SlideShare una empresa de Scribd logo
1 de 8
Descargar para leer sin conexión
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
DOI : 10.5121/ijcnc.2014.6408 91
A New Method for Controlling and Maintaining
Topology in Wireless Sensor Networks
Aminuddin Zabi1
, Touseef Yousuf2
and Aparna Manikonda3
Department of Computer Science Engineering
Nitte Meenakshi Institute of Technology, Bengaluru-64, India
ABSTRACT
Topology Control is an essential technique in a wireless sensor network to extend the operational time of
the sensor nodes. The goal of this technique is to maintain network connectivity and optimize performance
metrics such as network lifetime and throughput. In this paper we presented a new method for controlling
and maintaining topology in wireless sensor networks that show some improvement over the state of art
methods. The results are analyzed based on objective criteria.
KEYWORDS
Wireless Sensor Networks, ENR, Topology Control, Topology Construction, Topology Maintenance.
1. INTRODUCTION
A wireless sensor network is a reliant collection of nodes that communicate over relatively
bandwidth constrained wireless links. In general, topology control in sensor networks adjusts their
transmission ranges to conserve energy and reduce interference. In case of wireless sensor
networks the aspects which need to be considered while controlling topology are operation in
hostile environments, Data processing and scalability. A significant amount of research works [1-
4] have been done using non homogenous approaches such as location based, neighbor based and
direction based.
In this paper we devised a new method called ENR which stands for Energy-Neighbour-Range to
control and maintain topology in wireless sensor networks. Our approach is fully distributed,
asynchronous and generates a connected topology. The method is based on the principle of
maintaining the number of physical neighbours, transmission range and energy levels at each
node while constructing topology in order to improve the efficiency of the network.
The rest of the paper is organized as follows. Section 2 briefly describes the taxonomy of
topology control methods. Section 3 presents our working principle. Section 4 presents the
simulation environment and experimental results. Finally conclusions are drawn in Section 5.
2. TAXONOMY OF TOPOLOGY CONTROL
Topology control is an essential technique in Wireless sensor network which leads to
reorganizing and managing of certain node parameters and modes of operation from time to time
to modify the topology of the network with the goal of extending its lifetime while preserving
important characteristics such as connectivity and coverage. Topology control is an iterative
process which consists of two phases those are topology construction and topology maintenance.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
92
During the topology construction phase, each node builds a new topology based on the best parent
node. Nodes can extend the network lifetime by adjusting transmission power to control the
topology. In the topology maintenance phase, each node monitors the energy status of neighbours
and triggers topology construction as needed. The framework of topology control approaches as
shown in figure below:
Fig. 1. Taxonomy of Topology Control[5]
In homogeneous topology control, the transmitting range of the nodes is the critical transmitting
range that produces communicating graphs that are connected with high probability. Determining
the critical transmission range using homogeneous topology control has been considered
analytically as well as practically.
In Nonhomogeneous approach the transmitting range of the nodes varies and is classified into
three categories, depending on the type of information that is used to compute the topology. In
location based approaches, exact node positions are known. In direction-based approaches, it is
assumed that nodes do not know their position, but they can estimate the relative direction of each
of their neighbors. Finally, in neighbor-based techniques, nodes are assumed to know only the ID
of the neighbors and are able to order them according to some criterion.
3. PROPOSED SCHEME
In this section we briefly describe the framework of ENR algorithm and its operating phases i.e.
(1) topology construction phase and (2) topology maintenance phase.
3.1 Frame Work
The frame work of the ENR algorithm is described in the following steps as follows and as shown
below in the figure 2:
Step-1: Initially, we get the energy of the randomly deployed nodes by using node energy model
[1] that can accurately reveal the energy associated with each node.
Step-2: Next we will be determining the neighbors [2] of the sensor nodes; our method relies on
distance estimation and the energy of the node.
Step-3: The maintenance of the proposed system is ensured by selecting the other node from the
neighbor data structure [4] in case of energy depletion.
Step-4: Maintenance process involves periodic restoration and recreation of network topology.
Here the each node periodically broadcasts the hello messages to its neighbor and waits for the
acknowledgement.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
93
Fig. 2. Frame Work of ENR Algorithm.
3.2 Topology Construction
In topology construction phase, an efficient methodology is used that constructs a topology
dynamically without violating network scenarios and thereby providing both connectivity and
coverage. Hence a topology construction algorithm is proposed for building a topology and the
steps for the same as shown in the figure 3.
We start constructing the topology T (v) where each node ‘n’ selects its neighbor ‘v’ based on
range, energy and distance. Initially the neighbor list of a node is set to Null (line 2). In order to
select the neighbor we determine the energy of each node E(v)(line 3-4). Now the node list E(v) is
sorted in decreasing order(Line 6).After computing the energy we find the distance of each node
‘v’ from ‘n’ in order to determine the neighbor list of every node (Line 10-14).The nodes which
are not present in the neighbor list N(v) is set to inactive state.
3.3 Topology Maintenance
In topology maintenance phase, as node start communicating with each other the energy depletes
and some nodes fail rendering the network useless. Hence to make network functioning optimal
we need to provide topology maintenance [4]. This process involves periodic restoration, rotation
and recreation of network topology. Here the node periodically broadcasts the hello messages to
its neighbor and waits for the acknowledgement(line 1-2).The Hello message carries the
following information:<node_id,neighbor_id,energy>. If the node does not receive back
acknowledgment (if the neighboring node is not having the energy to broadcast a message) then it
invokes topology construction function. the steps as shown in figure 4.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
94
Fig. 3. Topology Construction Algorithm.
Fig. 4. Topology Maintenance Algorithm.
4 Simulation Environment
4.1 Simulation model and parameters
We use ns2.33[7] to simulate our proposed protocol. In our simulation, we use the DCF of IEEE
802.11 for wireless LANs as the MAC layer protocol. It has the functionality to notify the
network layer about link breakage.
Our simulation settings and parameters are summarized in table below:
Topology _Construction(n,v)
{
(1) T (v) ← M (v); where M(v) ∈ N // list of nodes for the
topology
(2) N (v) = NULL // neighbours // finding the neighbour
(3) For v from first to the last node
(4) E (v) ←energy of v
(5)End For
(6) Sort E (v) in Decreasing order
(7) For n from first to the last node
(8) For v from first+1 to the last node
(9) if E(v) > E(v+1)
(10) if D(n,v) < D(n,V+1)
(11) N(v) ←'v' will be the neighbour of 'n'
(12) Remaining nodes are set to inactive state.
(13) Else
(14) N(v) ←'v+1' will be the neighbours of 'n'
(15) Remaining nodes are set to inactive state.
(16) End If
(17) End If
(18) End For
(19)End For
(20) Topology_maintenance()
}
Topology_maintenance()
{
(1) Broadcast a HELLO message to the neighbor.
(2) Receive an ACK message from each neighbor.
(3) If no ACK received.
(4) Topology Construction( )
(5) End If.
}
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
95
Parameter Value
Number of simulated Nodes 70
Pause time 10 sec
Area size of topography (m) 1600*2550 m
Radio range 250m
Packet size 512 bytes
Send rate of traffic 10 packets/sec
Traffic type TCP
MAC Type 802.11
Simulation Time 150 s
Simulated Routing Protocols ENR,CBTC,K-Neighbour
Table-1: Simulation Parameters.
4.2 Performance Metrics
We evaluate mainly the performance of ENR algorithm according to the following metrics, by
varying the pause time.
Throughput: It is the number of bits that are conveyed or processed per unit of time.
Packet Delivery Ratio: It is the ratio of the no. of packets received successfully and the total no.
of packets sent.
Bit Error Rate: It is the percentage of bits with errors divided by the total no. of bits transmitter,
received or processed over a given time period.
4.3 Results
In this experiment, we measure the performance of the protocols at different pause time.
In Fig 5, Initially throughput increases with the increase in time. Initial increase in throughput is
due to multiple route capability of ENR protocol (when the time increases from 0 to 5 sec).
However as the time further increases the throughput decreases due to the dropping of packets
due to the network congestion (this is shown when time increases from 5 to 50). Further from
above plot we can determine our ENR protocol provides better throughput than CBTC and K-
Neighbor protocol and maximum throughput is achieved when time is 5 sec.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
96
Fig. 5. Throughput vs. pause time.
Fig. 6. Packet Delivery ratio vs. pause time.
In fig 6, as the time increase the number of possible paths between source and sink pair
increases which causes a significant increase in the exploratory messages within in network
which initially leads to higher packet delivery ratio of about (95-100% in case of ENR). With
further increase in the time, the performance of packet delivery ratio decreases due to
congestion which in turn leads to collision. However in case of ENR protocol packet
delivery ratio remains somewhat stabilized as compared with CBTC and K-Neighbor.
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
97
Fig. 7. Bit Error Rate vs. pause time.
In fig 7, initially when we are sending data the percentage of error rate is high due to noise or
interference. However as the time increases the error rate of ENR is comparatively less as
compared with CBTC and K-neighbor. As Error rate decreases in ENR the throughput
increases, the error rate is decreased with the help of varying the FEC code size so that the
erroneous packets are corrected instead of going for retransmission which improves the
throughput.
5 Conclusion
In this paper we have proposed and implemented ENR (energy neighbour range) algorithm.
This algorithm performs better in variable sized networks as compared with the the state of
art methods. Our algorithm adopts a non-homogeneous approach which takes into
consideration location, direction and neighbor information of a system in a network. However
our algorithm results in some overhead as it needs to compute various parameters like energy,
range and neighbors. This is overshadowed by high coverage and enhancing the lifetime of a
network.
6 REFERENCES
[1] Hai-Ying Zhou, Dan-Yan Luo, Yan Gao, De-Cheng Zuo, (2011) “Modeling of Node Energy
Consumption for Wireless Sensor Networks”, Wireless Sensor Network, Vol 3, pp. 18-23.
[2] Runze Ma, Zhijun Yu , Haitao Liu (2012)” The Neighbors Selection Algorithm in WSN for
Routing and Localization” Journal of Information & Computational Science Vol.9, No.4, pp. 1017
–1025.
[3] Abderrahim Tahiri, Esteban Egea-López, Javier Vales-Alonso, Joan García-Haro &
Mohamed Essaaidi(2009) “A Novel Approach For Optimal Wireless Sensor Network
Deployment”, Symposium on Progress in Information & Communication Technology 2009.
[4] A.Karthikeyan, T.Shankar, V.Srividhya, Siva Charan Reddy.v, Sandeep Kommineni(2013),
“Topology Control Algorithm For Better Sensing Coverage With Connectivity In Wireless Sensor.
Networks”, Journal of Theoretical and Applied Information Technology., Vol.52, No.3,pp.308
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014
98
[5] Muhammad Asghar Khan, Asfandyar Khan, Said Khalid Shah, Azween Abdullah,(2013) “An Energy
Efficient Color Based Topology Control Algorithm for Wireless Sensor Networks” Wireless Sensor
Network, Vol. 5,No. 1, pp.1-7.
[6] Paolo Santi(2005) “Topology Control in Wireless Ad Hoc and Sensor Networks”, ACM Computing
Surveys, Vol. 37, No. 2, pp. 164–194.
[7] The Network Simulator, NS-2.34, Available from www.isi.edu/nsnam/ns, 2009
AUTHORS
Aminuddin Zabi received his BE degree from Visvesvaraya Technological University in
2012 and he is currently pursuing his master’s degree (M.TECH) at Nitte Meenakshi
Institute of technology, Bangalore, affiliated to Visvesvaraya Technological University,
India. His research interests include the study of structural properties and information
security in wireless sensor networks.
Touseef Yousuf received his BE degree from University of Kashmir and he is currently
pursuing his master’s degree (M.TECH) in computer science and engineering at Nitte
Meenakshi Institute of technology, Bangalore, affiliated to Visvesvaraya Technological
University, India. His research interests include wireless sensor networks, cloud computing
and Algorithm design.
Aparna Manikonda received her BE and MTECH degree from Biju patnaik university of
technology. She is currently working as an assistant professor in the department of
computer science and engineering at Nitte Meenakshi Institute of technology, Bangalore,
affiliated to Visvesvaraya Technological University, India. Her research interests include
Adhoc and Sensor networks, Data Mining and Warehousing , Cloud computing and Image
processing.

Más contenido relacionado

La actualidad más candente

A survey research summary on neural networks
A survey research summary on neural networksA survey research summary on neural networks
A survey research summary on neural networkseSAT Publishing House
 
Energy Curtailing with Huddling Practices with Fuzzy in Wireless Sensor Network
Energy Curtailing with Huddling Practices with Fuzzy in Wireless Sensor NetworkEnergy Curtailing with Huddling Practices with Fuzzy in Wireless Sensor Network
Energy Curtailing with Huddling Practices with Fuzzy in Wireless Sensor Networkijsrd.com
 
Analysis of Microstrip Finger on Bandwidth of Interdigital Band Pass Filter u...
Analysis of Microstrip Finger on Bandwidth of Interdigital Band Pass Filter u...Analysis of Microstrip Finger on Bandwidth of Interdigital Band Pass Filter u...
Analysis of Microstrip Finger on Bandwidth of Interdigital Band Pass Filter u...IJREST
 
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...IJMIT JOURNAL
 
Effective load balancing method in ad hoc
Effective load balancing method in ad hocEffective load balancing method in ad hoc
Effective load balancing method in ad hocijmnct
 
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...ijwmn
 
Proximity Detection in Distributed Simulation of Wireless Mobile Systems
Proximity Detection in Distributed Simulation of Wireless Mobile SystemsProximity Detection in Distributed Simulation of Wireless Mobile Systems
Proximity Detection in Distributed Simulation of Wireless Mobile SystemsGabriele D'Angelo
 
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...ijwmn
 
E NERGY - E FFICIENT P ATH C ONFIGURATION M ETHOD FOR DEF IN WSN S
E NERGY - E FFICIENT  P ATH  C ONFIGURATION  M ETHOD FOR  DEF IN  WSN SE NERGY - E FFICIENT  P ATH  C ONFIGURATION  M ETHOD FOR  DEF IN  WSN S
E NERGY - E FFICIENT P ATH C ONFIGURATION M ETHOD FOR DEF IN WSN Sijitjournal
 
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGN
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGNDIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGN
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGNIJCNCJournal
 
A simulation model of ieee 802.15.4 in om ne t++
A simulation model of ieee 802.15.4 in om ne t++A simulation model of ieee 802.15.4 in om ne t++
A simulation model of ieee 802.15.4 in om ne t++wissem hammouda
 
Wireless sensor network -a zone based approach
Wireless sensor network -a zone based approachWireless sensor network -a zone based approach
Wireless sensor network -a zone based approachShubhi Singh chauhan
 
The Application of Wavelet Neural Network in the Settlement Monitoring of Subway
The Application of Wavelet Neural Network in the Settlement Monitoring of SubwayThe Application of Wavelet Neural Network in the Settlement Monitoring of Subway
The Application of Wavelet Neural Network in the Settlement Monitoring of SubwayTELKOMNIKA JOURNAL
 
Physical layer network coding
Physical layer network codingPhysical layer network coding
Physical layer network codingNguyen Tan
 
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...IJMIT JOURNAL
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocolijceronline
 

La actualidad más candente (20)

eeca
eecaeeca
eeca
 
A survey research summary on neural networks
A survey research summary on neural networksA survey research summary on neural networks
A survey research summary on neural networks
 
69 122-128
69 122-12869 122-128
69 122-128
 
Energy Curtailing with Huddling Practices with Fuzzy in Wireless Sensor Network
Energy Curtailing with Huddling Practices with Fuzzy in Wireless Sensor NetworkEnergy Curtailing with Huddling Practices with Fuzzy in Wireless Sensor Network
Energy Curtailing with Huddling Practices with Fuzzy in Wireless Sensor Network
 
Analysis of Microstrip Finger on Bandwidth of Interdigital Band Pass Filter u...
Analysis of Microstrip Finger on Bandwidth of Interdigital Band Pass Filter u...Analysis of Microstrip Finger on Bandwidth of Interdigital Band Pass Filter u...
Analysis of Microstrip Finger on Bandwidth of Interdigital Band Pass Filter u...
 
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
 
74 136-143
74 136-14374 136-143
74 136-143
 
Effective load balancing method in ad hoc
Effective load balancing method in ad hocEffective load balancing method in ad hoc
Effective load balancing method in ad hoc
 
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
 
Proximity Detection in Distributed Simulation of Wireless Mobile Systems
Proximity Detection in Distributed Simulation of Wireless Mobile SystemsProximity Detection in Distributed Simulation of Wireless Mobile Systems
Proximity Detection in Distributed Simulation of Wireless Mobile Systems
 
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE A...
 
E NERGY - E FFICIENT P ATH C ONFIGURATION M ETHOD FOR DEF IN WSN S
E NERGY - E FFICIENT  P ATH  C ONFIGURATION  M ETHOD FOR  DEF IN  WSN SE NERGY - E FFICIENT  P ATH  C ONFIGURATION  M ETHOD FOR  DEF IN  WSN S
E NERGY - E FFICIENT P ATH C ONFIGURATION M ETHOD FOR DEF IN WSN S
 
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGN
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGNDIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGN
DIA-TORUS:A NOVEL TOPOLOGY FOR NETWORK ON CHIP DESIGN
 
A simulation model of ieee 802.15.4 in om ne t++
A simulation model of ieee 802.15.4 in om ne t++A simulation model of ieee 802.15.4 in om ne t++
A simulation model of ieee 802.15.4 in om ne t++
 
Wireless sensor network -a zone based approach
Wireless sensor network -a zone based approachWireless sensor network -a zone based approach
Wireless sensor network -a zone based approach
 
The Application of Wavelet Neural Network in the Settlement Monitoring of Subway
The Application of Wavelet Neural Network in the Settlement Monitoring of SubwayThe Application of Wavelet Neural Network in the Settlement Monitoring of Subway
The Application of Wavelet Neural Network in the Settlement Monitoring of Subway
 
Physical layer network coding
Physical layer network codingPhysical layer network coding
Physical layer network coding
 
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocol
 

Destacado

Internet service provider mobile
Internet service provider mobileInternet service provider mobile
Internet service provider mobileIJCNCJournal
 
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESIJCNCJournal
 
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...IJCNCJournal
 
On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...IJCNCJournal
 
Real time audio translation module between iax and rsw
Real time audio translation module between iax and rswReal time audio translation module between iax and rsw
Real time audio translation module between iax and rswIJCNCJournal
 
A low complex modified golden
A low complex modified goldenA low complex modified golden
A low complex modified goldenIJCNCJournal
 
A bandwidth allocation model provisioning framework with autonomic characteri...
A bandwidth allocation model provisioning framework with autonomic characteri...A bandwidth allocation model provisioning framework with autonomic characteri...
A bandwidth allocation model provisioning framework with autonomic characteri...IJCNCJournal
 
On modeling controller switch interaction in openflow based sdns
On modeling controller switch interaction in openflow based sdnsOn modeling controller switch interaction in openflow based sdns
On modeling controller switch interaction in openflow based sdnsIJCNCJournal
 
Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...IJCNCJournal
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftIJCNCJournal
 
Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...IJCNCJournal
 
Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)IJCNCJournal
 
Link aware nice application level multicast protocol
Link aware nice application level multicast protocolLink aware nice application level multicast protocol
Link aware nice application level multicast protocolIJCNCJournal
 
A comparative analysis of number portability routing schemes
A comparative analysis of number portability routing schemesA comparative analysis of number portability routing schemes
A comparative analysis of number portability routing schemesIJCNCJournal
 
Security analysis of generalized confidentialmodulation for quantum communica...
Security analysis of generalized confidentialmodulation for quantum communica...Security analysis of generalized confidentialmodulation for quantum communica...
Security analysis of generalized confidentialmodulation for quantum communica...IJCNCJournal
 
Pwm technique to overcome the effect of
Pwm technique to overcome the effect ofPwm technique to overcome the effect of
Pwm technique to overcome the effect ofIJCNCJournal
 
IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATION
IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATIONIMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATION
IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATIONIJCNCJournal
 
Cloud computing challenges and solutions
Cloud computing challenges and solutionsCloud computing challenges and solutions
Cloud computing challenges and solutionsIJCNCJournal
 
Correlation based feature selection (cfs) technique to predict student perfro...
Correlation based feature selection (cfs) technique to predict student perfro...Correlation based feature selection (cfs) technique to predict student perfro...
Correlation based feature selection (cfs) technique to predict student perfro...IJCNCJournal
 

Destacado (19)

Internet service provider mobile
Internet service provider mobileInternet service provider mobile
Internet service provider mobile
 
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIESANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
ANALYSIS OF IPV6 TRANSITION TECHNOLOGIES
 
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
PERFORMANCE EVALUATION OF THE EFFECT OF NOISE POWER JAMMER ON THE MOBILE BLUE...
 
On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...On client’s interactive behaviour to design peer selection policies for bitto...
On client’s interactive behaviour to design peer selection policies for bitto...
 
Real time audio translation module between iax and rsw
Real time audio translation module between iax and rswReal time audio translation module between iax and rsw
Real time audio translation module between iax and rsw
 
A low complex modified golden
A low complex modified goldenA low complex modified golden
A low complex modified golden
 
A bandwidth allocation model provisioning framework with autonomic characteri...
A bandwidth allocation model provisioning framework with autonomic characteri...A bandwidth allocation model provisioning framework with autonomic characteri...
A bandwidth allocation model provisioning framework with autonomic characteri...
 
On modeling controller switch interaction in openflow based sdns
On modeling controller switch interaction in openflow based sdnsOn modeling controller switch interaction in openflow based sdns
On modeling controller switch interaction in openflow based sdns
 
Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
 
Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...Design, implementation and evaluation of icmp based available network bandwid...
Design, implementation and evaluation of icmp based available network bandwid...
 
Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)
 
Link aware nice application level multicast protocol
Link aware nice application level multicast protocolLink aware nice application level multicast protocol
Link aware nice application level multicast protocol
 
A comparative analysis of number portability routing schemes
A comparative analysis of number portability routing schemesA comparative analysis of number portability routing schemes
A comparative analysis of number portability routing schemes
 
Security analysis of generalized confidentialmodulation for quantum communica...
Security analysis of generalized confidentialmodulation for quantum communica...Security analysis of generalized confidentialmodulation for quantum communica...
Security analysis of generalized confidentialmodulation for quantum communica...
 
Pwm technique to overcome the effect of
Pwm technique to overcome the effect ofPwm technique to overcome the effect of
Pwm technique to overcome the effect of
 
IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATION
IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATIONIMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATION
IMPORTANCE OF REALISTIC MOBILITY MODELS FOR VANET NETWORK SIMULATION
 
Cloud computing challenges and solutions
Cloud computing challenges and solutionsCloud computing challenges and solutions
Cloud computing challenges and solutions
 
Correlation based feature selection (cfs) technique to predict student perfro...
Correlation based feature selection (cfs) technique to predict student perfro...Correlation based feature selection (cfs) technique to predict student perfro...
Correlation based feature selection (cfs) technique to predict student perfro...
 

Similar a A new method for controlling and maintaining

A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Paper id 28201419
Paper id 28201419Paper id 28201419
Paper id 28201419IJRAT
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...csijjournal
 
Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11eSAT Publishing House
 
Analysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 etAnalysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 eteSAT Journals
 
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...IJNSA Journal
 
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IJNSA Journal
 
Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...
Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...
Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...TELKOMNIKA JOURNAL
 
Enhanced Threshold Sensitive Stable Election Protocol
Enhanced Threshold Sensitive Stable Election ProtocolEnhanced Threshold Sensitive Stable Election Protocol
Enhanced Threshold Sensitive Stable Election Protocoliosrjce
 
OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKS
OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKSOPTIMIZED TASK ALLOCATION IN SENSOR NETWORKS
OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKSZac Darcy
 
Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...
Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...
Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...ijwmn
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2csandit
 
Power saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling techniquePower saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling techniqueeSAT Publishing House
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...IJECEIAES
 
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...ijassn
 
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...ijassn
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Editor IJCATR
 

Similar a A new method for controlling and maintaining (20)

A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Paper id 28201419
Paper id 28201419Paper id 28201419
Paper id 28201419
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
 
Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11
 
Analysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 etAnalysis of data transmission in wireless lan for 802.11 e2 et
Analysis of data transmission in wireless lan for 802.11 e2 et
 
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
 
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
 
Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...
Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...
Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...
 
E017332733
E017332733E017332733
E017332733
 
Enhanced Threshold Sensitive Stable Election Protocol
Enhanced Threshold Sensitive Stable Election ProtocolEnhanced Threshold Sensitive Stable Election Protocol
Enhanced Threshold Sensitive Stable Election Protocol
 
OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKS
OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKSOPTIMIZED TASK ALLOCATION IN SENSOR NETWORKS
OPTIMIZED TASK ALLOCATION IN SENSOR NETWORKS
 
Ijcnc050207
Ijcnc050207Ijcnc050207
Ijcnc050207
 
Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...
Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...
Osc mac duty cycle with multi helpers ct mode wi-lem technology in wireless s...
 
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
Performance Evaluation of a Layered WSN Using AODV and MCF Protocols in NS-2
 
Power saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling techniquePower saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling technique
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
 
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
 
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
 

Más de IJCNCJournal

Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSIJCNCJournal
 

Más de IJCNCJournal (20)

Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
 

Último

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Último (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

A new method for controlling and maintaining

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014 DOI : 10.5121/ijcnc.2014.6408 91 A New Method for Controlling and Maintaining Topology in Wireless Sensor Networks Aminuddin Zabi1 , Touseef Yousuf2 and Aparna Manikonda3 Department of Computer Science Engineering Nitte Meenakshi Institute of Technology, Bengaluru-64, India ABSTRACT Topology Control is an essential technique in a wireless sensor network to extend the operational time of the sensor nodes. The goal of this technique is to maintain network connectivity and optimize performance metrics such as network lifetime and throughput. In this paper we presented a new method for controlling and maintaining topology in wireless sensor networks that show some improvement over the state of art methods. The results are analyzed based on objective criteria. KEYWORDS Wireless Sensor Networks, ENR, Topology Control, Topology Construction, Topology Maintenance. 1. INTRODUCTION A wireless sensor network is a reliant collection of nodes that communicate over relatively bandwidth constrained wireless links. In general, topology control in sensor networks adjusts their transmission ranges to conserve energy and reduce interference. In case of wireless sensor networks the aspects which need to be considered while controlling topology are operation in hostile environments, Data processing and scalability. A significant amount of research works [1- 4] have been done using non homogenous approaches such as location based, neighbor based and direction based. In this paper we devised a new method called ENR which stands for Energy-Neighbour-Range to control and maintain topology in wireless sensor networks. Our approach is fully distributed, asynchronous and generates a connected topology. The method is based on the principle of maintaining the number of physical neighbours, transmission range and energy levels at each node while constructing topology in order to improve the efficiency of the network. The rest of the paper is organized as follows. Section 2 briefly describes the taxonomy of topology control methods. Section 3 presents our working principle. Section 4 presents the simulation environment and experimental results. Finally conclusions are drawn in Section 5. 2. TAXONOMY OF TOPOLOGY CONTROL Topology control is an essential technique in Wireless sensor network which leads to reorganizing and managing of certain node parameters and modes of operation from time to time to modify the topology of the network with the goal of extending its lifetime while preserving important characteristics such as connectivity and coverage. Topology control is an iterative process which consists of two phases those are topology construction and topology maintenance.
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014 92 During the topology construction phase, each node builds a new topology based on the best parent node. Nodes can extend the network lifetime by adjusting transmission power to control the topology. In the topology maintenance phase, each node monitors the energy status of neighbours and triggers topology construction as needed. The framework of topology control approaches as shown in figure below: Fig. 1. Taxonomy of Topology Control[5] In homogeneous topology control, the transmitting range of the nodes is the critical transmitting range that produces communicating graphs that are connected with high probability. Determining the critical transmission range using homogeneous topology control has been considered analytically as well as practically. In Nonhomogeneous approach the transmitting range of the nodes varies and is classified into three categories, depending on the type of information that is used to compute the topology. In location based approaches, exact node positions are known. In direction-based approaches, it is assumed that nodes do not know their position, but they can estimate the relative direction of each of their neighbors. Finally, in neighbor-based techniques, nodes are assumed to know only the ID of the neighbors and are able to order them according to some criterion. 3. PROPOSED SCHEME In this section we briefly describe the framework of ENR algorithm and its operating phases i.e. (1) topology construction phase and (2) topology maintenance phase. 3.1 Frame Work The frame work of the ENR algorithm is described in the following steps as follows and as shown below in the figure 2: Step-1: Initially, we get the energy of the randomly deployed nodes by using node energy model [1] that can accurately reveal the energy associated with each node. Step-2: Next we will be determining the neighbors [2] of the sensor nodes; our method relies on distance estimation and the energy of the node. Step-3: The maintenance of the proposed system is ensured by selecting the other node from the neighbor data structure [4] in case of energy depletion. Step-4: Maintenance process involves periodic restoration and recreation of network topology. Here the each node periodically broadcasts the hello messages to its neighbor and waits for the acknowledgement.
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014 93 Fig. 2. Frame Work of ENR Algorithm. 3.2 Topology Construction In topology construction phase, an efficient methodology is used that constructs a topology dynamically without violating network scenarios and thereby providing both connectivity and coverage. Hence a topology construction algorithm is proposed for building a topology and the steps for the same as shown in the figure 3. We start constructing the topology T (v) where each node ‘n’ selects its neighbor ‘v’ based on range, energy and distance. Initially the neighbor list of a node is set to Null (line 2). In order to select the neighbor we determine the energy of each node E(v)(line 3-4). Now the node list E(v) is sorted in decreasing order(Line 6).After computing the energy we find the distance of each node ‘v’ from ‘n’ in order to determine the neighbor list of every node (Line 10-14).The nodes which are not present in the neighbor list N(v) is set to inactive state. 3.3 Topology Maintenance In topology maintenance phase, as node start communicating with each other the energy depletes and some nodes fail rendering the network useless. Hence to make network functioning optimal we need to provide topology maintenance [4]. This process involves periodic restoration, rotation and recreation of network topology. Here the node periodically broadcasts the hello messages to its neighbor and waits for the acknowledgement(line 1-2).The Hello message carries the following information:<node_id,neighbor_id,energy>. If the node does not receive back acknowledgment (if the neighboring node is not having the energy to broadcast a message) then it invokes topology construction function. the steps as shown in figure 4.
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014 94 Fig. 3. Topology Construction Algorithm. Fig. 4. Topology Maintenance Algorithm. 4 Simulation Environment 4.1 Simulation model and parameters We use ns2.33[7] to simulate our proposed protocol. In our simulation, we use the DCF of IEEE 802.11 for wireless LANs as the MAC layer protocol. It has the functionality to notify the network layer about link breakage. Our simulation settings and parameters are summarized in table below: Topology _Construction(n,v) { (1) T (v) ← M (v); where M(v) ∈ N // list of nodes for the topology (2) N (v) = NULL // neighbours // finding the neighbour (3) For v from first to the last node (4) E (v) ←energy of v (5)End For (6) Sort E (v) in Decreasing order (7) For n from first to the last node (8) For v from first+1 to the last node (9) if E(v) > E(v+1) (10) if D(n,v) < D(n,V+1) (11) N(v) ←'v' will be the neighbour of 'n' (12) Remaining nodes are set to inactive state. (13) Else (14) N(v) ←'v+1' will be the neighbours of 'n' (15) Remaining nodes are set to inactive state. (16) End If (17) End If (18) End For (19)End For (20) Topology_maintenance() } Topology_maintenance() { (1) Broadcast a HELLO message to the neighbor. (2) Receive an ACK message from each neighbor. (3) If no ACK received. (4) Topology Construction( ) (5) End If. }
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014 95 Parameter Value Number of simulated Nodes 70 Pause time 10 sec Area size of topography (m) 1600*2550 m Radio range 250m Packet size 512 bytes Send rate of traffic 10 packets/sec Traffic type TCP MAC Type 802.11 Simulation Time 150 s Simulated Routing Protocols ENR,CBTC,K-Neighbour Table-1: Simulation Parameters. 4.2 Performance Metrics We evaluate mainly the performance of ENR algorithm according to the following metrics, by varying the pause time. Throughput: It is the number of bits that are conveyed or processed per unit of time. Packet Delivery Ratio: It is the ratio of the no. of packets received successfully and the total no. of packets sent. Bit Error Rate: It is the percentage of bits with errors divided by the total no. of bits transmitter, received or processed over a given time period. 4.3 Results In this experiment, we measure the performance of the protocols at different pause time. In Fig 5, Initially throughput increases with the increase in time. Initial increase in throughput is due to multiple route capability of ENR protocol (when the time increases from 0 to 5 sec). However as the time further increases the throughput decreases due to the dropping of packets due to the network congestion (this is shown when time increases from 5 to 50). Further from above plot we can determine our ENR protocol provides better throughput than CBTC and K- Neighbor protocol and maximum throughput is achieved when time is 5 sec.
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014 96 Fig. 5. Throughput vs. pause time. Fig. 6. Packet Delivery ratio vs. pause time. In fig 6, as the time increase the number of possible paths between source and sink pair increases which causes a significant increase in the exploratory messages within in network which initially leads to higher packet delivery ratio of about (95-100% in case of ENR). With further increase in the time, the performance of packet delivery ratio decreases due to congestion which in turn leads to collision. However in case of ENR protocol packet delivery ratio remains somewhat stabilized as compared with CBTC and K-Neighbor.
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014 97 Fig. 7. Bit Error Rate vs. pause time. In fig 7, initially when we are sending data the percentage of error rate is high due to noise or interference. However as the time increases the error rate of ENR is comparatively less as compared with CBTC and K-neighbor. As Error rate decreases in ENR the throughput increases, the error rate is decreased with the help of varying the FEC code size so that the erroneous packets are corrected instead of going for retransmission which improves the throughput. 5 Conclusion In this paper we have proposed and implemented ENR (energy neighbour range) algorithm. This algorithm performs better in variable sized networks as compared with the the state of art methods. Our algorithm adopts a non-homogeneous approach which takes into consideration location, direction and neighbor information of a system in a network. However our algorithm results in some overhead as it needs to compute various parameters like energy, range and neighbors. This is overshadowed by high coverage and enhancing the lifetime of a network. 6 REFERENCES [1] Hai-Ying Zhou, Dan-Yan Luo, Yan Gao, De-Cheng Zuo, (2011) “Modeling of Node Energy Consumption for Wireless Sensor Networks”, Wireless Sensor Network, Vol 3, pp. 18-23. [2] Runze Ma, Zhijun Yu , Haitao Liu (2012)” The Neighbors Selection Algorithm in WSN for Routing and Localization” Journal of Information & Computational Science Vol.9, No.4, pp. 1017 –1025. [3] Abderrahim Tahiri, Esteban Egea-López, Javier Vales-Alonso, Joan García-Haro & Mohamed Essaaidi(2009) “A Novel Approach For Optimal Wireless Sensor Network Deployment”, Symposium on Progress in Information & Communication Technology 2009. [4] A.Karthikeyan, T.Shankar, V.Srividhya, Siva Charan Reddy.v, Sandeep Kommineni(2013), “Topology Control Algorithm For Better Sensing Coverage With Connectivity In Wireless Sensor. Networks”, Journal of Theoretical and Applied Information Technology., Vol.52, No.3,pp.308
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 2014 98 [5] Muhammad Asghar Khan, Asfandyar Khan, Said Khalid Shah, Azween Abdullah,(2013) “An Energy Efficient Color Based Topology Control Algorithm for Wireless Sensor Networks” Wireless Sensor Network, Vol. 5,No. 1, pp.1-7. [6] Paolo Santi(2005) “Topology Control in Wireless Ad Hoc and Sensor Networks”, ACM Computing Surveys, Vol. 37, No. 2, pp. 164–194. [7] The Network Simulator, NS-2.34, Available from www.isi.edu/nsnam/ns, 2009 AUTHORS Aminuddin Zabi received his BE degree from Visvesvaraya Technological University in 2012 and he is currently pursuing his master’s degree (M.TECH) at Nitte Meenakshi Institute of technology, Bangalore, affiliated to Visvesvaraya Technological University, India. His research interests include the study of structural properties and information security in wireless sensor networks. Touseef Yousuf received his BE degree from University of Kashmir and he is currently pursuing his master’s degree (M.TECH) in computer science and engineering at Nitte Meenakshi Institute of technology, Bangalore, affiliated to Visvesvaraya Technological University, India. His research interests include wireless sensor networks, cloud computing and Algorithm design. Aparna Manikonda received her BE and MTECH degree from Biju patnaik university of technology. She is currently working as an assistant professor in the department of computer science and engineering at Nitte Meenakshi Institute of technology, Bangalore, affiliated to Visvesvaraya Technological University, India. Her research interests include Adhoc and Sensor networks, Data Mining and Warehousing , Cloud computing and Image processing.