SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 05 Issue: 01 June 2016 Page No.65-68
ISSN: 2278-2400
65
Virtual Position based Olsr Protocol for Wireless
Sensor Networks
N. Sripathi 1
, M.Saveetha 2
1
PG scholar, Dept. of CS, Pavendhar Bharathidasan College of Engineering and Technology, Trichy, Tamilnadu, India.1
2
Assistant professor, Dept. of CS, Pavendhar Bharathidasan College of Engineering and Technology, Trichy, Tamilnadu, India.2
Email:nsripathi83@gmail.com1
,savi.sri.sv@gmail.com2
Abstract - In wireless sensor networks usually taken in routing
void problem in geographical routing in high control overhead
and transmission delay .The routing void protocol is proposed in
this paper is efficient bypassing void routing protocol. This
protocol based on virtual co-ordinates is to transform a structure
of random process in virtual circle .The circle are composed by
void edge in to by mapping of edge nodes. In this paper to used
the greedy forwarding algorithm. This algorithm can be process
on virtual circle. The virtual circle greedy forwarding failing on
routing void process. There are forwarding process are source to
destination. The proposed protocol as find the shortest path, long
transmission and High quality link maintenance.
Keywords: void routing, geographical, routing protocol.
I. INTRODUCTION
The wireless sensor networks fields one of the key technologies
is routing protocol. The sensor nodes are path depending on the
location information of routing geographic. The WSNs is large
scale wide application of geographic routing. The geographic
information is more efficient, high expansibility and low
influence. The sensor nodes are encountered of random
distribution from result. The greedy forwarding algorithm in
routing will fails, in such situation data transmission also fails.
The simple principle of greedy forwarding is low complexity.
The virtual circle to solve the routing void problem makes in
greedy forwarding algorithm. This algorithm works in
forwarding process. In this way of reduce overhead control
packet and energy consumption can be reduced. The existing
system OLSR protocol is nodes are banned from the selected
nodes in order to prevent the routing void. The transmission
information path between source and destination is achieved the
few hops. In each and every transmission is no need to full
information in hop.
A. Problem definitions
The sensor nodes are modeled by unit graph. The all nodes with
in communication ranges RC and nodes n are links in
bidirectional. Routing is an important issue that affects wireless
sensor networks. Geographic routing uses the physical location
as the node address. The source node determines the destination
address by looking it up from the location server or by
computing it using a hash function in a data-centric storage
scheme. The node usually forwards the packet to a neighbor
closer to the destination. This, however, may take the packet to a
dead-end node, that is, a node with no neighbor closer to the
destination. In GPSR and GFG routing, the FACE algorithm is
used on a planar graph to deal with the dead-end node problem.
In addition, GSR routing and a combination of the FACE
algorithm and the shortcut-based procedure are proposed to
improve routing efficiency. GSR routing builds a planar routing
sub graph, termed the Restricted Delaunay Graph (RDG), such
that a path exists whose distance, in terms of the Euclidean
distance or hop distance, in RDG is only the constant times to the
minimum distance between any pair of nodes. Geographic
routing protocols require nodes to have geographic information
that is obtained with difficulty in wireless sensor networks
because devices that operate via the geographic positioning
system (GPS) consume a large amount of power and do not work
indoors.Routing protocols based on virtual coordinates that
operate without the GPS assistance are proposed in wireless
sensor networks. Through an iterative procedure, a relaxation
algorithm assigns virtual coordinates to nodes that are close to
their physical locations, consuming, in the process, a great deal
of message broadcast overhead. In the distance between any two
nodes is first estimated by an all-pair, shortest-paths algorithm.
Subsequently, multidimensional scaling (MDS) is used to derive
node locations that fit the estimated distances. In seed nodes are
preprogrammed with their physical locations. Each node finds its
location by determining the shortest hop counts to seed nodes
and using the least square error method. In the locations of sensor
nodes are estimated by mobile robots that collect the signal
strength of the messages sent by sensors. However, these
methods do not guarantee packet delivery because the FACE
algorithm cannot be used to solve the dead-end node problem
due to the local error in the virtual coordinate assignment.
B. Void routing in geographic
The geographic routing is greedy forwarding adopted can be
interrupted due to radio coverage. The greedy algorithm in range
of communication causes of greedy forwarding failing. The
sensor nodes are tries to forward the one neighbor nodes to other
destination nodes. A routing void is encountered by nodes
doesn’t exist. In such situation greedy forwarding can be fails. As
show in Fig.1 node n, the packet tires to forward a destination
node d1.The node n2 is set of {n1, n3, n4} closer to the
destination d1. A routing void is encountered by node n5, tires to
packet forward to destination node d2.The packet can arrival the
d1 with paths of n5,n6,n7,d1 without routing problems.
II. RELATED WORKS
Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 05 Issue: 01 June 2016 Page No.65-68
ISSN: 2278-2400
66
The structure component of every edge nodes are only two
neighbor nodes on the circle. The all edge nodes are around the
obstacle distance to point 0. R is a constant. The edge nodes are
locate on center point 0 and radius R. Many difficulties
associated with Virtual Coordinate System (VCS) based schemes
are attributable to lack of information about the physical
network. Layout information such as physical voids and relative
positions of sensor nodes with respect to X-Y directions are
absent. Even though VCS is based on connectivity, explicit
information on hop distances between pairs of nodes is not
available and difficult to estimate. Absence of connectivity
information, on the other hand, is the cause for many problems in
physical domain routing. Combining connectivity based
information in VCS and position or direction information in a
network essentially would combine the advantages of VCR and
GR schemes. However, this has to be done without inheriting the
need for accurate and costly node localization. Our approach is
based on the use of topology preserving maps, derived using
virtual coordinates alone, for geographic information instead of
physical locations. This way, we are able to combine the
advantages of physical and logical routing schemes without
inheriting their disadvantages. No such scheme is currently
available. Geographic-Logical Routing (GLR), transforms the set
of VCs to a set of Cartesian coordinates (2D topological
coordinates)and switches between Geographic Routing that use
Cartesian coordinates and Logical Routing that use virtual
coordinates to achieve higher routability. We demonstrate that
the topology maps are actually more useful than Geographic
maps for WSN routing as the topology coordinates more
accurately select the neighbor to forward the packet to than the
geographic coordinates.Traditional ad hoc routing protocols are
not a good fit for Wireless Sensor Networks (WSN) for the
following reasons. WSNS often require data dissemination
patterns that are not efficiently mapped to the unicast
connections assumed by ad hoc protocols. Further, nodes need to
maintain routing state specific to destinations of active routes;
this state may become invalid due to changes that are not near to
the node. Finally, because of the need to maintain non-local state,
this approach requires that the nodes have globally unique
identifiers. As a result, this approach is not ideal for WSNs
which favor routing protocols that support data-centric operation,
localized interactions and supporting arbitrary data-driven
dissemination with in-network processing. In contrast to
traditional ad hoc protocols. Geographical routing algorithms
provides attractive properties for WSNs. In these algorithms,
nodes exchange location information with their neighbors.
Packets addressed to a destination must provide its location. At
every intermediate hop, the subset of the neighbors that are
closer to the destination is called the forwarding set. Routing
simply forwards a packet to one of the nodes in the forwarding
set. This process is repeated greedily until the packet reaches the
destination. Thus, interactions are localized to location exchange
with direct neighbors and there is no need for global identifiers.
The main steps of entire process are
A. Void Detecting Phase
B. The main function of the void detecting phase is to
collect edge node information around the routing void
after the void is encountered.
B. Virtual Coordinate Mapping Phase
The virtual coordinate mapping phase is responsible for mapping
the edge node coordinates stored in the detecting packed to a
virtual circle, i.e., converting a structure composed of edge nodes
to the structure without routing void
.
Fig. No. 3 virtual coordinate mapping
C. Void Region Dividing Phase
The main function of the void region dividing phase is to divide
the surrounding area of the void into three different regions, in
which different routing strategies are applied. According to the
void position and the location of destination node of the packets,
the surrounding area of a void is divided into approaching region,
departing region and free region.
Fig. No. 3 Void region Diving phase
After implementing the three phases above, the edge nodes of
void contain two types of location information which are
geographic coordinates and virtual coordinates, and that
surrounding area of routing void has been divided into three
different regions according to the destination node.
III. PROPOSED SYSTEM
The proposed system also maintains the partial path information
of previous transmission. The link quality of with all the
neighbors is checked periodically and so the base station
communication is reduced. Like existing system, the optimal
routing path between the source and the destination is achieved
with fewest hops. No need of full hop information calculation for
each and every transmission. The proposed system aims to find
the shortest path, each individual hop usually has long
transmission distance with high quality link maintenance. In a
WSN, it is prohibitive to implement the table-driven shortest path
routing (SPR), which requires per-destination states maintained
Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 05 Issue: 01 June 2016 Page No.65-68
ISSN: 2278-2400
67
by individual nodes. When the network scales to thousands of
nodes, the large size routing tables containing thousands of
entries may not be affordable to resource - constrained sensors.
The conflict between the large size network with a random
structure and the small routing table affordable to a sensor node
raises fundamental challenges to point-to-point routing in WSNs.
This project proposed an efficient bypassing void routing
protocol based on virtual coordinates. The basic idea of the
protocol is to transform a random structure composed of void
edges into a regular one by mapping edge nodes coordinates to a
virtual circle. By utilizing the virtual circle, the greedy
forwarding can be prevented from failing, so that there is no
routing void in forwarding process from source to destination
and control overhead can be reduced. Furthermore, the virtual
circle is beneficial to reduce average length of routing paths and
decrease transmission delay. The proposed protocol has higher
delivery ratio, shorter path length, less control packet overhead,
and energy consumption.It is believed that almost all the system
objectives that have been planned at the commencement of the
software development have been net with and the
implementation process of the project is completed. A trial run of
the system has been made and is giving good results the
procedures for processing is simple and regular order. The
application eliminates the difficulties in the existing system. It is
developed in a user-friendly manner. The application is very fast
and any transaction can be viewed or retaken at any level. Error
messages are given at each level of input of individual stages.
This software is very particular in reducing the difficulty in
analyzing the router algorithms. The application works well for
given tasks in network environment. Any node with .Net
framework installed can execute the application.After
implementing the three phases above, the edge nodes of void
contain two types of location information which are geographic
coordinates and virtual coordinates, and that surrounding area of
routing void has been divided into three different regions
according to the destination node. Discovery node restarts greedy
mode by utilizing the virtual coordinates, the packet stored in the
first phase is forwarded to relay nodes. In the greedy mode, the
ways to select relay node in three regions are different, but they
all use the greedy algorithm.
IV. SYSTEM DESIGN AND
IMPLEMENTATION
Fig. No. 3 Architecture Diagram
A. ENHANCED ROUTING PROTOCOLS
Along with existing system implementation, the proposed system
also maintains the partial path information of previous
transmission. The link quality of with all the neighbors is
checked periodically and so the base station communication is
reduced. Like existing system, the optimal routing path between
the source and the destination is achieved with fewest hops. No
need of full hop information calculation for each and every
transmission. The proposed system aims to find the shortest path,
each individual hop usually has long transmission distance with
high quality link maintenance.
B. PROTOCOL ANALYSIS
1) Routing Path Analysis:
According to the description of section III.B, after the
virtual coordinate mapping phase, the neighbors of the edge
nodes around the routing void receive the broadcasting messages.
These neighbor nodes have the opportunity to establish a short
path by utilizing the routing void information before void is
encountered. As shown in the node tries to send a packet to a
destination node. After sends the packet to by greedy algorithm,
a routing void is encountered at node.If face forwarding is
adopted to solve routing void problem,it is always activated at
the edge node
2) Control Overhead Analysis:
Assuming the length of control packet header in the greedy
algorithm is Lg, the lengths of detecting packet and distributing
packet in BVR-VCM are Lde and Ldi respectively, the edge node
number of routing void is Ns the average number of hops from
source to destination is hBVR-VCM. When n packets are sent, the
length of the control packet is (Lde + Ldi ) × Ns + Lg × hBVR-VCM
× n The average overhead of the control packet for each
packet is LBVR-VCM = (Lde + Ldi ) × Ns/n + Lg × hBVR-VCM
As shown in when the number of packets increases, the average
overhead is approximately equal that in greedy algorithm: LBVR-
VCM ≈ Lg × hBVR-VCM (9) Comparing with protocol based on face
forwarding, assuming the length of control packet header in the
greedy algorithm is L f , the proportion of the greedy algorithm is
g, and the average number of hops from source to destination is
hg. When n packets are sent, the length of control packet is (Lg ×
g + L f (1 − g)) × hg × n The average overhead of the control
packet for each packet is LFACE = (Lg × g + L f × (1 − g)) × hg
Since 0 < g < 1, L f > Lg, and hBVR-VCM ≤ hg learnt from section
IV.A, then Lg × hBVR-VCM ≤ Lg × hg < LFACE < L f × hg. For the
same fixed wireless sensor network, g is constant. In this
condition, no matter how many packets are send, LFACE is
constant, the value range of LFACE is . While LBVR-VCM decreases
as the increasing of the packets sent. So there exists a value
named nc, if n > nc, there is LBVR-VCM < LFACE, at this point the
control packet in BVR-VCM is always smaller than that in the
face forwarding protocol.
Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 05 Issue: 01 June 2016 Page No.65-68
ISSN: 2278-2400
68
REFERENCE
[1] B. Karp and H.T. Kung, “GPSR: Greedy Perimeter Stateless Routing for
Wireless Networks,” Proc. MobiCom, 2000.
[2] M. Mauve, J. Widmer, and H. Hartenstein. A Survey on Position-Based
Routing in Mobile Ad-Hoc Networks. IEEE Network, 15(6), 2001.
[3] F. Kuhn, R. Wattenhofer, Y. Zhang, and A. Zollinger, “Geometric Ad-Hoc
Routing: Of Theory and Practice,” Proc. Ann. Symp. Principles of
Distributed Computing (PODC), 2003.
[4] H. Frey and I. Stojmenovic, “On Delivery Guarantees of Face and
Combined Greedy-Face Routing in Ad Hoc and Sensor Networks,” Proc.
MobiCom, pp. 390-401, 2006.
[5] Z. Zhong and T. He, “Achieving Range-Free Localization beyond
Connectivity,” Proc. ACM Conf. Embedded Networked Sensor Systems
(SenSys), 2009. [7] T. He, C. Huang, B.M. Blum, J.A. Stankovic, and T.
Abdelzaher, “Range-Free Localization Schemes for Large Scale Sensor
Net-works,” Proc. MobiCom, pp. 81-95, 2003.
[6] D.S.J.D. Couto, D. Aguayo, J. Bicket, and R. Morris, “A High-Throughput
Path Metric for Multi-Hop Wireless Routing,” Proc. MobiCom, pp. 134-
146, 2003.
[7] Y.-J. Kim, R. Govindan, B. Karp, and S. Shenker, “Geographic Routing
Made Practical,” Proc. Conf. Symp. Networked Systems Design and
Implementation (NSDI), vol. 2, pp. 217-230, 2005.
[8] B. Leong, B. Liskov, and R. Morris, “Geographic Routing without
Planarization,” Proc. Conf. Networked Systems Design and Implementation
(NSDI), vol. 3, pp. 339-352, 2006.
[9] T. He, C. Huang, B. M. Blum, J. A. Stankovic. Range-free Localization
Schemes in Large-scale Sensor Networks. In MobiCom’03
[10] N. Bulusu, J. Heidemann, D. Estrin and T. Tran. Self-configuring
localization systems: Design and Experimental Evaluation. ACM Transon
Embedded Comp. Sys., 2004, 3(1).
[11] S. Basagni, I. Chlamtac, V. R. Syrotiuk, and B. A. Woodward. A distance
routing effect algorithm for mobility (DREAM). In ACM/IEEE
International Conference on Mobile Computing and Networking
(Mobicom'98), pages 76-84, 1998.
[12] J. C. Lin. Biological aspects of mobile communication data. Wireless
Networks, 3(6):439-453, 1997.
[13] ZAUMEN,W., AND GARCIA-LUNA ACEVES, J. Dynamics of
distributed shortest-path routing algorithms. In Proceedings of the
SIGCOMM ’91 Conference on Communications Architectures, Protocols
and Applications (Sept. 1991), pp. 31–42.
[14] BROCH,J.,MALTZ,D.,JOHNSON,D.,HU,Y., AND JETCHEVA, J. A
performance comparison of multi-hop wireless ad hoc network routing
protocols. In Proceedings of the Fourth Annual ACM/IEEE International
Conference on Mobile Computing and Networking (MobiCom ’98) (Dallas,
Texas, USA, Aug. 1998).

Weitere ähnliche Inhalte

Ähnlich wie Virtual Position based Olsr Protocol for Wireless Sensor Networks

Power Aware Geocast Based Geocast Region Tracking Using Mobile Node in Wirele...
Power Aware Geocast Based Geocast Region Tracking Using Mobile Node in Wirele...Power Aware Geocast Based Geocast Region Tracking Using Mobile Node in Wirele...
Power Aware Geocast Based Geocast Region Tracking Using Mobile Node in Wirele...inventionjournals
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSIJARIIT
 
Iaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless adIaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless adIaetsd Iaetsd
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Improving the scalability by contact information compression in routing
Improving the scalability by contact information compression in routingImproving the scalability by contact information compression in routing
Improving the scalability by contact information compression in routingijitjournal
 
V.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE AV.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE AKARTHIKEYAN V
 
Cv31424430
Cv31424430Cv31424430
Cv31424430IJMER
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
 
Geographic routing protocol_in_wireless_sensor_networks
Geographic routing protocol_in_wireless_sensor_networksGeographic routing protocol_in_wireless_sensor_networks
Geographic routing protocol_in_wireless_sensor_networksGr Patel
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSNMahbubur Rahman
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
 
LACBER: New Location Aided Routing Protocol For GPS Scarce Manet
LACBER: New Location Aided Routing Protocol For GPS Scarce ManetLACBER: New Location Aided Routing Protocol For GPS Scarce Manet
LACBER: New Location Aided Routing Protocol For GPS Scarce Manetijwmn
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
 
POSITION BASED ADAPTIVE ROUTING FOR VANETS
POSITION BASED ADAPTIVE ROUTING FOR VANETSPOSITION BASED ADAPTIVE ROUTING FOR VANETS
POSITION BASED ADAPTIVE ROUTING FOR VANETSIJCNCJournal
 
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...IJSRD
 
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...IJSRD
 
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsNarendra Singh Yadav
 

Ähnlich wie Virtual Position based Olsr Protocol for Wireless Sensor Networks (20)

Power Aware Geocast Based Geocast Region Tracking Using Mobile Node in Wirele...
Power Aware Geocast Based Geocast Region Tracking Using Mobile Node in Wirele...Power Aware Geocast Based Geocast Region Tracking Using Mobile Node in Wirele...
Power Aware Geocast Based Geocast Region Tracking Using Mobile Node in Wirele...
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
 
Iaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless adIaetsd improving the location of nodes in wireless ad
Iaetsd improving the location of nodes in wireless ad
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Improving the scalability by contact information compression in routing
Improving the scalability by contact information compression in routingImproving the scalability by contact information compression in routing
Improving the scalability by contact information compression in routing
 
V.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE AV.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE A
 
Cv31424430
Cv31424430Cv31424430
Cv31424430
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
 
Geographic routing protocol_in_wireless_sensor_networks
Geographic routing protocol_in_wireless_sensor_networksGeographic routing protocol_in_wireless_sensor_networks
Geographic routing protocol_in_wireless_sensor_networks
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 
LACBER: New Location Aided Routing Protocol For GPS Scarce Manet
LACBER: New Location Aided Routing Protocol For GPS Scarce ManetLACBER: New Location Aided Routing Protocol For GPS Scarce Manet
LACBER: New Location Aided Routing Protocol For GPS Scarce Manet
 
O026084087
O026084087O026084087
O026084087
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDV
 
POSITION BASED ADAPTIVE ROUTING FOR VANETS
POSITION BASED ADAPTIVE ROUTING FOR VANETSPOSITION BASED ADAPTIVE ROUTING FOR VANETS
POSITION BASED ADAPTIVE ROUTING FOR VANETS
 
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
 
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
Auction Game Theory Based Adaptive Position Update Strategy for Geographic Ro...
 
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
 

Mehr von ijcnes

A Survey of Ontology-based Information Extraction for Social Media Content An...
A Survey of Ontology-based Information Extraction for Social Media Content An...A Survey of Ontology-based Information Extraction for Social Media Content An...
A Survey of Ontology-based Information Extraction for Social Media Content An...ijcnes
 
Economic Growth of Information Technology (It) Industry on the Indian Economy
Economic Growth of Information Technology (It) Industry on the Indian EconomyEconomic Growth of Information Technology (It) Industry on the Indian Economy
Economic Growth of Information Technology (It) Industry on the Indian Economyijcnes
 
An analysis of Mobile Learning Implementation in Shinas College of Technology...
An analysis of Mobile Learning Implementation in Shinas College of Technology...An analysis of Mobile Learning Implementation in Shinas College of Technology...
An analysis of Mobile Learning Implementation in Shinas College of Technology...ijcnes
 
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...ijcnes
 
Challenges of E-government in Oman
Challenges of E-government in OmanChallenges of E-government in Oman
Challenges of E-government in Omanijcnes
 
Power Management in Micro grid Using Hybrid Energy Storage System
Power Management in Micro grid Using Hybrid Energy Storage SystemPower Management in Micro grid Using Hybrid Energy Storage System
Power Management in Micro grid Using Hybrid Energy Storage Systemijcnes
 
Holistic Forecasting of Onset of Diabetes through Data Mining Techniques
Holistic Forecasting of Onset of Diabetes through Data Mining TechniquesHolistic Forecasting of Onset of Diabetes through Data Mining Techniques
Holistic Forecasting of Onset of Diabetes through Data Mining Techniquesijcnes
 
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...ijcnes
 
Feature Extraction in Content based Image Retrieval
Feature Extraction in Content based Image RetrievalFeature Extraction in Content based Image Retrieval
Feature Extraction in Content based Image Retrievalijcnes
 
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computingijcnes
 
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...ijcnes
 
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...ijcnes
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networksijcnes
 
Secured Seamless Wi-Fi Enhancement in Dynamic Vehicles
Secured Seamless Wi-Fi Enhancement in Dynamic VehiclesSecured Seamless Wi-Fi Enhancement in Dynamic Vehicles
Secured Seamless Wi-Fi Enhancement in Dynamic Vehiclesijcnes
 
Mitigation and control of Defeating Jammers using P-1 Factorization
Mitigation and control of Defeating Jammers using P-1 FactorizationMitigation and control of Defeating Jammers using P-1 Factorization
Mitigation and control of Defeating Jammers using P-1 Factorizationijcnes
 
An analysis and impact factors on Agriculture field using Data Mining Techniques
An analysis and impact factors on Agriculture field using Data Mining TechniquesAn analysis and impact factors on Agriculture field using Data Mining Techniques
An analysis and impact factors on Agriculture field using Data Mining Techniquesijcnes
 
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...ijcnes
 
Priority Based Multi Sen Car Technique in WSN
Priority Based Multi Sen Car Technique in WSNPriority Based Multi Sen Car Technique in WSN
Priority Based Multi Sen Car Technique in WSNijcnes
 
Semantic Search of E-Learning Documents Using Ontology Based System
Semantic Search of E-Learning Documents Using Ontology Based SystemSemantic Search of E-Learning Documents Using Ontology Based System
Semantic Search of E-Learning Documents Using Ontology Based Systemijcnes
 
Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...
Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...
Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...ijcnes
 

Mehr von ijcnes (20)

A Survey of Ontology-based Information Extraction for Social Media Content An...
A Survey of Ontology-based Information Extraction for Social Media Content An...A Survey of Ontology-based Information Extraction for Social Media Content An...
A Survey of Ontology-based Information Extraction for Social Media Content An...
 
Economic Growth of Information Technology (It) Industry on the Indian Economy
Economic Growth of Information Technology (It) Industry on the Indian EconomyEconomic Growth of Information Technology (It) Industry on the Indian Economy
Economic Growth of Information Technology (It) Industry on the Indian Economy
 
An analysis of Mobile Learning Implementation in Shinas College of Technology...
An analysis of Mobile Learning Implementation in Shinas College of Technology...An analysis of Mobile Learning Implementation in Shinas College of Technology...
An analysis of Mobile Learning Implementation in Shinas College of Technology...
 
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
 
Challenges of E-government in Oman
Challenges of E-government in OmanChallenges of E-government in Oman
Challenges of E-government in Oman
 
Power Management in Micro grid Using Hybrid Energy Storage System
Power Management in Micro grid Using Hybrid Energy Storage SystemPower Management in Micro grid Using Hybrid Energy Storage System
Power Management in Micro grid Using Hybrid Energy Storage System
 
Holistic Forecasting of Onset of Diabetes through Data Mining Techniques
Holistic Forecasting of Onset of Diabetes through Data Mining TechniquesHolistic Forecasting of Onset of Diabetes through Data Mining Techniques
Holistic Forecasting of Onset of Diabetes through Data Mining Techniques
 
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
 
Feature Extraction in Content based Image Retrieval
Feature Extraction in Content based Image RetrievalFeature Extraction in Content based Image Retrieval
Feature Extraction in Content based Image Retrieval
 
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
 
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
 
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
 
Secured Seamless Wi-Fi Enhancement in Dynamic Vehicles
Secured Seamless Wi-Fi Enhancement in Dynamic VehiclesSecured Seamless Wi-Fi Enhancement in Dynamic Vehicles
Secured Seamless Wi-Fi Enhancement in Dynamic Vehicles
 
Mitigation and control of Defeating Jammers using P-1 Factorization
Mitigation and control of Defeating Jammers using P-1 FactorizationMitigation and control of Defeating Jammers using P-1 Factorization
Mitigation and control of Defeating Jammers using P-1 Factorization
 
An analysis and impact factors on Agriculture field using Data Mining Techniques
An analysis and impact factors on Agriculture field using Data Mining TechniquesAn analysis and impact factors on Agriculture field using Data Mining Techniques
An analysis and impact factors on Agriculture field using Data Mining Techniques
 
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
 
Priority Based Multi Sen Car Technique in WSN
Priority Based Multi Sen Car Technique in WSNPriority Based Multi Sen Car Technique in WSN
Priority Based Multi Sen Car Technique in WSN
 
Semantic Search of E-Learning Documents Using Ontology Based System
Semantic Search of E-Learning Documents Using Ontology Based SystemSemantic Search of E-Learning Documents Using Ontology Based System
Semantic Search of E-Learning Documents Using Ontology Based System
 
Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...
Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...
Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...
 

Kürzlich hochgeladen

Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Christo Ananth
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 

Kürzlich hochgeladen (20)

Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 

Virtual Position based Olsr Protocol for Wireless Sensor Networks

  • 1. Integrated Intelligent Research (IIR) International Journal of Business Intelligents Volume: 05 Issue: 01 June 2016 Page No.65-68 ISSN: 2278-2400 65 Virtual Position based Olsr Protocol for Wireless Sensor Networks N. Sripathi 1 , M.Saveetha 2 1 PG scholar, Dept. of CS, Pavendhar Bharathidasan College of Engineering and Technology, Trichy, Tamilnadu, India.1 2 Assistant professor, Dept. of CS, Pavendhar Bharathidasan College of Engineering and Technology, Trichy, Tamilnadu, India.2 Email:nsripathi83@gmail.com1 ,savi.sri.sv@gmail.com2 Abstract - In wireless sensor networks usually taken in routing void problem in geographical routing in high control overhead and transmission delay .The routing void protocol is proposed in this paper is efficient bypassing void routing protocol. This protocol based on virtual co-ordinates is to transform a structure of random process in virtual circle .The circle are composed by void edge in to by mapping of edge nodes. In this paper to used the greedy forwarding algorithm. This algorithm can be process on virtual circle. The virtual circle greedy forwarding failing on routing void process. There are forwarding process are source to destination. The proposed protocol as find the shortest path, long transmission and High quality link maintenance. Keywords: void routing, geographical, routing protocol. I. INTRODUCTION The wireless sensor networks fields one of the key technologies is routing protocol. The sensor nodes are path depending on the location information of routing geographic. The WSNs is large scale wide application of geographic routing. The geographic information is more efficient, high expansibility and low influence. The sensor nodes are encountered of random distribution from result. The greedy forwarding algorithm in routing will fails, in such situation data transmission also fails. The simple principle of greedy forwarding is low complexity. The virtual circle to solve the routing void problem makes in greedy forwarding algorithm. This algorithm works in forwarding process. In this way of reduce overhead control packet and energy consumption can be reduced. The existing system OLSR protocol is nodes are banned from the selected nodes in order to prevent the routing void. The transmission information path between source and destination is achieved the few hops. In each and every transmission is no need to full information in hop. A. Problem definitions The sensor nodes are modeled by unit graph. The all nodes with in communication ranges RC and nodes n are links in bidirectional. Routing is an important issue that affects wireless sensor networks. Geographic routing uses the physical location as the node address. The source node determines the destination address by looking it up from the location server or by computing it using a hash function in a data-centric storage scheme. The node usually forwards the packet to a neighbor closer to the destination. This, however, may take the packet to a dead-end node, that is, a node with no neighbor closer to the destination. In GPSR and GFG routing, the FACE algorithm is used on a planar graph to deal with the dead-end node problem. In addition, GSR routing and a combination of the FACE algorithm and the shortcut-based procedure are proposed to improve routing efficiency. GSR routing builds a planar routing sub graph, termed the Restricted Delaunay Graph (RDG), such that a path exists whose distance, in terms of the Euclidean distance or hop distance, in RDG is only the constant times to the minimum distance between any pair of nodes. Geographic routing protocols require nodes to have geographic information that is obtained with difficulty in wireless sensor networks because devices that operate via the geographic positioning system (GPS) consume a large amount of power and do not work indoors.Routing protocols based on virtual coordinates that operate without the GPS assistance are proposed in wireless sensor networks. Through an iterative procedure, a relaxation algorithm assigns virtual coordinates to nodes that are close to their physical locations, consuming, in the process, a great deal of message broadcast overhead. In the distance between any two nodes is first estimated by an all-pair, shortest-paths algorithm. Subsequently, multidimensional scaling (MDS) is used to derive node locations that fit the estimated distances. In seed nodes are preprogrammed with their physical locations. Each node finds its location by determining the shortest hop counts to seed nodes and using the least square error method. In the locations of sensor nodes are estimated by mobile robots that collect the signal strength of the messages sent by sensors. However, these methods do not guarantee packet delivery because the FACE algorithm cannot be used to solve the dead-end node problem due to the local error in the virtual coordinate assignment. B. Void routing in geographic The geographic routing is greedy forwarding adopted can be interrupted due to radio coverage. The greedy algorithm in range of communication causes of greedy forwarding failing. The sensor nodes are tries to forward the one neighbor nodes to other destination nodes. A routing void is encountered by nodes doesn’t exist. In such situation greedy forwarding can be fails. As show in Fig.1 node n, the packet tires to forward a destination node d1.The node n2 is set of {n1, n3, n4} closer to the destination d1. A routing void is encountered by node n5, tires to packet forward to destination node d2.The packet can arrival the d1 with paths of n5,n6,n7,d1 without routing problems. II. RELATED WORKS
  • 2. Integrated Intelligent Research (IIR) International Journal of Business Intelligents Volume: 05 Issue: 01 June 2016 Page No.65-68 ISSN: 2278-2400 66 The structure component of every edge nodes are only two neighbor nodes on the circle. The all edge nodes are around the obstacle distance to point 0. R is a constant. The edge nodes are locate on center point 0 and radius R. Many difficulties associated with Virtual Coordinate System (VCS) based schemes are attributable to lack of information about the physical network. Layout information such as physical voids and relative positions of sensor nodes with respect to X-Y directions are absent. Even though VCS is based on connectivity, explicit information on hop distances between pairs of nodes is not available and difficult to estimate. Absence of connectivity information, on the other hand, is the cause for many problems in physical domain routing. Combining connectivity based information in VCS and position or direction information in a network essentially would combine the advantages of VCR and GR schemes. However, this has to be done without inheriting the need for accurate and costly node localization. Our approach is based on the use of topology preserving maps, derived using virtual coordinates alone, for geographic information instead of physical locations. This way, we are able to combine the advantages of physical and logical routing schemes without inheriting their disadvantages. No such scheme is currently available. Geographic-Logical Routing (GLR), transforms the set of VCs to a set of Cartesian coordinates (2D topological coordinates)and switches between Geographic Routing that use Cartesian coordinates and Logical Routing that use virtual coordinates to achieve higher routability. We demonstrate that the topology maps are actually more useful than Geographic maps for WSN routing as the topology coordinates more accurately select the neighbor to forward the packet to than the geographic coordinates.Traditional ad hoc routing protocols are not a good fit for Wireless Sensor Networks (WSN) for the following reasons. WSNS often require data dissemination patterns that are not efficiently mapped to the unicast connections assumed by ad hoc protocols. Further, nodes need to maintain routing state specific to destinations of active routes; this state may become invalid due to changes that are not near to the node. Finally, because of the need to maintain non-local state, this approach requires that the nodes have globally unique identifiers. As a result, this approach is not ideal for WSNs which favor routing protocols that support data-centric operation, localized interactions and supporting arbitrary data-driven dissemination with in-network processing. In contrast to traditional ad hoc protocols. Geographical routing algorithms provides attractive properties for WSNs. In these algorithms, nodes exchange location information with their neighbors. Packets addressed to a destination must provide its location. At every intermediate hop, the subset of the neighbors that are closer to the destination is called the forwarding set. Routing simply forwards a packet to one of the nodes in the forwarding set. This process is repeated greedily until the packet reaches the destination. Thus, interactions are localized to location exchange with direct neighbors and there is no need for global identifiers. The main steps of entire process are A. Void Detecting Phase B. The main function of the void detecting phase is to collect edge node information around the routing void after the void is encountered. B. Virtual Coordinate Mapping Phase The virtual coordinate mapping phase is responsible for mapping the edge node coordinates stored in the detecting packed to a virtual circle, i.e., converting a structure composed of edge nodes to the structure without routing void . Fig. No. 3 virtual coordinate mapping C. Void Region Dividing Phase The main function of the void region dividing phase is to divide the surrounding area of the void into three different regions, in which different routing strategies are applied. According to the void position and the location of destination node of the packets, the surrounding area of a void is divided into approaching region, departing region and free region. Fig. No. 3 Void region Diving phase After implementing the three phases above, the edge nodes of void contain two types of location information which are geographic coordinates and virtual coordinates, and that surrounding area of routing void has been divided into three different regions according to the destination node. III. PROPOSED SYSTEM The proposed system also maintains the partial path information of previous transmission. The link quality of with all the neighbors is checked periodically and so the base station communication is reduced. Like existing system, the optimal routing path between the source and the destination is achieved with fewest hops. No need of full hop information calculation for each and every transmission. The proposed system aims to find the shortest path, each individual hop usually has long transmission distance with high quality link maintenance. In a WSN, it is prohibitive to implement the table-driven shortest path routing (SPR), which requires per-destination states maintained
  • 3. Integrated Intelligent Research (IIR) International Journal of Business Intelligents Volume: 05 Issue: 01 June 2016 Page No.65-68 ISSN: 2278-2400 67 by individual nodes. When the network scales to thousands of nodes, the large size routing tables containing thousands of entries may not be affordable to resource - constrained sensors. The conflict between the large size network with a random structure and the small routing table affordable to a sensor node raises fundamental challenges to point-to-point routing in WSNs. This project proposed an efficient bypassing void routing protocol based on virtual coordinates. The basic idea of the protocol is to transform a random structure composed of void edges into a regular one by mapping edge nodes coordinates to a virtual circle. By utilizing the virtual circle, the greedy forwarding can be prevented from failing, so that there is no routing void in forwarding process from source to destination and control overhead can be reduced. Furthermore, the virtual circle is beneficial to reduce average length of routing paths and decrease transmission delay. The proposed protocol has higher delivery ratio, shorter path length, less control packet overhead, and energy consumption.It is believed that almost all the system objectives that have been planned at the commencement of the software development have been net with and the implementation process of the project is completed. A trial run of the system has been made and is giving good results the procedures for processing is simple and regular order. The application eliminates the difficulties in the existing system. It is developed in a user-friendly manner. The application is very fast and any transaction can be viewed or retaken at any level. Error messages are given at each level of input of individual stages. This software is very particular in reducing the difficulty in analyzing the router algorithms. The application works well for given tasks in network environment. Any node with .Net framework installed can execute the application.After implementing the three phases above, the edge nodes of void contain two types of location information which are geographic coordinates and virtual coordinates, and that surrounding area of routing void has been divided into three different regions according to the destination node. Discovery node restarts greedy mode by utilizing the virtual coordinates, the packet stored in the first phase is forwarded to relay nodes. In the greedy mode, the ways to select relay node in three regions are different, but they all use the greedy algorithm. IV. SYSTEM DESIGN AND IMPLEMENTATION Fig. No. 3 Architecture Diagram A. ENHANCED ROUTING PROTOCOLS Along with existing system implementation, the proposed system also maintains the partial path information of previous transmission. The link quality of with all the neighbors is checked periodically and so the base station communication is reduced. Like existing system, the optimal routing path between the source and the destination is achieved with fewest hops. No need of full hop information calculation for each and every transmission. The proposed system aims to find the shortest path, each individual hop usually has long transmission distance with high quality link maintenance. B. PROTOCOL ANALYSIS 1) Routing Path Analysis: According to the description of section III.B, after the virtual coordinate mapping phase, the neighbors of the edge nodes around the routing void receive the broadcasting messages. These neighbor nodes have the opportunity to establish a short path by utilizing the routing void information before void is encountered. As shown in the node tries to send a packet to a destination node. After sends the packet to by greedy algorithm, a routing void is encountered at node.If face forwarding is adopted to solve routing void problem,it is always activated at the edge node 2) Control Overhead Analysis: Assuming the length of control packet header in the greedy algorithm is Lg, the lengths of detecting packet and distributing packet in BVR-VCM are Lde and Ldi respectively, the edge node number of routing void is Ns the average number of hops from source to destination is hBVR-VCM. When n packets are sent, the length of the control packet is (Lde + Ldi ) × Ns + Lg × hBVR-VCM × n The average overhead of the control packet for each packet is LBVR-VCM = (Lde + Ldi ) × Ns/n + Lg × hBVR-VCM As shown in when the number of packets increases, the average overhead is approximately equal that in greedy algorithm: LBVR- VCM ≈ Lg × hBVR-VCM (9) Comparing with protocol based on face forwarding, assuming the length of control packet header in the greedy algorithm is L f , the proportion of the greedy algorithm is g, and the average number of hops from source to destination is hg. When n packets are sent, the length of control packet is (Lg × g + L f (1 − g)) × hg × n The average overhead of the control packet for each packet is LFACE = (Lg × g + L f × (1 − g)) × hg Since 0 < g < 1, L f > Lg, and hBVR-VCM ≤ hg learnt from section IV.A, then Lg × hBVR-VCM ≤ Lg × hg < LFACE < L f × hg. For the same fixed wireless sensor network, g is constant. In this condition, no matter how many packets are send, LFACE is constant, the value range of LFACE is . While LBVR-VCM decreases as the increasing of the packets sent. So there exists a value named nc, if n > nc, there is LBVR-VCM < LFACE, at this point the control packet in BVR-VCM is always smaller than that in the face forwarding protocol.
  • 4. Integrated Intelligent Research (IIR) International Journal of Business Intelligents Volume: 05 Issue: 01 June 2016 Page No.65-68 ISSN: 2278-2400 68 REFERENCE [1] B. Karp and H.T. Kung, “GPSR: Greedy Perimeter Stateless Routing for Wireless Networks,” Proc. MobiCom, 2000. [2] M. Mauve, J. Widmer, and H. Hartenstein. A Survey on Position-Based Routing in Mobile Ad-Hoc Networks. IEEE Network, 15(6), 2001. [3] F. Kuhn, R. Wattenhofer, Y. Zhang, and A. Zollinger, “Geometric Ad-Hoc Routing: Of Theory and Practice,” Proc. Ann. Symp. Principles of Distributed Computing (PODC), 2003. [4] H. Frey and I. Stojmenovic, “On Delivery Guarantees of Face and Combined Greedy-Face Routing in Ad Hoc and Sensor Networks,” Proc. MobiCom, pp. 390-401, 2006. [5] Z. Zhong and T. He, “Achieving Range-Free Localization beyond Connectivity,” Proc. ACM Conf. Embedded Networked Sensor Systems (SenSys), 2009. [7] T. He, C. Huang, B.M. Blum, J.A. Stankovic, and T. Abdelzaher, “Range-Free Localization Schemes for Large Scale Sensor Net-works,” Proc. MobiCom, pp. 81-95, 2003. [6] D.S.J.D. Couto, D. Aguayo, J. Bicket, and R. Morris, “A High-Throughput Path Metric for Multi-Hop Wireless Routing,” Proc. MobiCom, pp. 134- 146, 2003. [7] Y.-J. Kim, R. Govindan, B. Karp, and S. Shenker, “Geographic Routing Made Practical,” Proc. Conf. Symp. Networked Systems Design and Implementation (NSDI), vol. 2, pp. 217-230, 2005. [8] B. Leong, B. Liskov, and R. Morris, “Geographic Routing without Planarization,” Proc. Conf. Networked Systems Design and Implementation (NSDI), vol. 3, pp. 339-352, 2006. [9] T. He, C. Huang, B. M. Blum, J. A. Stankovic. Range-free Localization Schemes in Large-scale Sensor Networks. In MobiCom’03 [10] N. Bulusu, J. Heidemann, D. Estrin and T. Tran. Self-configuring localization systems: Design and Experimental Evaluation. ACM Transon Embedded Comp. Sys., 2004, 3(1). [11] S. Basagni, I. Chlamtac, V. R. Syrotiuk, and B. A. Woodward. A distance routing effect algorithm for mobility (DREAM). In ACM/IEEE International Conference on Mobile Computing and Networking (Mobicom'98), pages 76-84, 1998. [12] J. C. Lin. Biological aspects of mobile communication data. Wireless Networks, 3(6):439-453, 1997. [13] ZAUMEN,W., AND GARCIA-LUNA ACEVES, J. Dynamics of distributed shortest-path routing algorithms. In Proceedings of the SIGCOMM ’91 Conference on Communications Architectures, Protocols and Applications (Sept. 1991), pp. 31–42. [14] BROCH,J.,MALTZ,D.,JOHNSON,D.,HU,Y., AND JETCHEVA, J. A performance comparison of multi-hop wireless ad hoc network routing protocols. In Proceedings of the Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom ’98) (Dallas, Texas, USA, Aug. 1998).