SlideShare una empresa de Scribd logo
1 de 8
Descargar para leer sin conexión
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
              INTERNATIONAL JOURNAL OF ELECTRONICS AND
 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME
     COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)
ISSN 0976 – 6464(Print)
ISSN 0976 – 6472(Online)
Volume 3, Issue 3, October- December (2012), pp. 219-226
                                                                             IJECET
© IAEME: www.iaeme.com/ijecet.asp
Journal Impact Factor (2012): 3.5930 (Calculated by GISI)                  ©IAEME
www.jifactor.com




    ANALYSIS OF PROGRAMMING ASPECTS OF WIRELESS SENSOR
    NETWORKS AND NON UNIFORMITY ISSUES-A FEASIBLE STUDY

                               Mrs.R.Rajasreea, Dr.G.Kalivarathanb
                     a
                      Research Scholar, CMJ University, Meghalaya, Shillong,
   b
     Principal, PSN Institute of Technology and Science, Tirunelveli, Tamilnadu, Supervisor CMJ
                                         university, Shillong.

 ABSTRACT:

          Advances in wireless communications and relevancy of hardware gears have enabled the
 progress of low-cost, low-power and multifunctional sensor nodes. These clusters are small in
 size and correspond in short distances over a radio frequency channel. These minute nodes,
 which consist of sensing, data processing and communicating gears, capture the purposes of
 sensor networks. The perception of Wireless Sensor Networks (WSNs) was originally proposed
 in 1999 about “smart dust” computers that can be scattered on the barricade, deployed anywhere
 throughout the upbringing, and work in partnership to solve big troubles. Later on, WSNs found
 their way into a wide variety of applications with vastly varying requirements and attributes.
 According to a far and wide acknowledge definition, a WSN is unruffled of a large quantity of
 amalgamated sensor nodes that are opaquely deployed either inside a phenomenon or very close
 to it, and join forces through a wireless network in assembling ecological information or reacting
 to specific events. To appraise the different parts of the intend framework, we always analyze
 our solutions from two complementary perspectives. On one hand, we compute the programming
 exertion in developing non-insignificant reference test use-cases both using our solutions and
 with conventional programming tools. On the other hand, we explore the system performance
 based on metrics such as complex overhead, energy in the clouds, and reserve usage. In this
 paper, it is to follow a short path that will review the networks starting from natural networks,
 running throughout human networks and finally, coming to computer networks. Moreover, we
 will point out the accepted wireless shift in surroundings, networks tends to move wireless to be
 more proficient and to grow up at a higher rate. In toting up to non uniformity analyses have to
 be carried out by the use of Wireless sensor networks (WSNs).

 Keywords: Wireless sensor networks (WSNs), Non Uniformity, Programming exertion, Sensor
 nodes, Data Processing, Channels, Routing.


                                                 219
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME

1. INTRODUCTION

        This exposition focuses on this issue and presents a set of WSN programming
frameworks that simplify application development in a range of settings, from static deployments
with predefined and constant conditions to dynamic deployments with changing and
unpredictable requirements. In particular, the contributions of this thesis are mainly within the
following four areas. The first part presents a distributed middleware system, called WiSeKit, to
enable adaptation and reconfiguration of WSN applications in ubiquitous and context-aware
environments. WiSeKit proposes a middleware software framework that formulates the process
of adaptive WSN application development and abstracts the underlying technological adaptation
processes. The adaptation strategy is inspired by the main activities of the feedback control loop,
including context-awareness, adaptation reasoning, and software reconfiguration. In particular, it
introduces a novel context processing model to monitor various context information in WSNs.
The analyzed context data is delivered to a hierarchical adaptation reasoning framework to make
decisions about what adaptation to perform. Finally, WiSeKit proposes a component-based
reconfiguration approach to implement the adaptation choices. The second part of this thesis
presents a new component-based programming model for WSNs, called Remora. This
programming abstraction is proposed not only to simplify programming in WSNs, but also to
address the third goal of WiSeKit component-based reconfiguration. Remora offers a well-
structured programming paradigm that fits very well with resource limitations of WSNs.
Furthermore, the special attention to event handling, in Remora makes it more practical for WSN
applications, which are inherently event-driven. More importantly, the mutualism between
Remora and underlying system software promises a new direction towards separation of
concerns in WSNs. In the third part, we reconsider Remora in order to extend it with the
capability of compositional component reconfiguration and therefore meet the component-based
reconfiguration requirement of WiSeKit. The dynamicity of Remora is achieved by the, principle
of in-situ reconfigurability, referring to minimizing the overhead of component reconfiguration
through a set of in-situ updating guidelines. This is achieved within RemoWare, a run-time
system leveraging on the concept of in-situ reconfigurability to allow component-based
reprogramming in WSNs. New binary update preparation, code distribution, run-time linking,
dynamic memory allocation and loading, and system state preservation are the main features
supported by RemoWare. The last contribution of this thesis is dedicated to providing a software
framework for WSNs that enables the development of distributed sensor services and their
integration with existing IT systems. This is achieved by extending Remora with an interaction
model inspired by the REST architectural style in order to facilitate interoperability of sensor
services with the Internet through Web service-enabled components. The provision of such
framework is very important in WiSeKit when processing context information provided by
heterogeneous nodes in the network. To evaluate the different parts of the proposed framework,
we always analyze our solutions from two complementary perspectives. On one hand, we
quantify the programming effort in developing non-trivial reference test use-cases both using our
solutions and with mainstream programming tools. On the other hand, we explore the system
performance based on metrics such as network overhead, energy overhead, and resource usage.




                                                220
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME

2. PROGRAMMING ASPECTS

2.1Smart Home Solutions:
        The project mainly focuses on prediction algorithms to guide decisions for controlling
devices throughout the home. These algorithms include the Smart home Inhabitants Prediction
algorithm (that matches more recent sequences of events with stored sequences), Active LeZi
algorithm (that applies information theory principles to process historical actions sequences) and
a Task Based Markov Model algorithm (for identifying high level tasks in action sequences).
Benefiting from the DigiHome extensibility and concern isolation, these algorithms can be
incorporated into the CEP engine in order to make our service-oriented platform more intelligent
and autonomous in respect to the adaptation decisions.




                        Fig.1 Interactions between Smart Home devices


2.2 Context Dissemination:
        CORTEX defines sentient objects as autonomous entities that have the capacity of
retrieving, processing, and sharing context information using HTTP and SOAP. MUSIC
middleware is another decentralized solution that proposes a peer-to-peer infrastructure dealing
with context mediation. The decentralized approaches face the problem of fault tolerance by
distributing the information across several machines. However, as well as some centralized
solutions, the lack of flexibility in terms of the communication protocols remains a key limitation
for these approaches. In addition to that, peer-to peer approaches have performance and security
problems. In DigiHome, we provide a solution, where the different interacting devices can
process the events retrieved from the environment. Furthermore, in DigiHome we provide
flexibility in terms of interaction by supporting different kinds of communication protocols and
we also allow spontaneous interoperability.




                                                221
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME

2.3 Wireless Sensor Networks
        Agimone is a middleware solution supporting the integration of WSNs and IP networks. It
focuses on the distribution and coordination of WSN applications across WSN boundaries. Agimone
integrates the Agilla and Limone middleware platforms. Agimone is a general-purpose middleware with a
uniform programming model for applications that integrates multiple WSNs and the IP network. In our
approach, we also promote the integration of sensor nodes via Service component architecture (SCA)
bindings. Moreover, we enable spontaneous communications with some sensor nodes that execute a
lightweight version of DigiHome.

2.4 Complex Event Processing
         An Event-Driven Architecture (EDA) that combines the advantages of WSN with CEP is
presented. They use an extension of the RFID EPC global architecture which allows the interaction of
RFID and WSN events. Once the events are collected, they use CEP to detect specific situations. They
use a smart shelf application as their scenario to show how the events from both sources can be combined.
Even though both technologies seem to interact in their project, their specification is somehow limited
because they do not specify how the information obtained could be used, other than generating a report
that will be logged in the EPCIS server.




                                   Fig. 2 Digi home Architecture

2.5 A Programming Model for Adaptive WSNs.
        We have proposed a new component based programming model to simplify application
development in WSNs, as well as to support the component-based reconfiguration mechanism proposed
in the WiSeKit middleware. This component model, called Remora, addresses high-level event driven
programming in WSNs through a component-based approach. As a SCA compliant component model,
Remora introduces a widely-accepted component programming approach which is specialized for WSNs
and embedded systems, and at the same time it attracts PC-based developers to programming in WSNs.
To ensure portability of Remora components towards different OSs, the Remora component framework is
integrated with the underlying operating system through a well-defined OS-abstraction layer. Since WSN
software is inherently event-driven, Remora introduces an efficient way for describing and implementing
event-based interactions between software components. This abstraction also aims at simplifying OS-
level events processing by translating them to event entities that can be easily integrate to the proposed
component model. This component model has been successfully deployed and tested on the TelosB
sensor nodes with the Contiki operating system.




                                                   222
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME

2.6 Non uniformity
         In the non-uniformity is related to the concept of non-uniform information granularity. The non-
uniform information granularity is related to the concept of accuracy of information. The paper states that
the required accuracy, or precision, of information is proportional to the distance between the producer
and the consumer of the information. Another result is, in which the non-uniformity is related to
information sampling from the network itself. The authors provide a method to perform data sampling
from a sensor network with approximately uniform methods. Even when a network is non-uniformly
distributed (they study the case in which the nodes are hand distributed into a building to monitor it), the
authors pick data from the network uniformly. This is possible because the sensors space is normalized to
a uniform space using Voronoi regions computed in a distributed fashion.

2.7 Data Management
        The basic services necessary to the good work of a data management system: (i) Network
programming, in which the sensors are programmed to replay to queries (set up of routes, data
aggregation strategies etc.). (ii) Data acquisition and in-network aggregation, in which the data is
physically acquired by transceivers and refined to produce more useful streams. (iii) Data retrieval, that
provides the collection of data by an external entity. In the literature, we can identify four main models to
data management: namely external storage, directed diffusion, data centric storage, and database model.
Each one of these models implements a part or all the above services. The services provided by these
models are summarized in Table1.

                        Table1: Correspondence between models and Services

                         External Storage        Directed           Data centric       Database Model
                                                 Diffusion           Storage
        Network
                                No                  Yes                  No                  yes
       encoding
    Data attainment
         and in-
                             Partially            Partially             Yes                  Yes
      networking
      Processing
    Data reclamation            yes                 yes                  yes                 yes

3.0 Experimental Analysis of Programming and non uniformity
         In order to test DigiHome, we have employed two MacBook Pro laptops, with the following
software and hardware configuration: 2.4 GHz processor, 2 GB of RAM, AirPort Extreme card, Mac OS
X 10.5.6 (kernel Darwin 9.6.0), Java Virtual Machine 1.6.0, and Julia 2.5.2. The mobile client used in the
tests is a Nokia N800 Internet Tablet with 400 Mhz, 128 MB of RAM, interface WLAN 802.11 b/e/g,
Linux Maemo (kernel 2.6.21), CACAOVM Java Virtual Machine 0.99.4, and Julia 2.5.2. The latency for
disseminating, as well as for discovering context, confirms that DigiHome can integrate heterogeneous
entities with a reasonable performance overhead. Furthermore, according to the documentation provided
by Esper, the efficiency of the engine to process the events is such that it exceeds over 500,000 events per
second on a workstation and between 70, 000 and 200, 000 events per second running on an average
laptop. Thanks to the efficiency of the engine, the use of event processing in our system can be done at a
low cost and given the modularity of our architecture, the Esper engine can be installed min the device
that provides the highest processing power. In the context of the DigiHome platform, we observed that
Esper took 1ms on average to process the adaptation rules.




                                                    223
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME

                             Table 2 Performance of the DigiHome Platform
 No .of            Retrieval latency            Retrieval latency          Discovery          Discovery
Providers         ( Local Providers)          ( Remote Providers)           latency            latency
                                                                            ( Local           ( Remote
                                                                           Providers)        Providers)
              Object JSON XML Object JSON XML                           SLP      UPnP       SLP      UPnP
               (ms)      (ms)      (ms)     (ms)      (ms)      (ms)    (ms)      (ms)     (ms)       (ms)
     2           48       47        63       163       176       182     18        25        59         77
     4           65       90        92       360       377       381     40        52       120        147
    10          146       150       310      420       427       445     80        104      240        317
    20          304       356       333    1094       1047     1539      161       290      540        750
   100          950      1500     1600     2300       2320     2380      742       981     2196       2194
   200         1750      2987     3154     4578       4643     4791     1465      1835     4032       4251
  N800          N/A      N/A       N/A       367       385      N/A     N/A       N/A       132        139
         We wanted this operation to be as efficient as possible, still knowing that the uniformity
assumption costs nothing and that it is not possible to be as cheap as nothing. To get rid of this problem,
the Stripes family of protocols uses an aggressive caching technique. As a closing remark on the non-
uniformity problem in WSNs, we have to point out two things: (i) systems are non-uniformity proof by
their design (ii) non-uniformity proof choices can have a reasonable cost.

4.0 Experimental consequences
        In the local tests, we executed the DigiHome core and the DigiHome objects in different virtual
machines on the same laptop. In the distributed measures we used one laptop as Controller, and the other
laptop and the Nokia device as information providers. For discovery, we selected the UPnP and SLP
protocols. In the tests, the platform aggregates the user’s preferences to reduce the number of messages
exchanged between the provider and the consumer. As expected, when the providers are increased, the
context exchange with object serialization is more efficient than the JSON and XML representations.
Furthermore, the network usage introduces an overhead of approximately 300%. Finally, we tested our
solution using a Nokia Internet Tablet as a preference provider. As it can be seen, the use of this mobile
device introduces an additional but still acceptable overhead for discovery and information exchange.
This increase in cost is expected because of the limited resources of this kind of devices.




                  Fig. 3 Comparative Cost of the Protocols (40 Watch Points)
        In Fat-Stripes, such long perimeters becomes an advantage because a lot of sensors, belonging to
the external perimeter of the network, become caches for the replays to all the queries directed outside the
network: less nodes will need to query the network for the density and a cache ring, around the external
perimeter, is able to cache replays for more watch-points.

                                                    224
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME

5.0 Conclusion
        In this Investigation, DigiHome, a platform addressing the mobility, heterogeneity, and
adaptation of smart entities have attempted to an optimum level with different configuration
suitable for a specified application. In focus, DigiHome detects adaptation situations by
integrating context information using an SCA based architecture. This architecture exhibits and
improves the modularization of concerns and fosters the application of the REST principles by
exploiting the SCA extensibility. The simplicity and data orientation of REST, combined with
the SCA independence of implementation technologies, make Digi Home an attractive solution
to deal with heterogeneity in terms of interactions. The definition and application of ubiquitous
bindings in the platform enable intensified communication by means of standard protocols (e.g.,
UPnP and SLP), and furnish context provider selection (based on QoC attributes). On the other
hand, the modularized architecture of DigiHome allows the definition of variants for the
platform, called DigiHome objects that can be deployed on resource-constrained devices. The
functionality of these objects is exposed as services, accessible via several protocols, which can
be accessed by clients that do not have to be part of the platform. Furthermore, the clear
separation of concerns in the DigiHome architecture encourages the exploitation of WSNs for
simple processing and local decision making. The suitability of our platform for context
integration was evaluated with different discovery and context representations. For the first one,
we need to develop a kind of non-uniformity consciousness into the design procedure of WSNs
protocols and we need to take care of a couple of things in the design process. Every time we
need use concepts such as neighbor’s number and nodes density in some protocol design step, we
need to remember that these concepts can be relative to the position of the nodes in the network
and that nodes position and nodes density will be available only at run time. For the second one,
we need to take into account the problem that finding out the network density has a cost and that
we have to keep it as low as possible. Stripes are a general solution to find out the network
density and it works on the whole network. Stripes uses caches and fixed sampling points to find
out the network density. Both these two ideas help the protocol to be as efficient as possible.
However, a normalized focus on algorithm based programming is investigated along with
feasibility of usages in the context of WSNs and the inexact differential aspects of non
uniformity is also predicted accordingly up to a reasonable extent.

REFERENCES
[1] D. Romero, G. Hermosillo, A. Taherkordi, R. Nzekwa, R. Rouvoy, and F. Eliassen, “Restful
integration of heterogeneous devices in pervasive environments,” in DAIS ’10: Proc. of the 10th
IFIP Int. Conf. on Distributed Applications and Interoperable Systems, ser. LNCS, vol. 6115.
Springer, 2010, pp. 1–14.
[2] Open SOA, “Service Component Architecture Specifications,” Nov. 2007.
[3] R. T. Fielding, “Architectural styles and the design of network-based software architectures,”
Ph.D. dissertation, University of California, Irvine, 2000.
[4] D. C. Luckham, The Power of Events: An Introduction to Complex Event Processing in
Distributed Enterprise Systems. Boston, USA: Addison-Wesley Longman Pub. Co., Inc., 2001.
[5] L.Seinturier, P.Merle, D.Fournier, N. Dolet, V. Schiavoni, and J.-B. Stefani, “Reconfigurable
sca applications with the frascati platform,” in SCC ’09: Proc. of the IEEE Int. Conf. on Services
Computing. Washington, DC, USA: IEEE Computer Society, Sep. 2009, pp. 268–275.



                                                225
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME

[6] R.Melisson, P.Merle, D.Romero, R.Rouvoy, and L.Seinturier, “Reconfigurable runtime
support for distributed service component architectures,” in Automated Software Engineering,
Tool Demonstration, Belgium, 2010.
[7] E.Bruneton, T.Coupaye, M.Leclercq, V.Quema, and J.-B.Stefani, “The Fractal component
model and its support in java,” Soft. Pract. and Exp., vol. 36, no. 11-12, pp. 1257–1284, 2006.
[8] Listeners Considered Harmful: The Whiteboard Pattern, OSGi Alliance, 2004.
[9] A.Taherkordi, F.Loiret, A.Abdolrazaghi, R.Rouvoy, Q.L.Trung, and F.Eliassen,
“Programming sensor networks using Remora component model,” in DCOSS ’10: Proc. of the
6th Int. Conf. on Distributed Computing in Sensor Systems. USA: Springer, 2010, pp. 45–62.
[10] D. Romero, R. Rouvoy, L. Seinturier, and P. Carton, “Service discovery in ubiquitous
feedback control loops,” in DAIS ’10: Proc. of the 10th IFIP Int. Conf. on Distributed
Applications and Interoperable Systems, ser. LNCS, vol. 6115. Springer, june 2010, pp.113–126.
[11] UPnP Forum, “UPnP Device Architecture 1.0,”
http://www.upnp.org/resources/documents.asp, Apr. 2008.
[12] E. Guttman, C. Perkins, J. Veizades, and M. Day, “Service Location Protocol, Version 2.
RFC 2608 (Proposed Standard),” http://tools.ietf.org/html/rfc2608, Jun. 1999.
[13] M. Krause and I. Hochstatter, “Challenges in modelling and using quality of context (qoc),”
in Proc. of the 2nd Int. Workshop on Mobility Aware Technologies and Applications, Montreal,
Canada, 2005, pp. 324–333.
[14] EsperTech, “Esper,” http://esper.codehaus.org.
[15] D. Romero, R. Rouvoy, L. Seinturier, and F. Loiret, “Integration of heterogeneous context
resources in ubiquitous environments,” in SEAA ’10: Proc. of the 36th EUROMICRO Int. Conf.
on Software Engineering and Advanced Applications. Lille, France: ACM, 2010, p. 4.




                                                226

Más contenido relacionado

La actualidad más candente

026 icsca2012-s065
026 icsca2012-s065026 icsca2012-s065
026 icsca2012-s065auwalaumar
 
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...Solution for intra/inter-cluster event-reporting problem in cluster-based pro...
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...IJECEIAES
 
Integrated Framework for Secure and Energy Efficient Communication System in ...
Integrated Framework for Secure and Energy Efficient Communication System in ...Integrated Framework for Secure and Energy Efficient Communication System in ...
Integrated Framework for Secure and Energy Efficient Communication System in ...IJECEIAES
 
Design of Tele command SOC-IP by AES Cryptographic Method Using VHDL
Design of Tele command SOC-IP by AES Cryptographic Method Using VHDLDesign of Tele command SOC-IP by AES Cryptographic Method Using VHDL
Design of Tele command SOC-IP by AES Cryptographic Method Using VHDLdbpublications
 
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...IJAAS Team
 
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...chokrio
 
Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsIOSR Journals
 
Efficiency Evaluation Metrics for Wireless Intelligent Sensors Applications
Efficiency Evaluation Metrics for Wireless Intelligent Sensors ApplicationsEfficiency Evaluation Metrics for Wireless Intelligent Sensors Applications
Efficiency Evaluation Metrics for Wireless Intelligent Sensors Applicationschokrio
 
Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021ijujournal
 
Manet mobile ad hoc network – challenges, security and protocols-2
Manet  mobile ad hoc network  – challenges, security and protocols-2Manet  mobile ad hoc network  – challenges, security and protocols-2
Manet mobile ad hoc network – challenges, security and protocols-2prjpublications
 
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...IRJET Journal
 
Efficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor NetworksEfficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor NetworksIJAEMSJORNAL
 
METHODOLOGIES AND CHALLENGES OF WSN FOR IOT
METHODOLOGIES AND CHALLENGES OF WSN FOR IOT METHODOLOGIES AND CHALLENGES OF WSN FOR IOT
METHODOLOGIES AND CHALLENGES OF WSN FOR IOT IAEME Publication
 

La actualidad más candente (17)

D0371028039
D0371028039D0371028039
D0371028039
 
026 icsca2012-s065
026 icsca2012-s065026 icsca2012-s065
026 icsca2012-s065
 
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...Solution for intra/inter-cluster event-reporting problem in cluster-based pro...
Solution for intra/inter-cluster event-reporting problem in cluster-based pro...
 
Integrated Framework for Secure and Energy Efficient Communication System in ...
Integrated Framework for Secure and Energy Efficient Communication System in ...Integrated Framework for Secure and Energy Efficient Communication System in ...
Integrated Framework for Secure and Energy Efficient Communication System in ...
 
Design of Tele command SOC-IP by AES Cryptographic Method Using VHDL
Design of Tele command SOC-IP by AES Cryptographic Method Using VHDLDesign of Tele command SOC-IP by AES Cryptographic Method Using VHDL
Design of Tele command SOC-IP by AES Cryptographic Method Using VHDL
 
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
An Intuitionistic Fuzzy Sets Implementation for Key Distribution in Hybrid Me...
 
F33022028
F33022028F33022028
F33022028
 
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
Optimal Operating Performances of Wireless Protocols for Intelligent Sensors ...
 
Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network Models
 
L010527175
L010527175L010527175
L010527175
 
Efficiency Evaluation Metrics for Wireless Intelligent Sensors Applications
Efficiency Evaluation Metrics for Wireless Intelligent Sensors ApplicationsEfficiency Evaluation Metrics for Wireless Intelligent Sensors Applications
Efficiency Evaluation Metrics for Wireless Intelligent Sensors Applications
 
Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021
 
Manet mobile ad hoc network – challenges, security and protocols-2
Manet  mobile ad hoc network  – challenges, security and protocols-2Manet  mobile ad hoc network  – challenges, security and protocols-2
Manet mobile ad hoc network – challenges, security and protocols-2
 
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...
 
Bn4301364368
Bn4301364368Bn4301364368
Bn4301364368
 
Efficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor NetworksEfficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor Networks
 
METHODOLOGIES AND CHALLENGES OF WSN FOR IOT
METHODOLOGIES AND CHALLENGES OF WSN FOR IOT METHODOLOGIES AND CHALLENGES OF WSN FOR IOT
METHODOLOGIES AND CHALLENGES OF WSN FOR IOT
 

Destacado

Model for prediction of temperature distribution in workpiece for surface gri...
Model for prediction of temperature distribution in workpiece for surface gri...Model for prediction of temperature distribution in workpiece for surface gri...
Model for prediction of temperature distribution in workpiece for surface gri...iaemedu
 
Improving performance and development of two stage reciprocating compressors
Improving performance and development of two stage reciprocating compressorsImproving performance and development of two stage reciprocating compressors
Improving performance and development of two stage reciprocating compressorsiaemedu
 
Design and development of an automotive vertical doors opening system avdos
Design and development of an automotive vertical doors opening system avdosDesign and development of an automotive vertical doors opening system avdos
Design and development of an automotive vertical doors opening system avdosiaemedu
 
Assignment of cells to switches using firefly algorithm
Assignment of cells to switches using firefly algorithmAssignment of cells to switches using firefly algorithm
Assignment of cells to switches using firefly algorithmiaemedu
 
Assignment of cells to switches using firefly
Assignment of cells to switches using fireflyAssignment of cells to switches using firefly
Assignment of cells to switches using fireflyiaemedu
 
Speed adaptive mobile ip over wireless lan
Speed adaptive mobile ip over wireless lanSpeed adaptive mobile ip over wireless lan
Speed adaptive mobile ip over wireless laniaemedu
 
High performance parallel prefix adders with fast carry chain logic
High performance parallel prefix adders with fast carry chain logicHigh performance parallel prefix adders with fast carry chain logic
High performance parallel prefix adders with fast carry chain logiciaemedu
 
Effect of punch profile radius and localised compression
Effect of punch profile radius and localised compressionEffect of punch profile radius and localised compression
Effect of punch profile radius and localised compressioniaemedu
 
Parallel Prefix Adders Presentation
Parallel Prefix Adders PresentationParallel Prefix Adders Presentation
Parallel Prefix Adders PresentationPeeyush Pashine
 

Destacado (9)

Model for prediction of temperature distribution in workpiece for surface gri...
Model for prediction of temperature distribution in workpiece for surface gri...Model for prediction of temperature distribution in workpiece for surface gri...
Model for prediction of temperature distribution in workpiece for surface gri...
 
Improving performance and development of two stage reciprocating compressors
Improving performance and development of two stage reciprocating compressorsImproving performance and development of two stage reciprocating compressors
Improving performance and development of two stage reciprocating compressors
 
Design and development of an automotive vertical doors opening system avdos
Design and development of an automotive vertical doors opening system avdosDesign and development of an automotive vertical doors opening system avdos
Design and development of an automotive vertical doors opening system avdos
 
Assignment of cells to switches using firefly algorithm
Assignment of cells to switches using firefly algorithmAssignment of cells to switches using firefly algorithm
Assignment of cells to switches using firefly algorithm
 
Assignment of cells to switches using firefly
Assignment of cells to switches using fireflyAssignment of cells to switches using firefly
Assignment of cells to switches using firefly
 
Speed adaptive mobile ip over wireless lan
Speed adaptive mobile ip over wireless lanSpeed adaptive mobile ip over wireless lan
Speed adaptive mobile ip over wireless lan
 
High performance parallel prefix adders with fast carry chain logic
High performance parallel prefix adders with fast carry chain logicHigh performance parallel prefix adders with fast carry chain logic
High performance parallel prefix adders with fast carry chain logic
 
Effect of punch profile radius and localised compression
Effect of punch profile radius and localised compressionEffect of punch profile radius and localised compression
Effect of punch profile radius and localised compression
 
Parallel Prefix Adders Presentation
Parallel Prefix Adders PresentationParallel Prefix Adders Presentation
Parallel Prefix Adders Presentation
 

Similar a Analysis of programming aspects of wireless sensor networks

IRJET- An Overview of Slum Rehabilitation by IN-SITU Technique
IRJET- An Overview of Slum Rehabilitation by IN-SITU TechniqueIRJET- An Overview of Slum Rehabilitation by IN-SITU Technique
IRJET- An Overview of Slum Rehabilitation by IN-SITU TechniqueIRJET Journal
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNIAEME Publication
 
Design of optimal system level for embedded wireless sensor unit
Design of optimal system  level for embedded wireless sensor unitDesign of optimal system  level for embedded wireless sensor unit
Design of optimal system level for embedded wireless sensor unitIAEME Publication
 
DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...
DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...
DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...IJNSA Journal
 
Review on operating systems and routing protocols for wireless sensor
Review on operating systems and routing protocols for wireless sensorReview on operating systems and routing protocols for wireless sensor
Review on operating systems and routing protocols for wireless sensorIAEME Publication
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Applicationijsrd.com
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksAmy Moore
 
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...CSCJournals
 
An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...Alexander Decker
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
 
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...IJCNCJournal
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...ijwmn
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...ijwmn
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...ijwmn
 
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORKLIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORKJournal For Research
 
A_Middleware_based_on_Service_Oriented_Architectur.pdf
A_Middleware_based_on_Service_Oriented_Architectur.pdfA_Middleware_based_on_Service_Oriented_Architectur.pdf
A_Middleware_based_on_Service_Oriented_Architectur.pdf12rno
 
International Journal of Engineering (IJE) Volume (2) Issue (1)
International Journal of Engineering (IJE) Volume (2)  Issue (1)International Journal of Engineering (IJE) Volume (2)  Issue (1)
International Journal of Engineering (IJE) Volume (2) Issue (1)CSCJournals
 

Similar a Analysis of programming aspects of wireless sensor networks (20)

IRJET- An Overview of Slum Rehabilitation by IN-SITU Technique
IRJET- An Overview of Slum Rehabilitation by IN-SITU TechniqueIRJET- An Overview of Slum Rehabilitation by IN-SITU Technique
IRJET- An Overview of Slum Rehabilitation by IN-SITU Technique
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
 
Design of optimal system level for embedded wireless sensor unit
Design of optimal system  level for embedded wireless sensor unitDesign of optimal system  level for embedded wireless sensor unit
Design of optimal system level for embedded wireless sensor unit
 
DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...
DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...
DESIGN ISSUES ON SOFTWARE ASPECTS AND SIMULATION TOOLS FOR WIRELESS SENSOR NE...
 
Review on operating systems and routing protocols for wireless sensor
Review on operating systems and routing protocols for wireless sensorReview on operating systems and routing protocols for wireless sensor
Review on operating systems and routing protocols for wireless sensor
 
Ijnsa050204
Ijnsa050204Ijnsa050204
Ijnsa050204
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
 
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
Wideband Sensing for Cognitive Radio Systems in Heterogeneous Next Generation...
 
40120140503011
4012014050301140120140503011
40120140503011
 
An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...An efficient transport protocol for delivery of multimedia content in wireles...
An efficient transport protocol for delivery of multimedia content in wireles...
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
 
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
 
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
VIRTUAL ARCHITECTURE AND ENERGYEFFICIENT ROUTING PROTOCOLS FOR 3D WIRELESS SE...
 
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORKLIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
LIFETIME IMPROVEMENT USING MOBILE AGENT IN WIRELESS SENSOR NETWORK
 
A_Middleware_based_on_Service_Oriented_Architectur.pdf
A_Middleware_based_on_Service_Oriented_Architectur.pdfA_Middleware_based_on_Service_Oriented_Architectur.pdf
A_Middleware_based_on_Service_Oriented_Architectur.pdf
 
50120130406028 2
50120130406028 250120130406028 2
50120130406028 2
 
International Journal of Engineering (IJE) Volume (2) Issue (1)
International Journal of Engineering (IJE) Volume (2)  Issue (1)International Journal of Engineering (IJE) Volume (2)  Issue (1)
International Journal of Engineering (IJE) Volume (2) Issue (1)
 

Más de iaemedu

Tech transfer making it as a risk free approach in pharmaceutical and biotech in
Tech transfer making it as a risk free approach in pharmaceutical and biotech inTech transfer making it as a risk free approach in pharmaceutical and biotech in
Tech transfer making it as a risk free approach in pharmaceutical and biotech iniaemedu
 
Integration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesIntegration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesiaemedu
 
Effective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridEffective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridiaemedu
 
Effect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routingEffect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routingiaemedu
 
Adaptive job scheduling with load balancing for workflow application
Adaptive job scheduling with load balancing for workflow applicationAdaptive job scheduling with load balancing for workflow application
Adaptive job scheduling with load balancing for workflow applicationiaemedu
 
Survey on transaction reordering
Survey on transaction reorderingSurvey on transaction reordering
Survey on transaction reorderingiaemedu
 
Semantic web services and its challenges
Semantic web services and its challengesSemantic web services and its challenges
Semantic web services and its challengesiaemedu
 
Website based patent information searching mechanism
Website based patent information searching mechanismWebsite based patent information searching mechanism
Website based patent information searching mechanismiaemedu
 
Revisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationRevisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationiaemedu
 
Prediction of customer behavior using cma
Prediction of customer behavior using cmaPrediction of customer behavior using cma
Prediction of customer behavior using cmaiaemedu
 
Performance analysis of manet routing protocol in presence
Performance analysis of manet routing protocol in presencePerformance analysis of manet routing protocol in presence
Performance analysis of manet routing protocol in presenceiaemedu
 
Performance measurement of different requirements engineering
Performance measurement of different requirements engineeringPerformance measurement of different requirements engineering
Performance measurement of different requirements engineeringiaemedu
 
Mobile safety systems for automobiles
Mobile safety systems for automobilesMobile safety systems for automobiles
Mobile safety systems for automobilesiaemedu
 
Efficient text compression using special character replacement
Efficient text compression using special character replacementEfficient text compression using special character replacement
Efficient text compression using special character replacementiaemedu
 
Agile programming a new approach
Agile programming a new approachAgile programming a new approach
Agile programming a new approachiaemedu
 
Adaptive load balancing techniques in global scale grid environment
Adaptive load balancing techniques in global scale grid environmentAdaptive load balancing techniques in global scale grid environment
Adaptive load balancing techniques in global scale grid environmentiaemedu
 
A survey on the performance of job scheduling in workflow application
A survey on the performance of job scheduling in workflow applicationA survey on the performance of job scheduling in workflow application
A survey on the performance of job scheduling in workflow applicationiaemedu
 
A survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksA survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksiaemedu
 
A novel approach for satellite imagery storage by classify
A novel approach for satellite imagery storage by classifyA novel approach for satellite imagery storage by classify
A novel approach for satellite imagery storage by classifyiaemedu
 
A self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imageryA self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imageryiaemedu
 

Más de iaemedu (20)

Tech transfer making it as a risk free approach in pharmaceutical and biotech in
Tech transfer making it as a risk free approach in pharmaceutical and biotech inTech transfer making it as a risk free approach in pharmaceutical and biotech in
Tech transfer making it as a risk free approach in pharmaceutical and biotech in
 
Integration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniquesIntegration of feature sets with machine learning techniques
Integration of feature sets with machine learning techniques
 
Effective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridEffective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using grid
 
Effect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routingEffect of scenario environment on the performance of mane ts routing
Effect of scenario environment on the performance of mane ts routing
 
Adaptive job scheduling with load balancing for workflow application
Adaptive job scheduling with load balancing for workflow applicationAdaptive job scheduling with load balancing for workflow application
Adaptive job scheduling with load balancing for workflow application
 
Survey on transaction reordering
Survey on transaction reorderingSurvey on transaction reordering
Survey on transaction reordering
 
Semantic web services and its challenges
Semantic web services and its challengesSemantic web services and its challenges
Semantic web services and its challenges
 
Website based patent information searching mechanism
Website based patent information searching mechanismWebsite based patent information searching mechanism
Website based patent information searching mechanism
 
Revisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationRevisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modification
 
Prediction of customer behavior using cma
Prediction of customer behavior using cmaPrediction of customer behavior using cma
Prediction of customer behavior using cma
 
Performance analysis of manet routing protocol in presence
Performance analysis of manet routing protocol in presencePerformance analysis of manet routing protocol in presence
Performance analysis of manet routing protocol in presence
 
Performance measurement of different requirements engineering
Performance measurement of different requirements engineeringPerformance measurement of different requirements engineering
Performance measurement of different requirements engineering
 
Mobile safety systems for automobiles
Mobile safety systems for automobilesMobile safety systems for automobiles
Mobile safety systems for automobiles
 
Efficient text compression using special character replacement
Efficient text compression using special character replacementEfficient text compression using special character replacement
Efficient text compression using special character replacement
 
Agile programming a new approach
Agile programming a new approachAgile programming a new approach
Agile programming a new approach
 
Adaptive load balancing techniques in global scale grid environment
Adaptive load balancing techniques in global scale grid environmentAdaptive load balancing techniques in global scale grid environment
Adaptive load balancing techniques in global scale grid environment
 
A survey on the performance of job scheduling in workflow application
A survey on the performance of job scheduling in workflow applicationA survey on the performance of job scheduling in workflow application
A survey on the performance of job scheduling in workflow application
 
A survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networksA survey of mitigating routing misbehavior in mobile ad hoc networks
A survey of mitigating routing misbehavior in mobile ad hoc networks
 
A novel approach for satellite imagery storage by classify
A novel approach for satellite imagery storage by classifyA novel approach for satellite imagery storage by classify
A novel approach for satellite imagery storage by classify
 
A self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imageryA self recovery approach using halftone images for medical imagery
A self recovery approach using halftone images for medical imagery
 

Analysis of programming aspects of wireless sensor networks

  • 1. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – INTERNATIONAL JOURNAL OF ELECTRONICS AND 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) ISSN 0976 – 6464(Print) ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), pp. 219-226 IJECET © IAEME: www.iaeme.com/ijecet.asp Journal Impact Factor (2012): 3.5930 (Calculated by GISI) ©IAEME www.jifactor.com ANALYSIS OF PROGRAMMING ASPECTS OF WIRELESS SENSOR NETWORKS AND NON UNIFORMITY ISSUES-A FEASIBLE STUDY Mrs.R.Rajasreea, Dr.G.Kalivarathanb a Research Scholar, CMJ University, Meghalaya, Shillong, b Principal, PSN Institute of Technology and Science, Tirunelveli, Tamilnadu, Supervisor CMJ university, Shillong. ABSTRACT: Advances in wireless communications and relevancy of hardware gears have enabled the progress of low-cost, low-power and multifunctional sensor nodes. These clusters are small in size and correspond in short distances over a radio frequency channel. These minute nodes, which consist of sensing, data processing and communicating gears, capture the purposes of sensor networks. The perception of Wireless Sensor Networks (WSNs) was originally proposed in 1999 about “smart dust” computers that can be scattered on the barricade, deployed anywhere throughout the upbringing, and work in partnership to solve big troubles. Later on, WSNs found their way into a wide variety of applications with vastly varying requirements and attributes. According to a far and wide acknowledge definition, a WSN is unruffled of a large quantity of amalgamated sensor nodes that are opaquely deployed either inside a phenomenon or very close to it, and join forces through a wireless network in assembling ecological information or reacting to specific events. To appraise the different parts of the intend framework, we always analyze our solutions from two complementary perspectives. On one hand, we compute the programming exertion in developing non-insignificant reference test use-cases both using our solutions and with conventional programming tools. On the other hand, we explore the system performance based on metrics such as complex overhead, energy in the clouds, and reserve usage. In this paper, it is to follow a short path that will review the networks starting from natural networks, running throughout human networks and finally, coming to computer networks. Moreover, we will point out the accepted wireless shift in surroundings, networks tends to move wireless to be more proficient and to grow up at a higher rate. In toting up to non uniformity analyses have to be carried out by the use of Wireless sensor networks (WSNs). Keywords: Wireless sensor networks (WSNs), Non Uniformity, Programming exertion, Sensor nodes, Data Processing, Channels, Routing. 219
  • 2. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME 1. INTRODUCTION This exposition focuses on this issue and presents a set of WSN programming frameworks that simplify application development in a range of settings, from static deployments with predefined and constant conditions to dynamic deployments with changing and unpredictable requirements. In particular, the contributions of this thesis are mainly within the following four areas. The first part presents a distributed middleware system, called WiSeKit, to enable adaptation and reconfiguration of WSN applications in ubiquitous and context-aware environments. WiSeKit proposes a middleware software framework that formulates the process of adaptive WSN application development and abstracts the underlying technological adaptation processes. The adaptation strategy is inspired by the main activities of the feedback control loop, including context-awareness, adaptation reasoning, and software reconfiguration. In particular, it introduces a novel context processing model to monitor various context information in WSNs. The analyzed context data is delivered to a hierarchical adaptation reasoning framework to make decisions about what adaptation to perform. Finally, WiSeKit proposes a component-based reconfiguration approach to implement the adaptation choices. The second part of this thesis presents a new component-based programming model for WSNs, called Remora. This programming abstraction is proposed not only to simplify programming in WSNs, but also to address the third goal of WiSeKit component-based reconfiguration. Remora offers a well- structured programming paradigm that fits very well with resource limitations of WSNs. Furthermore, the special attention to event handling, in Remora makes it more practical for WSN applications, which are inherently event-driven. More importantly, the mutualism between Remora and underlying system software promises a new direction towards separation of concerns in WSNs. In the third part, we reconsider Remora in order to extend it with the capability of compositional component reconfiguration and therefore meet the component-based reconfiguration requirement of WiSeKit. The dynamicity of Remora is achieved by the, principle of in-situ reconfigurability, referring to minimizing the overhead of component reconfiguration through a set of in-situ updating guidelines. This is achieved within RemoWare, a run-time system leveraging on the concept of in-situ reconfigurability to allow component-based reprogramming in WSNs. New binary update preparation, code distribution, run-time linking, dynamic memory allocation and loading, and system state preservation are the main features supported by RemoWare. The last contribution of this thesis is dedicated to providing a software framework for WSNs that enables the development of distributed sensor services and their integration with existing IT systems. This is achieved by extending Remora with an interaction model inspired by the REST architectural style in order to facilitate interoperability of sensor services with the Internet through Web service-enabled components. The provision of such framework is very important in WiSeKit when processing context information provided by heterogeneous nodes in the network. To evaluate the different parts of the proposed framework, we always analyze our solutions from two complementary perspectives. On one hand, we quantify the programming effort in developing non-trivial reference test use-cases both using our solutions and with mainstream programming tools. On the other hand, we explore the system performance based on metrics such as network overhead, energy overhead, and resource usage. 220
  • 3. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME 2. PROGRAMMING ASPECTS 2.1Smart Home Solutions: The project mainly focuses on prediction algorithms to guide decisions for controlling devices throughout the home. These algorithms include the Smart home Inhabitants Prediction algorithm (that matches more recent sequences of events with stored sequences), Active LeZi algorithm (that applies information theory principles to process historical actions sequences) and a Task Based Markov Model algorithm (for identifying high level tasks in action sequences). Benefiting from the DigiHome extensibility and concern isolation, these algorithms can be incorporated into the CEP engine in order to make our service-oriented platform more intelligent and autonomous in respect to the adaptation decisions. Fig.1 Interactions between Smart Home devices 2.2 Context Dissemination: CORTEX defines sentient objects as autonomous entities that have the capacity of retrieving, processing, and sharing context information using HTTP and SOAP. MUSIC middleware is another decentralized solution that proposes a peer-to-peer infrastructure dealing with context mediation. The decentralized approaches face the problem of fault tolerance by distributing the information across several machines. However, as well as some centralized solutions, the lack of flexibility in terms of the communication protocols remains a key limitation for these approaches. In addition to that, peer-to peer approaches have performance and security problems. In DigiHome, we provide a solution, where the different interacting devices can process the events retrieved from the environment. Furthermore, in DigiHome we provide flexibility in terms of interaction by supporting different kinds of communication protocols and we also allow spontaneous interoperability. 221
  • 4. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME 2.3 Wireless Sensor Networks Agimone is a middleware solution supporting the integration of WSNs and IP networks. It focuses on the distribution and coordination of WSN applications across WSN boundaries. Agimone integrates the Agilla and Limone middleware platforms. Agimone is a general-purpose middleware with a uniform programming model for applications that integrates multiple WSNs and the IP network. In our approach, we also promote the integration of sensor nodes via Service component architecture (SCA) bindings. Moreover, we enable spontaneous communications with some sensor nodes that execute a lightweight version of DigiHome. 2.4 Complex Event Processing An Event-Driven Architecture (EDA) that combines the advantages of WSN with CEP is presented. They use an extension of the RFID EPC global architecture which allows the interaction of RFID and WSN events. Once the events are collected, they use CEP to detect specific situations. They use a smart shelf application as their scenario to show how the events from both sources can be combined. Even though both technologies seem to interact in their project, their specification is somehow limited because they do not specify how the information obtained could be used, other than generating a report that will be logged in the EPCIS server. Fig. 2 Digi home Architecture 2.5 A Programming Model for Adaptive WSNs. We have proposed a new component based programming model to simplify application development in WSNs, as well as to support the component-based reconfiguration mechanism proposed in the WiSeKit middleware. This component model, called Remora, addresses high-level event driven programming in WSNs through a component-based approach. As a SCA compliant component model, Remora introduces a widely-accepted component programming approach which is specialized for WSNs and embedded systems, and at the same time it attracts PC-based developers to programming in WSNs. To ensure portability of Remora components towards different OSs, the Remora component framework is integrated with the underlying operating system through a well-defined OS-abstraction layer. Since WSN software is inherently event-driven, Remora introduces an efficient way for describing and implementing event-based interactions between software components. This abstraction also aims at simplifying OS- level events processing by translating them to event entities that can be easily integrate to the proposed component model. This component model has been successfully deployed and tested on the TelosB sensor nodes with the Contiki operating system. 222
  • 5. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME 2.6 Non uniformity In the non-uniformity is related to the concept of non-uniform information granularity. The non- uniform information granularity is related to the concept of accuracy of information. The paper states that the required accuracy, or precision, of information is proportional to the distance between the producer and the consumer of the information. Another result is, in which the non-uniformity is related to information sampling from the network itself. The authors provide a method to perform data sampling from a sensor network with approximately uniform methods. Even when a network is non-uniformly distributed (they study the case in which the nodes are hand distributed into a building to monitor it), the authors pick data from the network uniformly. This is possible because the sensors space is normalized to a uniform space using Voronoi regions computed in a distributed fashion. 2.7 Data Management The basic services necessary to the good work of a data management system: (i) Network programming, in which the sensors are programmed to replay to queries (set up of routes, data aggregation strategies etc.). (ii) Data acquisition and in-network aggregation, in which the data is physically acquired by transceivers and refined to produce more useful streams. (iii) Data retrieval, that provides the collection of data by an external entity. In the literature, we can identify four main models to data management: namely external storage, directed diffusion, data centric storage, and database model. Each one of these models implements a part or all the above services. The services provided by these models are summarized in Table1. Table1: Correspondence between models and Services External Storage Directed Data centric Database Model Diffusion Storage Network No Yes No yes encoding Data attainment and in- Partially Partially Yes Yes networking Processing Data reclamation yes yes yes yes 3.0 Experimental Analysis of Programming and non uniformity In order to test DigiHome, we have employed two MacBook Pro laptops, with the following software and hardware configuration: 2.4 GHz processor, 2 GB of RAM, AirPort Extreme card, Mac OS X 10.5.6 (kernel Darwin 9.6.0), Java Virtual Machine 1.6.0, and Julia 2.5.2. The mobile client used in the tests is a Nokia N800 Internet Tablet with 400 Mhz, 128 MB of RAM, interface WLAN 802.11 b/e/g, Linux Maemo (kernel 2.6.21), CACAOVM Java Virtual Machine 0.99.4, and Julia 2.5.2. The latency for disseminating, as well as for discovering context, confirms that DigiHome can integrate heterogeneous entities with a reasonable performance overhead. Furthermore, according to the documentation provided by Esper, the efficiency of the engine to process the events is such that it exceeds over 500,000 events per second on a workstation and between 70, 000 and 200, 000 events per second running on an average laptop. Thanks to the efficiency of the engine, the use of event processing in our system can be done at a low cost and given the modularity of our architecture, the Esper engine can be installed min the device that provides the highest processing power. In the context of the DigiHome platform, we observed that Esper took 1ms on average to process the adaptation rules. 223
  • 6. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME Table 2 Performance of the DigiHome Platform No .of Retrieval latency Retrieval latency Discovery Discovery Providers ( Local Providers) ( Remote Providers) latency latency ( Local ( Remote Providers) Providers) Object JSON XML Object JSON XML SLP UPnP SLP UPnP (ms) (ms) (ms) (ms) (ms) (ms) (ms) (ms) (ms) (ms) 2 48 47 63 163 176 182 18 25 59 77 4 65 90 92 360 377 381 40 52 120 147 10 146 150 310 420 427 445 80 104 240 317 20 304 356 333 1094 1047 1539 161 290 540 750 100 950 1500 1600 2300 2320 2380 742 981 2196 2194 200 1750 2987 3154 4578 4643 4791 1465 1835 4032 4251 N800 N/A N/A N/A 367 385 N/A N/A N/A 132 139 We wanted this operation to be as efficient as possible, still knowing that the uniformity assumption costs nothing and that it is not possible to be as cheap as nothing. To get rid of this problem, the Stripes family of protocols uses an aggressive caching technique. As a closing remark on the non- uniformity problem in WSNs, we have to point out two things: (i) systems are non-uniformity proof by their design (ii) non-uniformity proof choices can have a reasonable cost. 4.0 Experimental consequences In the local tests, we executed the DigiHome core and the DigiHome objects in different virtual machines on the same laptop. In the distributed measures we used one laptop as Controller, and the other laptop and the Nokia device as information providers. For discovery, we selected the UPnP and SLP protocols. In the tests, the platform aggregates the user’s preferences to reduce the number of messages exchanged between the provider and the consumer. As expected, when the providers are increased, the context exchange with object serialization is more efficient than the JSON and XML representations. Furthermore, the network usage introduces an overhead of approximately 300%. Finally, we tested our solution using a Nokia Internet Tablet as a preference provider. As it can be seen, the use of this mobile device introduces an additional but still acceptable overhead for discovery and information exchange. This increase in cost is expected because of the limited resources of this kind of devices. Fig. 3 Comparative Cost of the Protocols (40 Watch Points) In Fat-Stripes, such long perimeters becomes an advantage because a lot of sensors, belonging to the external perimeter of the network, become caches for the replays to all the queries directed outside the network: less nodes will need to query the network for the density and a cache ring, around the external perimeter, is able to cache replays for more watch-points. 224
  • 7. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME 5.0 Conclusion In this Investigation, DigiHome, a platform addressing the mobility, heterogeneity, and adaptation of smart entities have attempted to an optimum level with different configuration suitable for a specified application. In focus, DigiHome detects adaptation situations by integrating context information using an SCA based architecture. This architecture exhibits and improves the modularization of concerns and fosters the application of the REST principles by exploiting the SCA extensibility. The simplicity and data orientation of REST, combined with the SCA independence of implementation technologies, make Digi Home an attractive solution to deal with heterogeneity in terms of interactions. The definition and application of ubiquitous bindings in the platform enable intensified communication by means of standard protocols (e.g., UPnP and SLP), and furnish context provider selection (based on QoC attributes). On the other hand, the modularized architecture of DigiHome allows the definition of variants for the platform, called DigiHome objects that can be deployed on resource-constrained devices. The functionality of these objects is exposed as services, accessible via several protocols, which can be accessed by clients that do not have to be part of the platform. Furthermore, the clear separation of concerns in the DigiHome architecture encourages the exploitation of WSNs for simple processing and local decision making. The suitability of our platform for context integration was evaluated with different discovery and context representations. For the first one, we need to develop a kind of non-uniformity consciousness into the design procedure of WSNs protocols and we need to take care of a couple of things in the design process. Every time we need use concepts such as neighbor’s number and nodes density in some protocol design step, we need to remember that these concepts can be relative to the position of the nodes in the network and that nodes position and nodes density will be available only at run time. For the second one, we need to take into account the problem that finding out the network density has a cost and that we have to keep it as low as possible. Stripes are a general solution to find out the network density and it works on the whole network. Stripes uses caches and fixed sampling points to find out the network density. Both these two ideas help the protocol to be as efficient as possible. However, a normalized focus on algorithm based programming is investigated along with feasibility of usages in the context of WSNs and the inexact differential aspects of non uniformity is also predicted accordingly up to a reasonable extent. REFERENCES [1] D. Romero, G. Hermosillo, A. Taherkordi, R. Nzekwa, R. Rouvoy, and F. Eliassen, “Restful integration of heterogeneous devices in pervasive environments,” in DAIS ’10: Proc. of the 10th IFIP Int. Conf. on Distributed Applications and Interoperable Systems, ser. LNCS, vol. 6115. Springer, 2010, pp. 1–14. [2] Open SOA, “Service Component Architecture Specifications,” Nov. 2007. [3] R. T. Fielding, “Architectural styles and the design of network-based software architectures,” Ph.D. dissertation, University of California, Irvine, 2000. [4] D. C. Luckham, The Power of Events: An Introduction to Complex Event Processing in Distributed Enterprise Systems. Boston, USA: Addison-Wesley Longman Pub. Co., Inc., 2001. [5] L.Seinturier, P.Merle, D.Fournier, N. Dolet, V. Schiavoni, and J.-B. Stefani, “Reconfigurable sca applications with the frascati platform,” in SCC ’09: Proc. of the IEEE Int. Conf. on Services Computing. Washington, DC, USA: IEEE Computer Society, Sep. 2009, pp. 268–275. 225
  • 8. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 3, Issue 3, October- December (2012), © IAEME [6] R.Melisson, P.Merle, D.Romero, R.Rouvoy, and L.Seinturier, “Reconfigurable runtime support for distributed service component architectures,” in Automated Software Engineering, Tool Demonstration, Belgium, 2010. [7] E.Bruneton, T.Coupaye, M.Leclercq, V.Quema, and J.-B.Stefani, “The Fractal component model and its support in java,” Soft. Pract. and Exp., vol. 36, no. 11-12, pp. 1257–1284, 2006. [8] Listeners Considered Harmful: The Whiteboard Pattern, OSGi Alliance, 2004. [9] A.Taherkordi, F.Loiret, A.Abdolrazaghi, R.Rouvoy, Q.L.Trung, and F.Eliassen, “Programming sensor networks using Remora component model,” in DCOSS ’10: Proc. of the 6th Int. Conf. on Distributed Computing in Sensor Systems. USA: Springer, 2010, pp. 45–62. [10] D. Romero, R. Rouvoy, L. Seinturier, and P. Carton, “Service discovery in ubiquitous feedback control loops,” in DAIS ’10: Proc. of the 10th IFIP Int. Conf. on Distributed Applications and Interoperable Systems, ser. LNCS, vol. 6115. Springer, june 2010, pp.113–126. [11] UPnP Forum, “UPnP Device Architecture 1.0,” http://www.upnp.org/resources/documents.asp, Apr. 2008. [12] E. Guttman, C. Perkins, J. Veizades, and M. Day, “Service Location Protocol, Version 2. RFC 2608 (Proposed Standard),” http://tools.ietf.org/html/rfc2608, Jun. 1999. [13] M. Krause and I. Hochstatter, “Challenges in modelling and using quality of context (qoc),” in Proc. of the 2nd Int. Workshop on Mobility Aware Technologies and Applications, Montreal, Canada, 2005, pp. 324–333. [14] EsperTech, “Esper,” http://esper.codehaus.org. [15] D. Romero, R. Rouvoy, L. Seinturier, and F. Loiret, “Integration of heterogeneous context resources in ubiquitous environments,” in SEAA ’10: Proc. of the 36th EUROMICRO Int. Conf. on Software Engineering and Advanced Applications. Lille, France: ACM, 2010, p. 4. 226