SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 517
DISCOVERING ADAPTIVE WIRELESS SENSOR NETWORK USING
β-SYNCHRONIZER
Pradhnya S. Kalaskar1
, Prachi Jaini2
1
Department of Computer Science & Engineering, G. H. Raisoni College of Engineering, Nagpur-16, India
2
Department of Computer Science & Engineering, G. H. Raisoni College of Engineering, Nagpur-16, India
Abstract
When we consider the standard Bellman-Ford algorithm, it uses static values of link cost function and distance function. These static
values are stored in sink node so that the sink node requires memory to keep data safe. Therefore the space, message and time
complexity of a network and node increases. To overcome this we discover Fast Time Dependent Shortest Path algorithm with
message and used in network with β synchronizer. The FTSP algorithm uses dynamic values of link cost function and distance
function and to store these values we are using vector compression method so that there is no need to store the data into the sink node.
Because of this the message, time and space complexity of node will be decreases.
Keywords- Duty cycle, Time dependent, β synchronizer
------------------------------------------------------------------------***---------------------------------------------------------------------
1. INTRODUCTION
When we consider the traditional MAC protocols which are
used to maximize the packet throughput, provide fairness, and
minimize latency. But it consumes more power in wireless
sensor network where the energy is an important constraint. To
reduce the energy consumption of a node there is strong
requirement of reducing the latency of a node, reducing the
average time required o complete one duty cycle and total
message count which are used to update the node information.
There are various sources which are used in wireless sensor
network but it consumes huge amount of energy for example
overhearing, collision of packets, idle listening and control
packet overhead [10]. Because of this the valuable data will be
affected from the network while communication is going on.
The budget of wireless sensor network is very limited so that it
is not possible to maintain the communication with central
coordinator. This type of network topology is partitioned and
time-dependent. The time factor is most important in wireless
sensor network hence synchronization between nodes in the
network should be strong.
For designing the adaptive network the shortest path algorithm
should be strong so that it will help to reduce the power
consumption of a node, message, space and time complexity of
a sink node. In wireless sensor network the sink node is
responsible for whole communication from source to
destination. Sink node stores the all necessary information of a
node like IP-address of source and destination, link updates,
network update. To store such type of information the sink node
requires the enough memory.
In our proposed FTSP algorithm there are two stages for
constructing shortest path, first stage is building spanning tree
and in the second stage calculating the shortest path and sends
an acknowledgement to the sink node.
The FTSP algorithm works with the β synchronizer. β
synchronizer is a special type of synchronizer used to broadcast
the packets in the network and to decrease the message
complexity of asynchronous systems [1]. The β synchronizer
has an initialization phase in which nodes are initialized in the
network, from which one leader node is selected and the
spanning tree is rooted around this leader. After execution of
one phase the leader node learns that all the nodes in the
network are “safe” and then broadcasts the message along the
spanning tree. All the nodes in the network then generate new
clock pulse. After that β synchronizer learns that all the nodes
in the network are safe or not once it is cleared then it sends an
acknowledgement to the parent node [1].
2. RELATED WORK
The time dependent shortest path algorithm was first studied for
GPS navigation and for centralized approach. It defines the two
different policies for time dependent shortest path one is
waiting policy and second is non waiting policy. Waiting means
wait for data to be delivered to the destination. The non waiting
means the sender sends the packet over network when the
receiver awake [1].
Low power listening was used by CSMA based technology to
achieve the low power communication. The B-MAC uses the
independent sleep and awake mechanism for scheduling. But B-
MAC consumes the energy and it also surpasses the existing
latency and throughput.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 518
To overcome this disadvantage the XMAC and DSP-MAC was
proposed with short preamble for replacing the long preamble
in B-MAC. To overcome the overhearing problem, the
receiver’s information was also embedded in short preamble
[1].
Based on the node’s residual energy adaptive low power
listening was proposed in [15]. ALPL supports point-to-point
latency and time dependent link cost.
Delay is also an important factor for routing in wireless sensor
network. Routing becomes too difficult in wireless sensor
network because of two reasons one by changing in
transmission latency and other one is intermittent connection
between two neighbour nodes.
To overcome this disadvantage the on demand routing approach
was proposed which were used the probe messages for
determining the least latency route.
3. PROPOSED WORK
3.1 Maintaining the Dynamic Route
When we consider the static network the sink node require to
store the route information so that when the link changes or
node changes its duty cycle or if it also joins any dynamic
network, the link which is connecting to all nodes in the
network will be changed multiple times. Therefore the sink
node will be overloaded and multiple links will be affected.
To maintain the dynamic route of a multicast network our
proposed algorithm stores only the route information in the sink
node, when one node updated the other node does not update
the path for whole multicast network but it updates the
necessary nodes in the network.
First the network identifies the node which needs to be updated
and after that the FTSP updates the shortest path for this
identified node.
3.2 Router
Router is used to route the packet from source to destination in
the network. It is consist of source node, destination node and
13 nodes from N1 to N13. The router stores information of a
network in a database. In this database it stores attacker details
like hacker which specify whether any attack is occurred in the
network or not. The IP-address field shows the IP-address of
the node on which attack is occurred. Node name tells the node
number on which attack is occurred. The date field display the
date and time of attack is occurred.
The node status details shows the detail information of node
name, destination node, digital signature which are used for
security and keep the information of whether any active or
passive attack is occurred in the network or not. It also keep the
node compromising attacker details like if there is any attack
occurred then it shows yes otherwise it displays no.
Fig. 1 Router with nodes from N1 to N13
3.3 Sender
Sender module has the browse button which selects the file
from the system to forward to the destination. The initialize
node button is then used to initialize the nodes in the network
by accepting the IP-address of both the sender and receiver.
After that the nodes will be initialized in the network.
The submit button is used to submit the data in the network and
starts packet forwarding. When the packet is reach to the
destination the popup window shows the message that the file is
reach to the destination.
3.4 Destination
The destination window shows the file which is reached to the
destination. And save this file into the receiver folder.
Fig. 2 Simulation of packet transmission with shortest path
from source to destination
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 519
3.5 Passive Attacker
The passive attacker is the attacker who can make attack on the
node while communication is going on. When this attack is
detected on the router, the router blocks that node and the sink
hole is created.
3.6 Active Attacker
The active attacker is the known attacker who can make the
attack while communication is going on. When this attack is
detected on the router, the router blocks that node and the sink
hole is created.
3.7 Node Compromising Attack
When the node compromising attack is occurred in the network,
the network then chooses the other safe node for forwarding the
packet to the destination.
4. RESULTS
Fig. 3 FTSP takes minimum time comparing to TD-Bellman
Ford and DSSP1.
Fig. 4 When nodes change the input the FTSP-M takes less
memory as compared to DSDV and Full Dynamic system.
Fig. 5 when network size increases FTSP takes less average
time to complete the process.
5. CONCLUSIONS
In this paper we have studied the actual simulation results
which show that the FTSP algorithm with β synchronizer
decreases message, space and time complexity of the multicast
WSN as compared to the traditional Bellman Ford algorithm.
For decreasing the time, space and message complexity of a
node we also studied the distributed shortest path routing
problem in duty cycled wireless sensor network using β
synchronizer and adaptive duty cycle.
REFERENCES
[1] S. Lai and B. Ravindran, “Least-Latency Routing over
Time Dependent Wireless Sensor Networks,” in IEEE
transaction 2013
[2] S. Lai and B. Ravindran, “On Distributed Time-
Dependent Shortest Paths over Duty-Cycled Wireless
Sensor Networks,” in IEEE INFOCOM, 2010
[3] B. Ding, J.X. Yu, and L. Qin, “Finding Time-Dependent
Shortest Paths over Large Graphs,” Proc. 11th Int’l
Conf. Extending Database Technology (EDBT ’08), pp.
205-216, 2008
[4] L. Su, C. Liu, H. Song, and G. Cao, “Routing in
Intermittently Connected Sensor Networks,” in IEEE ,
2008.
[5] Y. Gu, T. He, M. Lin, and J. Xu, “Spatiotemporal Delay
Control for Low-Duty-Cycle Sensor Networks,” in
IEEE, 2009
[6] G.F. Italiano, “Distributed Algorithms for Updating
Shortest Paths (Extended Abstract),” Proc. Fifth Int’l
Workshop Distributed Algorithms 2000.
[7] S.Lai, B. Zhang, B. Ravindran, and H.Cho, “CQS-Pair:
Cyclic Quorum System Pair for Wakeup Scheduling in
Wireless Sensor Networks,” 2008.
[8] P. Sommer and R. Wattenhofer, “Gradient Clock
Synchronization in Wireless Sensor Networks,” In ACM
2009.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 520
[9] Y.Sun, O. Gurewitz, and D.B. Johnson, “RI-MAC: A
Receiver Initiated Asynchronous Duty Cycle MAC
Protocol for Dynamic Traffic Loads in Wireless Sensor
Networks,” In ACM, 2008.
[10] W. Ye, J. Heidemann, and D. Estrin, “Medium Access
Control With Coordinated Adaptive Sleeping for
Wireless Sensor Networks,” In IEEE/ACM Transaction
2004.
[11] T.V. Dam and K. Langendoen, “An Adaptive Energy-
Efficient Mac Protocol for Wireless Sensor Networks,”
in ACM 2003.
[12] M. Zuniga and B. Krishnamachari, “Analyzing the
Transitional Region in Low Power Wireless Links,” in
IEEE 2004
[13] C. Schurgers and M.B. Srivastava,“Energy Efficient
Routing in Wireless Sensor Networks,” 2001.
[14] A. Woo, T. Tong, and D. Culler, “Taming the
Underlying Challenges of Reliable Multihop Routing in
Sensor Networks,” 2003.
[15] C.M. Vigorito, D. Ganesan, and A.G. Barto, “Adaptive
Control of Duty Cycling in Energy-Harvesting Wireless
Sensor Networks,” 2007
[16] K.L. Cooke and E. Halsey, “The Shortest Route through
a Network with Time-Dependent Internodal Transit
Times,” J. Math Analysis Application 1966
[17] A. Orda and R. Rom, “Distributed Shortest-Path
Protocols for Time-Dependent Networks,” Distributed
Computing, 1996.
[18] C. Serafino, D. Gabriele, F. Daniele, and N. Umberto,
“A Fully Dynamic Algorithm for Distributed Shortest
Paths,” Theoretical Computer Science, 2003
[19] S. Haldar, “An “All Pairs Shortest Paths” Distributed
Algorithm Using 2n2 Messages,” J. Algorithms, 1997
[20] K.V.S. Ramarao and S. Venkatesan, “On Finding and
Updating Shortest Paths Distributively,” J. Algorithms,
1992
[21] B. Awerbuch, “Complexity of Network
Synchronization,” J. ACM, 1985

Weitere ähnliche Inhalte

Was ist angesagt?

Mlrt an mysterious location based efficient routing protocol in manets
Mlrt an mysterious location based efficient routing protocol in manetsMlrt an mysterious location based efficient routing protocol in manets
Mlrt an mysterious location based efficient routing protocol in manetseSAT Publishing House
 
An mysterious location based efficient routing protocol in manets
An mysterious location based efficient routing protocol in manetsAn mysterious location based efficient routing protocol in manets
An mysterious location based efficient routing protocol in manetseSAT Journals
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECYogesh Fulara
 
Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Editor IJARCET
 
Limiting the energy drain in wireless ad hoc sensor networks
Limiting the energy drain in wireless ad hoc sensor networksLimiting the energy drain in wireless ad hoc sensor networks
Limiting the energy drain in wireless ad hoc sensor networkseSAT Publishing House
 
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkIJERD Editor
 
Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...eSAT Publishing House
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...Jyoti Parashar
 
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...ijceronline
 
An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...IAEME Publication
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsVirendra Thakur
 

Was ist angesagt? (20)

Mlrt an mysterious location based efficient routing protocol in manets
Mlrt an mysterious location based efficient routing protocol in manetsMlrt an mysterious location based efficient routing protocol in manets
Mlrt an mysterious location based efficient routing protocol in manets
 
An mysterious location based efficient routing protocol in manets
An mysterious location based efficient routing protocol in manetsAn mysterious location based efficient routing protocol in manets
An mysterious location based efficient routing protocol in manets
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
 
Black Hole Attack Detection using Fuzzy Logic
Black Hole Attack Detection using Fuzzy LogicBlack Hole Attack Detection using Fuzzy Logic
Black Hole Attack Detection using Fuzzy Logic
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEEC
 
Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937Ijarcet vol-2-issue-3-933-937
Ijarcet vol-2-issue-3-933-937
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
 
Limiting the energy drain in wireless ad hoc sensor networks
Limiting the energy drain in wireless ad hoc sensor networksLimiting the energy drain in wireless ad hoc sensor networks
Limiting the energy drain in wireless ad hoc sensor networks
 
Grayhole
GrayholeGrayhole
Grayhole
 
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...A adaptive neighbor analysis approach to detect cooperative selfish node in m...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...
 
Ijnsa050209
Ijnsa050209Ijnsa050209
Ijnsa050209
 
L45026571
L45026571L45026571
L45026571
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
 
An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 

Andere mochten auch

Surface morphology of mg f2yf3 multi layer thin films
Surface morphology of mg f2yf3 multi layer thin filmsSurface morphology of mg f2yf3 multi layer thin films
Surface morphology of mg f2yf3 multi layer thin filmseSAT Publishing House
 
Flexural characteristics of sfrscc and sfrnc one way
Flexural characteristics of sfrscc and sfrnc one wayFlexural characteristics of sfrscc and sfrnc one way
Flexural characteristics of sfrscc and sfrnc one wayeSAT Publishing House
 
Adapting singlet login in distributed systems
Adapting singlet login in distributed systemsAdapting singlet login in distributed systems
Adapting singlet login in distributed systemseSAT Publishing House
 
A remote monitoring system for a three phase 10-kva switchable distribution t...
A remote monitoring system for a three phase 10-kva switchable distribution t...A remote monitoring system for a three phase 10-kva switchable distribution t...
A remote monitoring system for a three phase 10-kva switchable distribution t...eSAT Publishing House
 
Effect of modulus of masonry on initial lateral stiffness of infilled frames ...
Effect of modulus of masonry on initial lateral stiffness of infilled frames ...Effect of modulus of masonry on initial lateral stiffness of infilled frames ...
Effect of modulus of masonry on initial lateral stiffness of infilled frames ...eSAT Publishing House
 
“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...eSAT Publishing House
 
Green cast demonstration of innovative lightweight construction components ma...
Green cast demonstration of innovative lightweight construction components ma...Green cast demonstration of innovative lightweight construction components ma...
Green cast demonstration of innovative lightweight construction components ma...eSAT Publishing House
 
Review on “service granularity in service oriented
Review on “service granularity in service orientedReview on “service granularity in service oriented
Review on “service granularity in service orientedeSAT Publishing House
 
Analysis of economic load dispatch using fuzzified pso
Analysis of economic load dispatch using fuzzified psoAnalysis of economic load dispatch using fuzzified pso
Analysis of economic load dispatch using fuzzified psoeSAT Publishing House
 
Co axial fed microstrip rectangular patch antenna
Co axial fed microstrip rectangular patch antennaCo axial fed microstrip rectangular patch antenna
Co axial fed microstrip rectangular patch antennaeSAT Publishing House
 
Cfd simulation of single stage axial flow compressor
Cfd simulation of single stage axial flow compressorCfd simulation of single stage axial flow compressor
Cfd simulation of single stage axial flow compressoreSAT Publishing House
 
A detection technique of signal in mimo system
A detection technique of signal in mimo systemA detection technique of signal in mimo system
A detection technique of signal in mimo systemeSAT Publishing House
 
Novel technique for maximizing the thermal efficiency
Novel technique for maximizing the thermal efficiencyNovel technique for maximizing the thermal efficiency
Novel technique for maximizing the thermal efficiencyeSAT Publishing House
 
A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...eSAT Publishing House
 
Behaviour of bituminous concrete modified with polyethylene glycol for blade ...
Behaviour of bituminous concrete modified with polyethylene glycol for blade ...Behaviour of bituminous concrete modified with polyethylene glycol for blade ...
Behaviour of bituminous concrete modified with polyethylene glycol for blade ...eSAT Publishing House
 
Studies on pyrolysis of spent engine oil in a quartz load cell
Studies on pyrolysis of spent engine oil in a quartz load cellStudies on pyrolysis of spent engine oil in a quartz load cell
Studies on pyrolysis of spent engine oil in a quartz load celleSAT Publishing House
 
Extreme software estimation (xsoft estimation)
Extreme software estimation (xsoft estimation)Extreme software estimation (xsoft estimation)
Extreme software estimation (xsoft estimation)eSAT Publishing House
 
A fusion of soft expert set and matrix models
A fusion of soft expert set and matrix modelsA fusion of soft expert set and matrix models
A fusion of soft expert set and matrix modelseSAT Publishing House
 
Experimental investigations of diesel engine using fish oil biodiesel and its...
Experimental investigations of diesel engine using fish oil biodiesel and its...Experimental investigations of diesel engine using fish oil biodiesel and its...
Experimental investigations of diesel engine using fish oil biodiesel and its...eSAT Publishing House
 

Andere mochten auch (20)

Surface morphology of mg f2yf3 multi layer thin films
Surface morphology of mg f2yf3 multi layer thin filmsSurface morphology of mg f2yf3 multi layer thin films
Surface morphology of mg f2yf3 multi layer thin films
 
I am secure android application
I am secure android applicationI am secure android application
I am secure android application
 
Flexural characteristics of sfrscc and sfrnc one way
Flexural characteristics of sfrscc and sfrnc one wayFlexural characteristics of sfrscc and sfrnc one way
Flexural characteristics of sfrscc and sfrnc one way
 
Adapting singlet login in distributed systems
Adapting singlet login in distributed systemsAdapting singlet login in distributed systems
Adapting singlet login in distributed systems
 
A remote monitoring system for a three phase 10-kva switchable distribution t...
A remote monitoring system for a three phase 10-kva switchable distribution t...A remote monitoring system for a three phase 10-kva switchable distribution t...
A remote monitoring system for a three phase 10-kva switchable distribution t...
 
Effect of modulus of masonry on initial lateral stiffness of infilled frames ...
Effect of modulus of masonry on initial lateral stiffness of infilled frames ...Effect of modulus of masonry on initial lateral stiffness of infilled frames ...
Effect of modulus of masonry on initial lateral stiffness of infilled frames ...
 
“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...“Optimizing the data transmission between multiple nodes during link failure ...
“Optimizing the data transmission between multiple nodes during link failure ...
 
Green cast demonstration of innovative lightweight construction components ma...
Green cast demonstration of innovative lightweight construction components ma...Green cast demonstration of innovative lightweight construction components ma...
Green cast demonstration of innovative lightweight construction components ma...
 
Review on “service granularity in service oriented
Review on “service granularity in service orientedReview on “service granularity in service oriented
Review on “service granularity in service oriented
 
Analysis of economic load dispatch using fuzzified pso
Analysis of economic load dispatch using fuzzified psoAnalysis of economic load dispatch using fuzzified pso
Analysis of economic load dispatch using fuzzified pso
 
Co axial fed microstrip rectangular patch antenna
Co axial fed microstrip rectangular patch antennaCo axial fed microstrip rectangular patch antenna
Co axial fed microstrip rectangular patch antenna
 
Cfd simulation of single stage axial flow compressor
Cfd simulation of single stage axial flow compressorCfd simulation of single stage axial flow compressor
Cfd simulation of single stage axial flow compressor
 
A detection technique of signal in mimo system
A detection technique of signal in mimo systemA detection technique of signal in mimo system
A detection technique of signal in mimo system
 
Novel technique for maximizing the thermal efficiency
Novel technique for maximizing the thermal efficiencyNovel technique for maximizing the thermal efficiency
Novel technique for maximizing the thermal efficiency
 
A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...
 
Behaviour of bituminous concrete modified with polyethylene glycol for blade ...
Behaviour of bituminous concrete modified with polyethylene glycol for blade ...Behaviour of bituminous concrete modified with polyethylene glycol for blade ...
Behaviour of bituminous concrete modified with polyethylene glycol for blade ...
 
Studies on pyrolysis of spent engine oil in a quartz load cell
Studies on pyrolysis of spent engine oil in a quartz load cellStudies on pyrolysis of spent engine oil in a quartz load cell
Studies on pyrolysis of spent engine oil in a quartz load cell
 
Extreme software estimation (xsoft estimation)
Extreme software estimation (xsoft estimation)Extreme software estimation (xsoft estimation)
Extreme software estimation (xsoft estimation)
 
A fusion of soft expert set and matrix models
A fusion of soft expert set and matrix modelsA fusion of soft expert set and matrix models
A fusion of soft expert set and matrix models
 
Experimental investigations of diesel engine using fish oil biodiesel and its...
Experimental investigations of diesel engine using fish oil biodiesel and its...Experimental investigations of diesel engine using fish oil biodiesel and its...
Experimental investigations of diesel engine using fish oil biodiesel and its...
 

Ähnlich wie Discovering adaptive wireless sensor network using β synchronizer

Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Editor IJARCET
 
Proposed mac protocol for reduce energy consumption over wsn network
Proposed mac protocol for reduce energy consumption over wsn networkProposed mac protocol for reduce energy consumption over wsn network
Proposed mac protocol for reduce energy consumption over wsn networkeSAT Publishing House
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
 
An efficient routing approach for aggregated data transmission along with per...
An efficient routing approach for aggregated data transmission along with per...An efficient routing approach for aggregated data transmission along with per...
An efficient routing approach for aggregated data transmission along with per...eSAT Publishing House
 
Analysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetsAnalysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetseSAT Publishing House
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...eSAT Journals
 
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ijcsa
 
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET Journal
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET Journal
 
Power balancing optimal selective forwarding
Power balancing optimal selective forwardingPower balancing optimal selective forwarding
Power balancing optimal selective forwardingeSAT Publishing House
 
Implementation of dynamic source routing (dsr) in
Implementation of dynamic source routing (dsr) inImplementation of dynamic source routing (dsr) in
Implementation of dynamic source routing (dsr) ineSAT Publishing House
 
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)eSAT Journals
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a surveyFeatures of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a surveyeSAT Publishing House
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn     a surveyFeatures of wsn and various routing techniques for wsn     a survey
Features of wsn and various routing techniques for wsn a surveyeSAT Journals
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKIJNSA Journal
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksijasuc
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetIJTET Journal
 

Ähnlich wie Discovering adaptive wireless sensor network using β synchronizer (20)

Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581
 
Proposed mac protocol for reduce energy consumption over wsn network
Proposed mac protocol for reduce energy consumption over wsn networkProposed mac protocol for reduce energy consumption over wsn network
Proposed mac protocol for reduce energy consumption over wsn network
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 
An efficient routing approach for aggregated data transmission along with per...
An efficient routing approach for aggregated data transmission along with per...An efficient routing approach for aggregated data transmission along with per...
An efficient routing approach for aggregated data transmission along with per...
 
Analysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manetsAnalysis of multi hop relay algorithm for efficient broadcasting in manets
Analysis of multi hop relay algorithm for efficient broadcasting in manets
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...
 
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
 
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
 
Power balancing optimal selective forwarding
Power balancing optimal selective forwardingPower balancing optimal selective forwarding
Power balancing optimal selective forwarding
 
Implementation of dynamic source routing (dsr) in
Implementation of dynamic source routing (dsr) inImplementation of dynamic source routing (dsr) in
Implementation of dynamic source routing (dsr) in
 
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a surveyFeatures of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn a survey
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn     a surveyFeatures of wsn and various routing techniques for wsn     a survey
Features of wsn and various routing techniques for wsn a survey
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manet
 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
 
iPGCON14_134
iPGCON14_134iPGCON14_134
iPGCON14_134
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 

Mehr von eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

Mehr von eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Kürzlich hochgeladen

Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniquesugginaramesh
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 

Kürzlich hochgeladen (20)

Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 

Discovering adaptive wireless sensor network using β synchronizer

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 517 DISCOVERING ADAPTIVE WIRELESS SENSOR NETWORK USING β-SYNCHRONIZER Pradhnya S. Kalaskar1 , Prachi Jaini2 1 Department of Computer Science & Engineering, G. H. Raisoni College of Engineering, Nagpur-16, India 2 Department of Computer Science & Engineering, G. H. Raisoni College of Engineering, Nagpur-16, India Abstract When we consider the standard Bellman-Ford algorithm, it uses static values of link cost function and distance function. These static values are stored in sink node so that the sink node requires memory to keep data safe. Therefore the space, message and time complexity of a network and node increases. To overcome this we discover Fast Time Dependent Shortest Path algorithm with message and used in network with β synchronizer. The FTSP algorithm uses dynamic values of link cost function and distance function and to store these values we are using vector compression method so that there is no need to store the data into the sink node. Because of this the message, time and space complexity of node will be decreases. Keywords- Duty cycle, Time dependent, β synchronizer ------------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION When we consider the traditional MAC protocols which are used to maximize the packet throughput, provide fairness, and minimize latency. But it consumes more power in wireless sensor network where the energy is an important constraint. To reduce the energy consumption of a node there is strong requirement of reducing the latency of a node, reducing the average time required o complete one duty cycle and total message count which are used to update the node information. There are various sources which are used in wireless sensor network but it consumes huge amount of energy for example overhearing, collision of packets, idle listening and control packet overhead [10]. Because of this the valuable data will be affected from the network while communication is going on. The budget of wireless sensor network is very limited so that it is not possible to maintain the communication with central coordinator. This type of network topology is partitioned and time-dependent. The time factor is most important in wireless sensor network hence synchronization between nodes in the network should be strong. For designing the adaptive network the shortest path algorithm should be strong so that it will help to reduce the power consumption of a node, message, space and time complexity of a sink node. In wireless sensor network the sink node is responsible for whole communication from source to destination. Sink node stores the all necessary information of a node like IP-address of source and destination, link updates, network update. To store such type of information the sink node requires the enough memory. In our proposed FTSP algorithm there are two stages for constructing shortest path, first stage is building spanning tree and in the second stage calculating the shortest path and sends an acknowledgement to the sink node. The FTSP algorithm works with the β synchronizer. β synchronizer is a special type of synchronizer used to broadcast the packets in the network and to decrease the message complexity of asynchronous systems [1]. The β synchronizer has an initialization phase in which nodes are initialized in the network, from which one leader node is selected and the spanning tree is rooted around this leader. After execution of one phase the leader node learns that all the nodes in the network are “safe” and then broadcasts the message along the spanning tree. All the nodes in the network then generate new clock pulse. After that β synchronizer learns that all the nodes in the network are safe or not once it is cleared then it sends an acknowledgement to the parent node [1]. 2. RELATED WORK The time dependent shortest path algorithm was first studied for GPS navigation and for centralized approach. It defines the two different policies for time dependent shortest path one is waiting policy and second is non waiting policy. Waiting means wait for data to be delivered to the destination. The non waiting means the sender sends the packet over network when the receiver awake [1]. Low power listening was used by CSMA based technology to achieve the low power communication. The B-MAC uses the independent sleep and awake mechanism for scheduling. But B- MAC consumes the energy and it also surpasses the existing latency and throughput.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 518 To overcome this disadvantage the XMAC and DSP-MAC was proposed with short preamble for replacing the long preamble in B-MAC. To overcome the overhearing problem, the receiver’s information was also embedded in short preamble [1]. Based on the node’s residual energy adaptive low power listening was proposed in [15]. ALPL supports point-to-point latency and time dependent link cost. Delay is also an important factor for routing in wireless sensor network. Routing becomes too difficult in wireless sensor network because of two reasons one by changing in transmission latency and other one is intermittent connection between two neighbour nodes. To overcome this disadvantage the on demand routing approach was proposed which were used the probe messages for determining the least latency route. 3. PROPOSED WORK 3.1 Maintaining the Dynamic Route When we consider the static network the sink node require to store the route information so that when the link changes or node changes its duty cycle or if it also joins any dynamic network, the link which is connecting to all nodes in the network will be changed multiple times. Therefore the sink node will be overloaded and multiple links will be affected. To maintain the dynamic route of a multicast network our proposed algorithm stores only the route information in the sink node, when one node updated the other node does not update the path for whole multicast network but it updates the necessary nodes in the network. First the network identifies the node which needs to be updated and after that the FTSP updates the shortest path for this identified node. 3.2 Router Router is used to route the packet from source to destination in the network. It is consist of source node, destination node and 13 nodes from N1 to N13. The router stores information of a network in a database. In this database it stores attacker details like hacker which specify whether any attack is occurred in the network or not. The IP-address field shows the IP-address of the node on which attack is occurred. Node name tells the node number on which attack is occurred. The date field display the date and time of attack is occurred. The node status details shows the detail information of node name, destination node, digital signature which are used for security and keep the information of whether any active or passive attack is occurred in the network or not. It also keep the node compromising attacker details like if there is any attack occurred then it shows yes otherwise it displays no. Fig. 1 Router with nodes from N1 to N13 3.3 Sender Sender module has the browse button which selects the file from the system to forward to the destination. The initialize node button is then used to initialize the nodes in the network by accepting the IP-address of both the sender and receiver. After that the nodes will be initialized in the network. The submit button is used to submit the data in the network and starts packet forwarding. When the packet is reach to the destination the popup window shows the message that the file is reach to the destination. 3.4 Destination The destination window shows the file which is reached to the destination. And save this file into the receiver folder. Fig. 2 Simulation of packet transmission with shortest path from source to destination
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 519 3.5 Passive Attacker The passive attacker is the attacker who can make attack on the node while communication is going on. When this attack is detected on the router, the router blocks that node and the sink hole is created. 3.6 Active Attacker The active attacker is the known attacker who can make the attack while communication is going on. When this attack is detected on the router, the router blocks that node and the sink hole is created. 3.7 Node Compromising Attack When the node compromising attack is occurred in the network, the network then chooses the other safe node for forwarding the packet to the destination. 4. RESULTS Fig. 3 FTSP takes minimum time comparing to TD-Bellman Ford and DSSP1. Fig. 4 When nodes change the input the FTSP-M takes less memory as compared to DSDV and Full Dynamic system. Fig. 5 when network size increases FTSP takes less average time to complete the process. 5. CONCLUSIONS In this paper we have studied the actual simulation results which show that the FTSP algorithm with β synchronizer decreases message, space and time complexity of the multicast WSN as compared to the traditional Bellman Ford algorithm. For decreasing the time, space and message complexity of a node we also studied the distributed shortest path routing problem in duty cycled wireless sensor network using β synchronizer and adaptive duty cycle. REFERENCES [1] S. Lai and B. Ravindran, “Least-Latency Routing over Time Dependent Wireless Sensor Networks,” in IEEE transaction 2013 [2] S. Lai and B. Ravindran, “On Distributed Time- Dependent Shortest Paths over Duty-Cycled Wireless Sensor Networks,” in IEEE INFOCOM, 2010 [3] B. Ding, J.X. Yu, and L. Qin, “Finding Time-Dependent Shortest Paths over Large Graphs,” Proc. 11th Int’l Conf. Extending Database Technology (EDBT ’08), pp. 205-216, 2008 [4] L. Su, C. Liu, H. Song, and G. Cao, “Routing in Intermittently Connected Sensor Networks,” in IEEE , 2008. [5] Y. Gu, T. He, M. Lin, and J. Xu, “Spatiotemporal Delay Control for Low-Duty-Cycle Sensor Networks,” in IEEE, 2009 [6] G.F. Italiano, “Distributed Algorithms for Updating Shortest Paths (Extended Abstract),” Proc. Fifth Int’l Workshop Distributed Algorithms 2000. [7] S.Lai, B. Zhang, B. Ravindran, and H.Cho, “CQS-Pair: Cyclic Quorum System Pair for Wakeup Scheduling in Wireless Sensor Networks,” 2008. [8] P. Sommer and R. Wattenhofer, “Gradient Clock Synchronization in Wireless Sensor Networks,” In ACM 2009.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 520 [9] Y.Sun, O. Gurewitz, and D.B. Johnson, “RI-MAC: A Receiver Initiated Asynchronous Duty Cycle MAC Protocol for Dynamic Traffic Loads in Wireless Sensor Networks,” In ACM, 2008. [10] W. Ye, J. Heidemann, and D. Estrin, “Medium Access Control With Coordinated Adaptive Sleeping for Wireless Sensor Networks,” In IEEE/ACM Transaction 2004. [11] T.V. Dam and K. Langendoen, “An Adaptive Energy- Efficient Mac Protocol for Wireless Sensor Networks,” in ACM 2003. [12] M. Zuniga and B. Krishnamachari, “Analyzing the Transitional Region in Low Power Wireless Links,” in IEEE 2004 [13] C. Schurgers and M.B. Srivastava,“Energy Efficient Routing in Wireless Sensor Networks,” 2001. [14] A. Woo, T. Tong, and D. Culler, “Taming the Underlying Challenges of Reliable Multihop Routing in Sensor Networks,” 2003. [15] C.M. Vigorito, D. Ganesan, and A.G. Barto, “Adaptive Control of Duty Cycling in Energy-Harvesting Wireless Sensor Networks,” 2007 [16] K.L. Cooke and E. Halsey, “The Shortest Route through a Network with Time-Dependent Internodal Transit Times,” J. Math Analysis Application 1966 [17] A. Orda and R. Rom, “Distributed Shortest-Path Protocols for Time-Dependent Networks,” Distributed Computing, 1996. [18] C. Serafino, D. Gabriele, F. Daniele, and N. Umberto, “A Fully Dynamic Algorithm for Distributed Shortest Paths,” Theoretical Computer Science, 2003 [19] S. Haldar, “An “All Pairs Shortest Paths” Distributed Algorithm Using 2n2 Messages,” J. Algorithms, 1997 [20] K.V.S. Ramarao and S. Venkatesan, “On Finding and Updating Shortest Paths Distributively,” J. Algorithms, 1992 [21] B. Awerbuch, “Complexity of Network Synchronization,” J. ACM, 1985