SlideShare a Scribd company logo
1 of 4
Download to read offline
Sri Chandhana Pothula, R.Suguna, A.Chrispin Jiji / International Journal of Engineering
Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.186-189
186 | P a g e
Neighbor Node Discovery in Asynchronous Sensor Networks
Sri Chandhana Pothula1
, R.Suguna2
, A.Chrispin Jiji3
Student1, Asst. Professor2, Asst.Professor3
Department of Electronics and Communication1,2
The Oxford College of Engineering1, 2, Bangalore-560068, Karnataka, India
Abstract
A sensor network may contain a huge
number of simple sensor nodes that are deployed
at some inspected site. In large areas, such a
network usually has a mesh structure .In most
sensor networks the nodes are static .Nevertheless
,node connectivity is subject to changes because
of disruptions in wireless communication,
transmission power changes, or loss of
synchronization between neighbouring nodes.
Hence, even after a sensor is aware of its
immediate neighbours, it must continuously
maintain its view, a process we call continuous
neighbour discovery. In this work we distinguish
between neighbour Discovery during sensor
network initialization and continuous neighbour
discovery. We focus on the latter and view it as a
joint task of all the nodes in every connected
segment. Each sensor employs a simple protocol
in a coordinate effort to reduce power
consumption without increasing the time
required to detect hidden sensors.
I. INTRODUCTION
In the sensor network model considered in
this work, the nodes are placed randomly over the
area of interest and their first step is to detect their
immediate neighbors - the nodes with which they
have a direct wireless communication - and to
establish routes to the gateway. In networks with
continuously heavy traffic, the sensors need not
invoke any special neighbor discovery protocol
during normal operation. This is because any new
node, or a node that has lost connectivity to its
neighbors, can hear its neighbors simply by listening
to the channel for a short time. However, for sensor
networks with low and irregular traffic, a special
neighbor discovery scheme should be used.
Despite the static nature of the sensors in
many sensor networks, connectivity is still subject to
changes even after the network has been established.
The sensors must continuously look for new
neighbors in order to accommodate the following
situations:
 Loss of local synchronization due to
accumulated clock drifts.
 Disruption of wireless connectivity between
adjacent nodes by a temporary event, such as a
passing car or animal, a dust storm, rain or
fog. When these events are over, the hidden
nodes must be rediscovered.
 The ongoing addition of new nodes, in some
networks to compensate for nodes which have
ceased to function because their energy has
been exhausted.
 The increase in transmission power of some
nodes, in response to certain events, such as
detection of emergent situations.
For these reasons, detecting new links and
nodes in sensor networks must be considered as an
ongoing process. This work focuses on the
continuous neighbour discovery and views it as a
joint task of all the nodes in every connected
segment. Each sensor employs a simple protocol in a
coordinate effort to reduce power consumption
without increasing the time required to detect
neighbor sensors.
The main idea behind the detection of
hidden neighbour sensor nodes continuously is that
the task of finding a new node u is divided among all
the nodes that can help v to detect u. These nodes are
characterized as follows: (a) they are also
neighbours of u; (b) they belong to a connected
segment of nodes that have already detected each
other; (c) node v also belongs to this segment. Let
degS (u) be the number of these nodes. This variable
indicates the in-segment degree of a hidden
neighbour u. In order to take advantage of the
proposed discovery scheme, node v must estimate
the value of degS (u).
The remainder of the paper is organized as
follows. In Section 2, the basic schemes are
provided. Estimation values of the indegree of the
neighbor nodes are presented in Section 3. Section 4
presents an algorithm for our findings in section 3
and section 5 describes the simulation results. The
paper is concluded in Section 6.
II. BASIC SCHEMES
There are some particular schemes to be
followed in the detection of hidden nodes in a sensor
network.Detection of these hidden nodes depend on
how they are located and also how they are
connected.Two nodes are said to be neighbouring
nodes if they have direct wireless connectivity. We
assume that all nodes have the same transmission
range, which means that connectivity is always
bidirectional. During some parts of our analysis, we
Sri Chandhana Pothula, R.Suguna, A.Chrispin Jiji / International Journal of Engineering
Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.186-189
187 | P a g e
also assume that the network is a unit disk graph;
namely, any pair of nodes that are within
transmission range are neighbouring nodes.Consider
a pair of neighbouring nodes that belong to the same
segment but are not aware that they have direct
wireless connectivity. See, for example, nodes a and
c in Figure 2(a). These two nodes can learn about
their hidden wireless link using the following simple
scheme, which uses two message types: (a) SYNC
messages for synchronization between all segment
nodes, transmitted over known wireless links; (b)
HELLO messages for detecting new neighbours.
Fig- 2(a) & (b) Segments with hidden nodes and
links
Scheme 1 (detecting all hidden links inside a
segment):
This scheme is invoked when a new node is
discovered by one of the segment nodes. The
discovering node issues a special SYNC message to
all segment members, asking them to wake up and
periodically broadcast a bunch of HELLO messages.
This SYNC message is distributed over the already
known wireless links of the segment. Thus, it is
guaranteed to be received by every segment node.
When scheme 1 is used,a hidden node is discovered
by all of its in-segment neighbours as soon as it is
discovered by the first of them. If scheme 1 is not
used ,node u discovers all its in-segment hidden
neighbours one by one. The expected delay in this
case is the expected delay until the first discovery in
a set of m neighbours plus the expected delay until
the first discovery in a set of m-1 neighbours and so
on.
Scheme 1 allows two neighbouring nodes u
and v to discover each other if they belong to a
connected segment. However, in order for two
neighbours not yet connected to the same segment to
detect each other, each node should also execute the
following scheme:
Scheme 2 (detecting a hidden link outside a
segment):Node u wakes up randomly, every T (u)
seconds on the average, for a fixed period of time
H.During this time it broadcasts several HELLO
messages, and listens for possible HELLO messages
sent by new neighbours. The value of T (u) is as
follows:
 T (u) = TI , if node u is in the Init state.
 T (u) = TN(u), if node u is in the Normal
state
By Scheme 1, the discovery of an
individual node by any node in a segment leads to
the discovery of this node by all of its neighbours
that are part of this segment. Therefore, discovering
a node that is not yet in the segment can be
considered a joint task of all the neighbours of this
node in the segment. As an example, consider Figure
2(a), which shows a segment S and a hidden node u.
In this figure, a dashed line indicates a hidden
wireless link, namely, a link between two nodes that
have not yet discovered each other. A thick solid line
indicates a known wireless link. After execution of
Scheme 1, all hidden links in S are detected (see
Figure 2(b)). The links connecting nodes in S to u
are not detected because u does not belong to the
segment. Node u has 4 hidden links to nodes in S.
Hence, we say that the degree of u in S is degS (u) =
4. When u is discovered by one of its four
neighbours in S, it will also be discovered by the rest
of its neighbours in S as soon as Scheme 1 is
reinvoked. Consider one of the four segment
members that are within range of u, node v say.
Although it may know about the segment members
within its own transmission range, it does not know
how many in-segment neighbours participate in
discovering u. In the next section we study three
methods that allow v to estimate the value of degS
(u) for a hidden node u, and compare their accuracy
and applicability.
III. ESTIMATING THE DEGREE
We consider the discovery of hidden
neighbors as a joint task to be performed by all
segment nodes. To determine the discovery load to
be imposed on every segment node, namely, how
often such a node should become active and send
HELLO messages, we need to estimate the number
of in-segment neighbors of every hidden node
u,denoted by degS(u). In this section we present
methods that can be used by node v in the
continuous neighbour discovery state to estimate this
value. Node u is assumed to not yet be connected to
the segment, and it is in the initial neighbor
discovery state.Three methods are presented:
 Node v measures the average in-segment
degree of the segment's nodes, and uses this number
as an estimate of the in-segment degree of u. The
average in-segment degree of the segment's nodes
can be calculated by the segment leader. To this end,
it gets from every node in the segment a message
indicating the in-segment degree of the sending
node, which is known due to Scheme 1.
Sri Chandhana Pothula, R.Suguna, A.Chrispin Jiji / International Journal of Engineering
Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.186-189
188 | P a g e
 Node v discovers, using Scheme 1, the
number of its in-segment neighbors, degS(v), and
views this number as an estimate of degS(u). This
approach is expected to yield better results than the
previous one when the degrees of neighboring nodes
are strongly correlated.
 Node v uses the average in-segment degree
of its segment's nodes and its own in-segment degree
degS(v) to estimate the number of node u's
neighbors. This approach is expected to yield the
best results if the correlation between the in-segment
degrees of neighbouring nodes is known.
The in-segment degree of v and u depends on how
the various nodes are distributed in the network. The
above three methods for finding the estimations
results in some MSEs which are tabularized as
shown below with the corresponding degS(u) value.
Table-1 : The three methods and their MSEs
Further we have proposed an algorithm which will
be using one of the three methods presented above.
IV. ALGORITHM
In this section this work presents an
algorithm for assigning HELLO message frequency
to the nodes of the same segment. This algorithm is
based on detecting all hidden links inside a segment.
Namely, if a hidden node is discovered by one of its
segment neighbors, it is discovered by all its other
segment neighbors after a very short time. Hence,
the discovery of a new neighbor is viewed as a joint
effort of the whole segment. One of the three
methods presented in Section 3 is used to estimate
the number of nodes participating in this effort.
Suppose that node u is in initial neighbor discovery
state, where it wakes up every TI seconds for a
period of time equal to H, and broadcasts HELLO
messages. Suppose that the nodes of segment S
should discover u within a time period T with
probability P. Each node v in the segment S is in
continuous neighbor discovery state, where it wakes
up every TN(v) seconds for a period of time equal to
H and broadcasts HELLO messages.
We assume that, in order to discover each
other, nodes u and v should have an active period
that overlaps by at least a portion δ, 0 < δ < 1, of
their size H. Thus, if node u wakes up at time t for a
period of H, node v should wake up between t - H(1
- δ) and t + H(1 - δ). The length of this valid time
interval is 2H(1 - δ). Since the average time interval
between two wake-up periods of v is TN(v), the
probability that u and v discover each other during a
specific HELLO interval of u is 2H(1 - δ ) / TN(v) .
Let n be the number of in-segment neighbors of u.
When u wakes up and sends HELLO messages, the
probability that at least one of its n neighbors is
awake during a sufficiently long time interval is 1 -
(1 - 2H(1 - δ) /TN(v) )n
.
Consider a division of the time axis of u
into time slots of length H. The probability that u is
awake in a given time slot is H / TI, and the
probability that u is discovered during this time slot
is P1 = H / TI(1 - (1 - 2H(1 - δ)/TN(v) )n
). Denote by
D the value of T/H . Then, the probability that u is
discovered within at most D slots is P2 =1- (1 - p1)D
.
Therefore, we seek the value of TN(v) that satisfies
the following equation:
This can also be stated as
And therefore,
V. SIMULATION RESULTS
The simulation results in this works shows
the discovered neighbours in the network within the
transmission range of 200m.The Overall packets
delivered, the packet delivery ratio and the energy
consumed by the network is also shown in these
results. Below fig:3 shows the neighbour node
detection , fig:4 shows the achieved packet delivery
ratio of the entire network and fig:5 shows the
energy consumption by each node in the network.
Fig 3: continuous neighbor discovery process
Sri Chandhana Pothula, R.Suguna, A.Chrispin Jiji / International Journal of Engineering
Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.186-189
189 | P a g e
TRANSMISSION RANGE: (200m)
The transmission power is 2.0 watts.
Output:
Generated data Packets = 3100
Received data Packets = 2905
Packet Delivery Ratio = 93.7097%
Total Dropped Packets = 195
Routing Overhead = 3600
Forwarded Packets = 66
Average End-to-End Delay per packet = 1.33643
ms
Overall energy consumption by the network:
223.81 Joules
Fig 4: Packet delivery ratio is achieved to 93%
Fig 5: Energy consumption by each node
VI. CONCLUSION
The concern paper work is doing an
investigation of finding neighbour nodes
continuously in wireless sensor networks, referred to
as ongoing continuous neighbor discovery. It argue
that continuous neighbour discovery is crucial even
if the sensor nodes are static. This paper presented
the analytical as well as simulation results which
will give clear insight for a practical design wireless
sensor network.
REFERENCES
[1] S. Vasudevan, J. Kurose, and D. Towsley,
.On neighbor discovery in wireless networks
with directional antennas,. in INFOCOM,
vol.4,2005.
[2] R. Madan and S. Lall, .An energy-optimal
algorithm for neighbour discovery in wireless
sensor networks,. Mob. Netw. Appl., vol. 11,
no. 3,pp. 317.326, 2006.
[3] M. J. McGlynn and S. A. Borbash, .Birthday
protocols for low energy deployment and
_exible neighbor discovery in ad hoc wireless
networks,. in MobiHoc: Proceedings of the
2nd ACM International Symposium on Mobile
Ad Hoc Networking and Computing. New
York,NY, USA: ACM Press, 2001, pp.
137.145.
[4] D. Baker and A. Ephremides, .The
architectural organization of a mobile radio
network via a distributed algorithm,. in IEEE
Transactions on Communications, vol. 29,
Nov. 1981, pp. 1694.1701.
[5] A. Keshavarzian and E. Uysal-Biyikoglu,
.Energy-ef_cient link assessment in wireless
sensor networks,. in INFOCOM, 2004.
[6] E. B. Hamida, G. Chelius, and E. Fleury,
Revisiting neighbor discoverywith
interferences consideration,. in PE-WASUN,
2006, pp. 74.81.

More Related Content

What's hot

Redundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor NetworksRedundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor NetworksEditor IJCATR
 
CP-NR Distributed Range Free Localization Algorithm in WSN
CP-NR Distributed Range Free Localization Algorithm in WSNCP-NR Distributed Range Free Localization Algorithm in WSN
CP-NR Distributed Range Free Localization Algorithm in WSNIJAAS Team
 
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...ijceronline
 
An Efficient Key Distribution Scheme for Wireless Sensor Networks using poly...
An Efficient Key Distribution Scheme for Wireless Sensor Networks  using poly...An Efficient Key Distribution Scheme for Wireless Sensor Networks  using poly...
An Efficient Key Distribution Scheme for Wireless Sensor Networks using poly...Deepti Dohare
 
A review paper on watchdog mechanism in wireless
A review paper on watchdog mechanism in wirelessA review paper on watchdog mechanism in wireless
A review paper on watchdog mechanism in wirelesseSAT Publishing House
 
A review paper on watchdog mechanism in wireless sensor network to eliminate ...
A review paper on watchdog mechanism in wireless sensor network to eliminate ...A review paper on watchdog mechanism in wireless sensor network to eliminate ...
A review paper on watchdog mechanism in wireless sensor network to eliminate ...eSAT Journals
 
Mathematics Research Paper - Mathematics of Computer Networking - Final Draft
Mathematics Research Paper - Mathematics of Computer Networking - Final DraftMathematics Research Paper - Mathematics of Computer Networking - Final Draft
Mathematics Research Paper - Mathematics of Computer Networking - Final DraftAlexanderCominsky
 
On-line Fault diagnosis of Arbitrary Connected Networks
On-line Fault diagnosis of Arbitrary Connected NetworksOn-line Fault diagnosis of Arbitrary Connected Networks
On-line Fault diagnosis of Arbitrary Connected NetworksIDES Editor
 
Distributed vertex cover
Distributed vertex coverDistributed vertex cover
Distributed vertex coverIJCNCJournal
 
Secure and efficient key pre distribution schemes for wsn using combinatorial...
Secure and efficient key pre distribution schemes for wsn using combinatorial...Secure and efficient key pre distribution schemes for wsn using combinatorial...
Secure and efficient key pre distribution schemes for wsn using combinatorial...eSAT Publishing House
 
A novel cluster based wormhole avoidance algorithm for mobile adhoc networks
A novel cluster based wormhole avoidance algorithm for mobile adhoc networksA novel cluster based wormhole avoidance algorithm for mobile adhoc networks
A novel cluster based wormhole avoidance algorithm for mobile adhoc networkscsandit
 
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKS
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKSA FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKS
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKScsandit
 
A Survey on Topology Control and Maintenance in Wireless Sensor Networks
A Survey on Topology Control and Maintenance in Wireless Sensor NetworksA Survey on Topology Control and Maintenance in Wireless Sensor Networks
A Survey on Topology Control and Maintenance in Wireless Sensor Networksijeei-iaes
 

What's hot (15)

Ijetr012022
Ijetr012022Ijetr012022
Ijetr012022
 
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor NetworksRedundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
Redundant Actor Based Multi-Hole Healing System for Mobile Sensor Networks
 
CP-NR Distributed Range Free Localization Algorithm in WSN
CP-NR Distributed Range Free Localization Algorithm in WSNCP-NR Distributed Range Free Localization Algorithm in WSN
CP-NR Distributed Range Free Localization Algorithm in WSN
 
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
 
An Efficient Key Distribution Scheme for Wireless Sensor Networks using poly...
An Efficient Key Distribution Scheme for Wireless Sensor Networks  using poly...An Efficient Key Distribution Scheme for Wireless Sensor Networks  using poly...
An Efficient Key Distribution Scheme for Wireless Sensor Networks using poly...
 
A review paper on watchdog mechanism in wireless
A review paper on watchdog mechanism in wirelessA review paper on watchdog mechanism in wireless
A review paper on watchdog mechanism in wireless
 
A review paper on watchdog mechanism in wireless sensor network to eliminate ...
A review paper on watchdog mechanism in wireless sensor network to eliminate ...A review paper on watchdog mechanism in wireless sensor network to eliminate ...
A review paper on watchdog mechanism in wireless sensor network to eliminate ...
 
Mathematics Research Paper - Mathematics of Computer Networking - Final Draft
Mathematics Research Paper - Mathematics of Computer Networking - Final DraftMathematics Research Paper - Mathematics of Computer Networking - Final Draft
Mathematics Research Paper - Mathematics of Computer Networking - Final Draft
 
On-line Fault diagnosis of Arbitrary Connected Networks
On-line Fault diagnosis of Arbitrary Connected NetworksOn-line Fault diagnosis of Arbitrary Connected Networks
On-line Fault diagnosis of Arbitrary Connected Networks
 
Q026201030106
Q026201030106Q026201030106
Q026201030106
 
Distributed vertex cover
Distributed vertex coverDistributed vertex cover
Distributed vertex cover
 
Secure and efficient key pre distribution schemes for wsn using combinatorial...
Secure and efficient key pre distribution schemes for wsn using combinatorial...Secure and efficient key pre distribution schemes for wsn using combinatorial...
Secure and efficient key pre distribution schemes for wsn using combinatorial...
 
A novel cluster based wormhole avoidance algorithm for mobile adhoc networks
A novel cluster based wormhole avoidance algorithm for mobile adhoc networksA novel cluster based wormhole avoidance algorithm for mobile adhoc networks
A novel cluster based wormhole avoidance algorithm for mobile adhoc networks
 
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKS
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKSA FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKS
A FAST FAULT TOLERANT PARTITIONING ALGORITHM FOR WIRELESS SENSOR NETWORKS
 
A Survey on Topology Control and Maintenance in Wireless Sensor Networks
A Survey on Topology Control and Maintenance in Wireless Sensor NetworksA Survey on Topology Control and Maintenance in Wireless Sensor Networks
A Survey on Topology Control and Maintenance in Wireless Sensor Networks
 

Similar to Ad34186189

Fault tolerant routing scheme based on
Fault tolerant routing scheme based onFault tolerant routing scheme based on
Fault tolerant routing scheme based onIJCNCJournal
 
Topo intro wsn
Topo intro wsnTopo intro wsn
Topo intro wsnRishu Seth
 
A Distributed Cut Detection Method for Wireless Sensor Networks
A Distributed Cut Detection Method for Wireless Sensor NetworksA Distributed Cut Detection Method for Wireless Sensor Networks
A Distributed Cut Detection Method for Wireless Sensor NetworksIJMER
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...eSAT Publishing House
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...eSAT Journals
 
Performance evaluation of least disruptive topology repair algorithm (ledir) ...
Performance evaluation of least disruptive topology repair algorithm (ledir) ...Performance evaluation of least disruptive topology repair algorithm (ledir) ...
Performance evaluation of least disruptive topology repair algorithm (ledir) ...ijwmn
 
Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...
Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...
Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...TELKOMNIKA JOURNAL
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKIJNSA Journal
 
Spatial correlation based clustering algorithm for random and uniform topolog...
Spatial correlation based clustering algorithm for random and uniform topolog...Spatial correlation based clustering algorithm for random and uniform topolog...
Spatial correlation based clustering algorithm for random and uniform topolog...eSAT Publishing House
 
Performance evaluation of energy
Performance evaluation of energyPerformance evaluation of energy
Performance evaluation of energyijp2p
 
CIP Based BOND for Wireless Sensor Networks
CIP Based BOND for Wireless Sensor NetworksCIP Based BOND for Wireless Sensor Networks
CIP Based BOND for Wireless Sensor Networksijsrd.com
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Iaetsd security and privacy enhancement using jammer in
Iaetsd security and privacy enhancement using jammer inIaetsd security and privacy enhancement using jammer in
Iaetsd security and privacy enhancement using jammer inIaetsd Iaetsd
 
Energy Efficient Modeling of Wireless Sensor Networks using Random Graph Theory
Energy Efficient Modeling of Wireless Sensor Networks using Random Graph TheoryEnergy Efficient Modeling of Wireless Sensor Networks using Random Graph Theory
Energy Efficient Modeling of Wireless Sensor Networks using Random Graph Theoryidescitation
 
WIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORS’ ANTENNAS
WIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORS’ ANTENNASWIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORS’ ANTENNAS
WIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORS’ ANTENNASijassn
 
A NEW SECURE LOCALIZATION APPROACH OF WIRELESS SENSOR NODES INTHE PRESENCE OF...
A NEW SECURE LOCALIZATION APPROACH OF WIRELESS SENSOR NODES INTHE PRESENCE OF...A NEW SECURE LOCALIZATION APPROACH OF WIRELESS SENSOR NODES INTHE PRESENCE OF...
A NEW SECURE LOCALIZATION APPROACH OF WIRELESS SENSOR NODES INTHE PRESENCE OF...ijcseit
 

Similar to Ad34186189 (20)

2512ijcsea02
2512ijcsea022512ijcsea02
2512ijcsea02
 
Fault tolerant routing scheme based on
Fault tolerant routing scheme based onFault tolerant routing scheme based on
Fault tolerant routing scheme based on
 
Topo intro wsn
Topo intro wsnTopo intro wsn
Topo intro wsn
 
Pulkit 10103644
Pulkit 10103644Pulkit 10103644
Pulkit 10103644
 
A Distributed Cut Detection Method for Wireless Sensor Networks
A Distributed Cut Detection Method for Wireless Sensor NetworksA Distributed Cut Detection Method for Wireless Sensor Networks
A Distributed Cut Detection Method for Wireless Sensor Networks
 
Ar03302620266
Ar03302620266Ar03302620266
Ar03302620266
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...
 
Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...Delay efficient broadcast scheduling for critical event monitoring in wireles...
Delay efficient broadcast scheduling for critical event monitoring in wireles...
 
Performance evaluation of least disruptive topology repair algorithm (ledir) ...
Performance evaluation of least disruptive topology repair algorithm (ledir) ...Performance evaluation of least disruptive topology repair algorithm (ledir) ...
Performance evaluation of least disruptive topology repair algorithm (ledir) ...
 
Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...
Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...
Performance Evaluation of DV-HOP and Amorphous Algorithms based on Localizati...
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
 
Spatial correlation based clustering algorithm for random and uniform topolog...
Spatial correlation based clustering algorithm for random and uniform topolog...Spatial correlation based clustering algorithm for random and uniform topolog...
Spatial correlation based clustering algorithm for random and uniform topolog...
 
Performance evaluation of energy
Performance evaluation of energyPerformance evaluation of energy
Performance evaluation of energy
 
CIP Based BOND for Wireless Sensor Networks
CIP Based BOND for Wireless Sensor NetworksCIP Based BOND for Wireless Sensor Networks
CIP Based BOND for Wireless Sensor Networks
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Iaetsd security and privacy enhancement using jammer in
Iaetsd security and privacy enhancement using jammer inIaetsd security and privacy enhancement using jammer in
Iaetsd security and privacy enhancement using jammer in
 
Energy Efficient Modeling of Wireless Sensor Networks using Random Graph Theory
Energy Efficient Modeling of Wireless Sensor Networks using Random Graph TheoryEnergy Efficient Modeling of Wireless Sensor Networks using Random Graph Theory
Energy Efficient Modeling of Wireless Sensor Networks using Random Graph Theory
 
WIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORS’ ANTENNAS
WIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORS’ ANTENNASWIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORS’ ANTENNAS
WIRELESS SENSOR NETWORK LOCALIZATION IN 3D USING STEERABLE ANCHORS’ ANTENNAS
 
Cut detection
Cut detectionCut detection
Cut detection
 
A NEW SECURE LOCALIZATION APPROACH OF WIRELESS SENSOR NODES INTHE PRESENCE OF...
A NEW SECURE LOCALIZATION APPROACH OF WIRELESS SENSOR NODES INTHE PRESENCE OF...A NEW SECURE LOCALIZATION APPROACH OF WIRELESS SENSOR NODES INTHE PRESENCE OF...
A NEW SECURE LOCALIZATION APPROACH OF WIRELESS SENSOR NODES INTHE PRESENCE OF...
 

Recently uploaded

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 

Recently uploaded (20)

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 

Ad34186189

  • 1. Sri Chandhana Pothula, R.Suguna, A.Chrispin Jiji / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.186-189 186 | P a g e Neighbor Node Discovery in Asynchronous Sensor Networks Sri Chandhana Pothula1 , R.Suguna2 , A.Chrispin Jiji3 Student1, Asst. Professor2, Asst.Professor3 Department of Electronics and Communication1,2 The Oxford College of Engineering1, 2, Bangalore-560068, Karnataka, India Abstract A sensor network may contain a huge number of simple sensor nodes that are deployed at some inspected site. In large areas, such a network usually has a mesh structure .In most sensor networks the nodes are static .Nevertheless ,node connectivity is subject to changes because of disruptions in wireless communication, transmission power changes, or loss of synchronization between neighbouring nodes. Hence, even after a sensor is aware of its immediate neighbours, it must continuously maintain its view, a process we call continuous neighbour discovery. In this work we distinguish between neighbour Discovery during sensor network initialization and continuous neighbour discovery. We focus on the latter and view it as a joint task of all the nodes in every connected segment. Each sensor employs a simple protocol in a coordinate effort to reduce power consumption without increasing the time required to detect hidden sensors. I. INTRODUCTION In the sensor network model considered in this work, the nodes are placed randomly over the area of interest and their first step is to detect their immediate neighbors - the nodes with which they have a direct wireless communication - and to establish routes to the gateway. In networks with continuously heavy traffic, the sensors need not invoke any special neighbor discovery protocol during normal operation. This is because any new node, or a node that has lost connectivity to its neighbors, can hear its neighbors simply by listening to the channel for a short time. However, for sensor networks with low and irregular traffic, a special neighbor discovery scheme should be used. Despite the static nature of the sensors in many sensor networks, connectivity is still subject to changes even after the network has been established. The sensors must continuously look for new neighbors in order to accommodate the following situations:  Loss of local synchronization due to accumulated clock drifts.  Disruption of wireless connectivity between adjacent nodes by a temporary event, such as a passing car or animal, a dust storm, rain or fog. When these events are over, the hidden nodes must be rediscovered.  The ongoing addition of new nodes, in some networks to compensate for nodes which have ceased to function because their energy has been exhausted.  The increase in transmission power of some nodes, in response to certain events, such as detection of emergent situations. For these reasons, detecting new links and nodes in sensor networks must be considered as an ongoing process. This work focuses on the continuous neighbour discovery and views it as a joint task of all the nodes in every connected segment. Each sensor employs a simple protocol in a coordinate effort to reduce power consumption without increasing the time required to detect neighbor sensors. The main idea behind the detection of hidden neighbour sensor nodes continuously is that the task of finding a new node u is divided among all the nodes that can help v to detect u. These nodes are characterized as follows: (a) they are also neighbours of u; (b) they belong to a connected segment of nodes that have already detected each other; (c) node v also belongs to this segment. Let degS (u) be the number of these nodes. This variable indicates the in-segment degree of a hidden neighbour u. In order to take advantage of the proposed discovery scheme, node v must estimate the value of degS (u). The remainder of the paper is organized as follows. In Section 2, the basic schemes are provided. Estimation values of the indegree of the neighbor nodes are presented in Section 3. Section 4 presents an algorithm for our findings in section 3 and section 5 describes the simulation results. The paper is concluded in Section 6. II. BASIC SCHEMES There are some particular schemes to be followed in the detection of hidden nodes in a sensor network.Detection of these hidden nodes depend on how they are located and also how they are connected.Two nodes are said to be neighbouring nodes if they have direct wireless connectivity. We assume that all nodes have the same transmission range, which means that connectivity is always bidirectional. During some parts of our analysis, we
  • 2. Sri Chandhana Pothula, R.Suguna, A.Chrispin Jiji / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.186-189 187 | P a g e also assume that the network is a unit disk graph; namely, any pair of nodes that are within transmission range are neighbouring nodes.Consider a pair of neighbouring nodes that belong to the same segment but are not aware that they have direct wireless connectivity. See, for example, nodes a and c in Figure 2(a). These two nodes can learn about their hidden wireless link using the following simple scheme, which uses two message types: (a) SYNC messages for synchronization between all segment nodes, transmitted over known wireless links; (b) HELLO messages for detecting new neighbours. Fig- 2(a) & (b) Segments with hidden nodes and links Scheme 1 (detecting all hidden links inside a segment): This scheme is invoked when a new node is discovered by one of the segment nodes. The discovering node issues a special SYNC message to all segment members, asking them to wake up and periodically broadcast a bunch of HELLO messages. This SYNC message is distributed over the already known wireless links of the segment. Thus, it is guaranteed to be received by every segment node. When scheme 1 is used,a hidden node is discovered by all of its in-segment neighbours as soon as it is discovered by the first of them. If scheme 1 is not used ,node u discovers all its in-segment hidden neighbours one by one. The expected delay in this case is the expected delay until the first discovery in a set of m neighbours plus the expected delay until the first discovery in a set of m-1 neighbours and so on. Scheme 1 allows two neighbouring nodes u and v to discover each other if they belong to a connected segment. However, in order for two neighbours not yet connected to the same segment to detect each other, each node should also execute the following scheme: Scheme 2 (detecting a hidden link outside a segment):Node u wakes up randomly, every T (u) seconds on the average, for a fixed period of time H.During this time it broadcasts several HELLO messages, and listens for possible HELLO messages sent by new neighbours. The value of T (u) is as follows:  T (u) = TI , if node u is in the Init state.  T (u) = TN(u), if node u is in the Normal state By Scheme 1, the discovery of an individual node by any node in a segment leads to the discovery of this node by all of its neighbours that are part of this segment. Therefore, discovering a node that is not yet in the segment can be considered a joint task of all the neighbours of this node in the segment. As an example, consider Figure 2(a), which shows a segment S and a hidden node u. In this figure, a dashed line indicates a hidden wireless link, namely, a link between two nodes that have not yet discovered each other. A thick solid line indicates a known wireless link. After execution of Scheme 1, all hidden links in S are detected (see Figure 2(b)). The links connecting nodes in S to u are not detected because u does not belong to the segment. Node u has 4 hidden links to nodes in S. Hence, we say that the degree of u in S is degS (u) = 4. When u is discovered by one of its four neighbours in S, it will also be discovered by the rest of its neighbours in S as soon as Scheme 1 is reinvoked. Consider one of the four segment members that are within range of u, node v say. Although it may know about the segment members within its own transmission range, it does not know how many in-segment neighbours participate in discovering u. In the next section we study three methods that allow v to estimate the value of degS (u) for a hidden node u, and compare their accuracy and applicability. III. ESTIMATING THE DEGREE We consider the discovery of hidden neighbors as a joint task to be performed by all segment nodes. To determine the discovery load to be imposed on every segment node, namely, how often such a node should become active and send HELLO messages, we need to estimate the number of in-segment neighbors of every hidden node u,denoted by degS(u). In this section we present methods that can be used by node v in the continuous neighbour discovery state to estimate this value. Node u is assumed to not yet be connected to the segment, and it is in the initial neighbor discovery state.Three methods are presented:  Node v measures the average in-segment degree of the segment's nodes, and uses this number as an estimate of the in-segment degree of u. The average in-segment degree of the segment's nodes can be calculated by the segment leader. To this end, it gets from every node in the segment a message indicating the in-segment degree of the sending node, which is known due to Scheme 1.
  • 3. Sri Chandhana Pothula, R.Suguna, A.Chrispin Jiji / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.186-189 188 | P a g e  Node v discovers, using Scheme 1, the number of its in-segment neighbors, degS(v), and views this number as an estimate of degS(u). This approach is expected to yield better results than the previous one when the degrees of neighboring nodes are strongly correlated.  Node v uses the average in-segment degree of its segment's nodes and its own in-segment degree degS(v) to estimate the number of node u's neighbors. This approach is expected to yield the best results if the correlation between the in-segment degrees of neighbouring nodes is known. The in-segment degree of v and u depends on how the various nodes are distributed in the network. The above three methods for finding the estimations results in some MSEs which are tabularized as shown below with the corresponding degS(u) value. Table-1 : The three methods and their MSEs Further we have proposed an algorithm which will be using one of the three methods presented above. IV. ALGORITHM In this section this work presents an algorithm for assigning HELLO message frequency to the nodes of the same segment. This algorithm is based on detecting all hidden links inside a segment. Namely, if a hidden node is discovered by one of its segment neighbors, it is discovered by all its other segment neighbors after a very short time. Hence, the discovery of a new neighbor is viewed as a joint effort of the whole segment. One of the three methods presented in Section 3 is used to estimate the number of nodes participating in this effort. Suppose that node u is in initial neighbor discovery state, where it wakes up every TI seconds for a period of time equal to H, and broadcasts HELLO messages. Suppose that the nodes of segment S should discover u within a time period T with probability P. Each node v in the segment S is in continuous neighbor discovery state, where it wakes up every TN(v) seconds for a period of time equal to H and broadcasts HELLO messages. We assume that, in order to discover each other, nodes u and v should have an active period that overlaps by at least a portion δ, 0 < δ < 1, of their size H. Thus, if node u wakes up at time t for a period of H, node v should wake up between t - H(1 - δ) and t + H(1 - δ). The length of this valid time interval is 2H(1 - δ). Since the average time interval between two wake-up periods of v is TN(v), the probability that u and v discover each other during a specific HELLO interval of u is 2H(1 - δ ) / TN(v) . Let n be the number of in-segment neighbors of u. When u wakes up and sends HELLO messages, the probability that at least one of its n neighbors is awake during a sufficiently long time interval is 1 - (1 - 2H(1 - δ) /TN(v) )n . Consider a division of the time axis of u into time slots of length H. The probability that u is awake in a given time slot is H / TI, and the probability that u is discovered during this time slot is P1 = H / TI(1 - (1 - 2H(1 - δ)/TN(v) )n ). Denote by D the value of T/H . Then, the probability that u is discovered within at most D slots is P2 =1- (1 - p1)D . Therefore, we seek the value of TN(v) that satisfies the following equation: This can also be stated as And therefore, V. SIMULATION RESULTS The simulation results in this works shows the discovered neighbours in the network within the transmission range of 200m.The Overall packets delivered, the packet delivery ratio and the energy consumed by the network is also shown in these results. Below fig:3 shows the neighbour node detection , fig:4 shows the achieved packet delivery ratio of the entire network and fig:5 shows the energy consumption by each node in the network. Fig 3: continuous neighbor discovery process
  • 4. Sri Chandhana Pothula, R.Suguna, A.Chrispin Jiji / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.186-189 189 | P a g e TRANSMISSION RANGE: (200m) The transmission power is 2.0 watts. Output: Generated data Packets = 3100 Received data Packets = 2905 Packet Delivery Ratio = 93.7097% Total Dropped Packets = 195 Routing Overhead = 3600 Forwarded Packets = 66 Average End-to-End Delay per packet = 1.33643 ms Overall energy consumption by the network: 223.81 Joules Fig 4: Packet delivery ratio is achieved to 93% Fig 5: Energy consumption by each node VI. CONCLUSION The concern paper work is doing an investigation of finding neighbour nodes continuously in wireless sensor networks, referred to as ongoing continuous neighbor discovery. It argue that continuous neighbour discovery is crucial even if the sensor nodes are static. This paper presented the analytical as well as simulation results which will give clear insight for a practical design wireless sensor network. REFERENCES [1] S. Vasudevan, J. Kurose, and D. Towsley, .On neighbor discovery in wireless networks with directional antennas,. in INFOCOM, vol.4,2005. [2] R. Madan and S. Lall, .An energy-optimal algorithm for neighbour discovery in wireless sensor networks,. Mob. Netw. Appl., vol. 11, no. 3,pp. 317.326, 2006. [3] M. J. McGlynn and S. A. Borbash, .Birthday protocols for low energy deployment and _exible neighbor discovery in ad hoc wireless networks,. in MobiHoc: Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking and Computing. New York,NY, USA: ACM Press, 2001, pp. 137.145. [4] D. Baker and A. Ephremides, .The architectural organization of a mobile radio network via a distributed algorithm,. in IEEE Transactions on Communications, vol. 29, Nov. 1981, pp. 1694.1701. [5] A. Keshavarzian and E. Uysal-Biyikoglu, .Energy-ef_cient link assessment in wireless sensor networks,. in INFOCOM, 2004. [6] E. B. Hamida, G. Chelius, and E. Fleury, Revisiting neighbor discoverywith interferences consideration,. in PE-WASUN, 2006, pp. 74.81.