols, it is essential to understand the inherent characteristics of wireless networks such as connectivity, coverage and varying channel conditions. Wireless LAN introduces the concept that use can connect to any one at any place at anytime by using various mobile appliances that can be carried at any place. Now Communication is no longer limited to a one place by holding wired phones. This is the big boom to the I.T industry but it also brings a lot of opportunities and challenges for the Network Administrator who is looking after the Wireless LANs (WLAN). WLAN traffic travels over radio waves that cannot be constrained by the walls or any Simranjeet Kaur"Reliable and Efficient Routing in WLAN" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd3585.pdf http://www.ijtsrd.com/computer-science/computer-network/3585/reliable-and-efficient-routing-in-wlan/simranjeet-kaur
Mtadf multi hop traffic aware data for warding for congestion control in wir...ijwmn
In the past few years there is a remarkable change in the field of wireless sensor networks. Congestion occurs when there is a heavy traffic in the network. The heavy traffic in the network leads to wastage of energy and packet loss. Traffic Aware Dynamic Routing algorithm mitigates congestion by using one hop neighbor routing, hence throughput of the network is low. This paper proposed a Multi hop based Data Forwarding Technique to mitigate congestion. Queue length field and depth potential field play a major role to divert the traffic in the network to the alternate paths. The high traffic load leads to data queue overflow in the sensor nodes, these results in loss of important information about important events. Multi hop Traffic-Aware Dynamic Routing algorithm addresses congestion using depth potential field and queue length potential field. The algorithm forwards data packets around the congestion areas and scatters the excessive along multiple paths. The nodes with less load are efficiently utilized in response to congestion. The main aspect of the algorithm is to construct two independent potential fields using depth and queue length. Queue length field solves the traffic-aware problem. Depth field creates a backbone to forward packets to the sink. Both fields are combined to yield a hybrid potential field to make dynamic decision for data forwarding. Simulations are conducted to evaluate the performance of our proposed algorithm and our proposed scheme performs better compared to previous work.
This presentation is all about the wireless sensor networks, how they collect data using aggregation, and how they evaluate or calculate the parameters
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
2. INTRODUCTION TO WSN
• Wireless Sensor Network (WSN) is an emerging technology
consisting of spatially scattered independent devices.
• WSN is a self- organize network with a large number of
small sensors nodes
• Sensor nodes are equipped with self-supported battery
power.
• It is used and organized to sense, observe and recognize the
physical entity
3. WSN MODEL
Major components of WSN model are sensor field, sensor
node, sink node or base station and Internet.
Sensor nodes are made up of four basic components - a
sensor, a processor, a radio transceiver and a power Supply.
4. OBJECTIVES
• To design, share resource allocation and channel bandwidth
• To calculate buffer length and rate control packets
• To avoid unnecessary traffic at input and output side
• To detect and avoid congestion in the network
• To Improve parameters like Throughput, Energy efficiency, Packet
Drop, Delay, Packet Delivery Ratio using various protocols
5. CONGESTION IN WSN
• Congestion occurs due to more sensors, packet drop, receiving more
packets than transmitting and buffer queue size.
• A congestion control technique relates the detection, notification and
avoidance at either node or link.
• Congestion takes place when several nodes can transmit packets to a single
channel.
• Traffic and Congestion are the main issues in designing the network.
6. CONGESTION CONTROL PROTOCOLS
• Stream Control Transmission Protocol (SCTP)
• Datagram Congestion Control Protocol (DCCP)
• Congestion Detection and Avoidance (CODA)
• Destination Sequenced Distance Vector (DSDV)
• Ad-hoc On demand Distance Vector (AODV)
• Prioritized Congestion Control Protocol (PCCP)
• Hop by hop Congestion Control Protocol (HCCP)
7. LITERATURE REVIEW
1. CONGESTION DETECTION AND AVOIDANCE (CODA)
(Wan, C-Y, Eisenman, SB & Campbell - ACM Transactions on Sensor Networks – 2011)
•CODA has accurate and efficient congestion over the wireless sensor
networks.
•The congestion should prefer the previous and the past channel for
transmission.
PROBLEM IDENTIFIED:
Buffer overflow and link failure is not identified in this research
work leads to failure of the network
8. LITERATURE REVIEW- Contd
2. QOS ADAPTIVE CONGESTION CONTROL
(K.Sindhuja & Reddy – IJIRT – 2015)
•QoS which provides better networking services over various
technologies and also provides guarantee for the delivery of packets.
•Some of the routing protocols are SAR, PCCP and SPEED.
PROBLEM IDENTIFIED:
Node deployment and resource allocation is not allocated based on
the priority to the nodes in the network
9. LITERATURE REVIEW- Contd
3. TADR TO ALLEVIATE CONGESTION
(Naik, G, Kulkarn, H, Gaikwad, P & Yadav , T - Int.J. Computer Technology &
Applications – 2014) (Das, SK & Lin, C - IEEE Transactions on Systems – 2011)
•(TADR) algorithm which is proposed to route packets around the
congestion areas and scatter the excessive packets along multiple paths
consisting of idle and under loaded nodes.
•TADR is designed for congestion control techniques to improve the
throughput of the network. It can be increased by sending excess
packets through multiple paths in the congestion area.
PROBLEM IDENTIFIED:
In multipath scheme, more number of packets are kept in idle state
leads to energy waste
10. CONGESTION CONTROL TECHNIQUES
• Congestion takes place when several nodes can transmit packets to a
single channel.
• When nodes get closer to the sink, the traffic increases, leading to
congestion.
• Congestion control scheme which is necessary to improve the
Quality of Service (QoS) and System life time.
11. CONGESTION DETECTION
Some of the methods for congestion detection are packet loss, queue
length, channel load and transmission delay.
12. CONGESTION NOTIFICATION
• Explicit Congestion Notification (ECN) allows end to end
notification from sender to receiver
• The goal is to reduce packet loss and delay by decreasing the
transmission rate without dropping packets.
13. CONGESTION AVOIDANCE
• When the Queue occupancy is less than the congestion threshold,
congestion is avoided in the buffer state.
• Congestion can be avoided by TCP over RTT technique in which the
congestion takes place in the slow start region.
• Congestion is mainly related to the window size of the network.
• If the window size exceeds the threshold value then congestion will
be avoided.
15. SIMULATION, RESULTS & DISCUSSIONS
The existing method with link failure has 53,272 successful
packets transmitted and 38,342 packets received in the sink,
whereas proposed method has 64,882 packets transmitted and
50,219 packets received at the receiver end.
16. CONCULSION
• This new technique TADR with geographical features
will improve the QoS and system performance.
• A TADR algorithm in MAC layer is implemented to
segment the packets
• With the new technique, the packet loss has been
minimized and throughput has been increased.
17. FUTURE SCOPE
• It can be implemented on cognitive radio networks
and wireless multimedia sensor networks for
commercial and industrial purposes.
• This research work can be extended in future using
mobile sensor nodes with security measures to
improve the performance of WSN.
18. REFERENCES
• Ahmad, MZ &Turgut, D 2008, 'Congestion Avoidance and Fairness in Wireless Sensor
Networks', IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications
Conference.
• Akyildiz, IF 2003, 'ESRT : Event-to-Sink Reliable Transport in Wireless Sensor',
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking &
computing, pp. 177-188.
• Antoniou, P, Pitsillides, A, Blackwell, T, Engelbrecht, A & Michael, L 2013, 'Congestion
control in wireless sensor networks based on bird flocking behavior', Computer
Networks, vol. 57, no. 5, pp. 1167-1191.
• Arya, A & Singh, J 2014, 'Comparative Study of AODV , DSDV and DSR Routing
Protocols in Wireless Sensor Network Using NS-2 Simulator', International Journal of
Computer Science and Information Technologies, vol. 5, no. 4, pp. 5053-5056.
• Azizi, R 2015, 'Comparative Study of Transport Protocols in WSN', International
Journal of Computer Applications (0975-8887), vol. 113, no. 6, pp. 1-9.
• Balen, J, Zagar, D &Martinovic, G 2011, 'Quality of Service in Wireless Sensor
Networks: A Survey and Related Patents', Recent Patents on Computer Science, vol. 4,
no. 3, pp. 188-202.
19. REFERENCES – Contd.
• Bhuyan, B 2010, 'Quality of Service (QoS) Provisions in Wireless Sensor Networks
and Related Challenges', Wireless Sensor Network, vol. 02, no. 11, pp. 861-868.
• Cecchetti, G &Ruscelli, AL 2011, 'Improving the Design of Wireless Sensor
Networks Using Qos-Aware Opportunistic Techniques', IADIS International
Conference Applied Computing, pp. 171-178.
• Chawla, H 2014, 'Some issues and challenges of Wireless Sensor Networks',
International Journal of Advanced Research in Computer Science and Software
Engineering, vol. 4, no. 7, pp. 236-239.
• Chelli, K 2015, 'Security Issues in Wireless Sensor Networks: Attacks and Counter
measures', Proceedings of the World Congress on Engineering 2015 Vol I WCE
2015, July 1 - 3, 2015, London, U.K.
• Chen, S & Zhang, Z 2006, 'Localized algorithm for aggregate fairness in wireless
sensor networks', Proc. ACM Annual International Conference on Mobile
Computing and Networking, pp. 274-274.
• Chen, S, Fang, Y & Xia, Y 2007, 'Lexicographic maxmin fairness for data
collection in wireless sensor networks', IEEE Transactions on Mobile Computing,
vol. 6, no. 7.
20. REFERENCES – Contd.
• Dashkova, E &Gurtov, A 2012, 'Survey on Congestion Control Mechanisms for
Wireless Sensor Networks', Internet of Things, Smart Spaces, and Next Generation
Networking. Springer Berlin Heidelberg, no. Cc, pp. 75-85.
• Gowrishankar, S, Basavaraju, TG, Manjaiah, DH &Sarkar, SK 2008, 'Issues in
Wireless Sensor Networks', Proceedings of the World Congress on Engineering,
vol. I, pp. 978-988.
• Gowthaman, P & Chakravarthi, R 2013, 'Survey on Various Congestion Detection
and Control Protocols in Wireless Sensor Networks', International Journal
Advanced Computer Engineering Commun Technol, vol. 11, pp. 15-19.
• Gupta, S &Sinha, P 2014, 'Overview of Wireless Sensor Network: A Survey',
International Journal of Advanced Research in Computer and Communication
Engineering, vol. 3, no. 1, pp. 5201-5207.
• Jadhav, P &Satao, R 2016, 'A Survey on Opportunistic Routing Protocols for
Wireless Sensor Networks', Procedia Computer Science, vol. 79, pp. 603-609.