An efficient Multi-Parent Hierarchical Routing Protocol for WSNs

Size: px
Start display at page:

Download "An efficient Multi-Parent Hierarchical Routing Protocol for WSNs"

Transcription

1 An efficient Multi-Parent Hierarchical Routing Protocol for WSNs Abstract Wireless sensor networks (WSNs) nodes are commonly designed to work with limited resources of memory, energy and processing; these constraints are aimed at reducing costs in order to make them suitable for a large number of applications: data mining, medicine, military, high-security industry and automation, among others. The routing protocol is one of the key components of WSNs and its features impact network performance significantly. We present an efficient Multi- Parent Hierarchical (MPH) routing protocol for wireless sensor networks; its main goal is to achieve reliable delivery of data in a single sink scenario while keeping low overhead, reduced latency and small energy consumption. The main features of MPH are self-configuration, hierarchical topology, persistence according to link quality and source routing from sink to nodes. Network performance simulations of the MPH routing protocol are carried out and compared with two popular protocols, AODV (Ad hoc On-demand Distance Vector) and DSR (Dynamic Source Routing). Results show that for the single sink scenario, the MPH protocol has an energy saving of 35% and 27% less overhead compared with the two other protocols. Finally, we present a real WSN built based on the MPH protocol, which works satisfactorily, providing an experimental demonstration of the capabilities of the protocol. I. INTRODUCTION Wireless Sensor Networks (WSNs) are being deployed in a wide range of applications to support new generation services such as digitalization of cities, telemetry and industry automation, among others. WSNs are based on low-cost devices (nodes) that are able to get information from their environment, process it locally, and communicate via wireless links to a central coordinator node. Besides, the coordinator node might also send control commands to the nodes [1]. WSNs may not rely on a predetermined structure and require the capacity of self-organization in order to deal with wireless impairments, mobility and nodes failures. One of the most efficient topologies in information delivery is the hierarchical topology. The hierarchy levels allow packet forwarding with the least number of hops, which causes fewer errors in delivery and lower delays on the transmission of a packet from source to destination [6]. Tree Routing is a classic form of routing that is restricted to parent-child links. This scheme eliminates the need for searching and updating paths and the overhead associated to the establishment of those paths [2]. It presents advantages for nodes such as energy saving and low memory consumption. However, when the networks are large and the nodes can connect and disconnect from the network due to link failures or communications features, it is necessary that the Tree Routing scheme slightly change. This is because it requires flexibility in assigning IP addresses to the network in order to become self-organized. ZigBee manages a Tree Routing scheme with pre-configured global IP addressing. Note that in this structure, node addresses never change [2]. We chose to develop a hierarchical protocol because these types of protocols are aimed at energy saving multi-hop communications and are able to cover wide areas [9]. Hierarchical protocols have scalability and robustness characteristics, providing energy savings in the network and distributing energy costs among network sensors. A great advantage of such protocols is that they carry information generally to one node, thus the communication with the coordinator or root node is simpler and more efficient. In this paper we propose an efficient Multi-Parent Hierarchical (MPH) Routing Protocol based on link-hierarchy relationships (parents and children); it establishes operational techniques aimed at energy saving and reliable delivery of information. In the scenario of interest, all data is gathered by a powerful coordinator node that can process more information, perform more complex tasks and manage routing tables that reflect the entire network topology. Based on the proposed MPH protocol, a network acquires a hierarchical topology since it represents an efficient way to route the information through the network with a minimum number of hops from source to destination. Two highly studied and widely used protocols for WSNs are AODV (Ad hoc On-demand Distance Vector) [15] and DSR (Dynamic Source Routing) [16]. They are reactive protocols that establish routes on demand and send information to the destination by the route of least number of hops that each node has at a given time in its routing table. These protocols use two procedures to find and transport traffic packets: route discovery and route maintenance. Their performance and efficiency have been compared by means of certain network metrics [12]. In our work we compare efficiency metrics observed in AODV and DSR with those of our proposed protocol, MPH. The rest of this article is organized as follow: in Section II, we describe related work. Section III, proposes an efficient Multi-Parent Hierarchical (MPH) Routing Protocol. Section IV, explains the proposed metrics and the simulation environment. Section V, shows and discuss the results. Section VI describes the network implementation. Finally, conclusions are given in section VII. mds January 12, 2014

2 II. RELATED WORK The routing protocol is an important factor on sensor networks which greatly influences network performance and node interactions. This will directly affect the network energy consumption, delay and reliability during the process of information delivery among nodes. Two commonly studied parameters in WSNs are energy and delay [7]. The the end-to-end delay is an important metric that depends on media access techniques, collisions and retransmissions. To tackle the energy-saving problem, sensor networks must be able to implement energy conservation mechanisms, enabling nodes to work collaboratively. The focus of the work cited in [11] is to describe schemes of data fusion or aggregation which represent balancing and energy consumption reduction strategies. Cuomo et al. [8] analyze the formation network process and the topology with a focus on energy consumption. They vary factors such as the number of sink nodes and their distribution along the network. They establish relationships between the number of sink nodes and the energy consumption and study static and mobile scenarios. In [17] they deal with the problem of balancing costs with a clustered spanning tree algorithm and an energy model based on transmission energy. In addition, they assign weights to the links so that the algorithm provides the best routes of the hierarchical tree. Sending packets to one or more nodes is the main job in sensor networks. Routing protocols use various schemes to find the best routes in the shortest time possible. The technique cited in [3] analyzes metrics such as packet loss, delay and energy as measures of the quality of service in order to improve overall performance in the network. They explain a traffic control scheme that provides a proper topology management. Regarding the problem of the study of static scenarios with connections and disconnections of nodes, Mavromoustakis et al., in [4], describe a scheme that balances the neighboring information network while adapting to new conditions. The unbalance links problem is treated in tree topology protocols that aim to minimize the problem of packet delay and ensure the least number of hops to the root node. A problem that arises from this point is that one of load unbalance on the links, which is reflected in an unbalanced energy depletion over the nodes. Reference [14] shows a method to balance network traffic and ensure a uniform use of the routes to the destination node. Nezhad et al. [10] propose a protocol where the collector node has a global view of the network topology. In order to maximize the network lifetime, they use a load balancing algorithm to choose the best routes. In [5] a multipath routing which uses a QoS technique on adhoc systems is proposed in order to provide load balancing, fault tolerance, and better performance of the network with protocols such as AODV. In order to compare sensor networks performance some authors have been working extensively with two important protocols in this type of networks: AODV and DSR. Under Requirement Scenario Sensor deployment Communication among nodes Radio communication Communication technique Coordinator node Application Sampling rate Flexibility Medium Environments TABLE I PRESCRIBED REQUIREMENTS. Static Medium-scale networks Many-to-one Wireless Multi-hop Robust computer with high memory capacity Remote monitoring 3-4 samples per minute Hardware and software modularity Non-line of sight propagation Indoors and outdoors theses protocols, the nodes find routes to a destination node and they can have multiple routes to the same destination. III. DESIGN OF EFFICIENT MULTI-PARENT HIERARCHICAL (MPH) ROUTING PROTOCOL The scenario to be considered here is a single sink scenario. It consists of static nodes that can send and receive information to and from the coordinator node. The coordinator node collects all information for the nodes. All nodes except the coordinator have limited resources; i.e. energy, memory, processing. A hierarchical logic topology fits well in this scenario with the coordinator holding the highest hierarchy; routing packets from nodes to coordinator can be done easily by establishing routes where each next-hop belongs to an immediate upper level in the topology until the coordinator is reached. The nodes have neighbor tables that avoid high processing costs, and routes that can be achieved with these tables ensure the least hop number to the coordinator. Table I presents the prescribed requirements in order to clarify the conditions for simulation and deployment needs to compare the performance protocols in WSNs. For the considered scenario we present design criteria for the mechanisms of the protocol that lead to the response to the requirements listed below. We assume nodes with limited processing and capacity because they have constrained memory and energy resources. When a node is disconnected or turned off, the network must have the ability to reconfigure itself rapidly in order to avoid losing information. Therefore, we propose the MPH routing protocol that creates a logical hierarchical network topology where the hierarchy of each node is given by its location level, the lower the level the lower the hierarchy held; thus, the root (coordinator node) will have the highest hierarchy. The topology is formed with routes that minimize the number of hops from a node to the coordinator; this restriction will reduce overall energy consumption and decrease delay. MPH allows a child node to have one or more parents at the next higher level. As a result, a node can share both children and parents with another node belonging to the same hierarchical level or generation. Figure 1 shows an example of a topology in which we describe the formation of the hierarchy levels of nodes in the MPH routing protocol. The formation of the hierarchy levels is as follows. Node 0 is the coordinator node. This

3 Fig. 1. Neighbor discovery and routing example. TABLE II NEIGHBOR TABLE EXAMPLE OF NODE 2. Neighbor ID Neighbor hierarchy Relationship Persistence 0 50 child none none parent parent parent 2 node represents the highest hierarchy level. The nodes within its coverage range are its children and have one hierarchy level below the coordinator node, i.e., nodes 1, 2 and 3 in this example. Subsequently, these nodes find other nodes in its coverage range that have not been assigned a hierarchy. Thus, node 1 has a child, node 4. Node 2 has three children nodes: 4, 5 and 6 nodes, because node 1 and 3 nodes are in the same hierarchy level. Node 3 has two children nodes: 6 and 7. Finally, node 5 has a child which is node 8. In this way the hierarchies are formed, the relationships parent-child are established and from here, the neighbor tables are configured. In Table II, we present an example of the neighbor table for node 2. We are going to take the same example to show how to do the routing of a packet from a node to the coordinator. We route a packet from node 6 to the coordinator node. The routing is done in ascending, through parent nodes. Node 6 has two parents: nodes 2 and 3. Node 6 can choose which route to take. For example, node 6 sends the packet to node 2. Finally, node 2 has a single parent which is the coordinator node (destination) and is where the packet will be delivered. The coordinator might also need to send packets to nodes in the network, for instance in certain applications two-way communications are required for sending control commands. In the proposed MPH protocol, we adopt a source-routing approach for traffic to be send from the coordinator to a given node because the coordinator node has more resources than the rest of the nodes. A. MPH mechanisms The authors have already defined a scenario, so we will propose a number of mechanisms that represent an efficient solution to the requirements such as self-configuration, rapid information delivery, low overhead and small energy consumption. Hierarchical logic construction is performed by routing protocol rules that are local to each node, so the network is configured depending on the connectivity of nodes in a certain time. Although the nodes are fixed, connectivity presents dynamic features due to changing conditions of the radio channel, interference or physical damage of nodes, provoking intermittent connections and disconnections. The autoconfiguration capability will allow the network to recover from the aforementioned events, offering a robust and uninterrupted service and maintains the neighbor tables updated. 1) Neighbor discovery mechanism: The neighbor table maintaining process is originated by a N D packet transmission. The sending and receiving nodes can update their neighbor tables with the respective addresses once each node receives the corresponding acknowledgment. N D packets are delivered at regular specified intervals, so that nodes rediscover their neighbors at this intervals. The response to a N D packet is called N DR (Neighbor Discovery Response) and the response to a N DR packet is another packet called NDRACK. Both, the NDR and NDRACK packets contain node hierarchy information. 2) Node hierarchy update mechanism: Each time a node is involved in a neighbor table maintenance process, it should be checked if it maintains its hierarchy or if it is going to change it. The rule is that the node should have a hierarchy one unit lower than his parent node(s), therefore, the node will select as a parent a neighbor node having the highest hierarchy among the registered nodes in the neighbor table. It can choose more than one parent if several neighbor nodes satisfy this condition. Moreover, if a node has no neighbors or all neighbors have zero hierarchy it will have zero hierarchy too. This situation can occur in the network initialization transitional stage when there are nodes that still have zero hierarchy. 3) Reactivity N D packet mechanism: This mechanism is valuable in dynamic networks, where this dynamism generates topology changes. A node changes its hierarchy as a result of updating its neighbors, before a period (regular specified interval) is completed. Then, the process to discover neighbors, sending a ND packet, is done when the topology changes. The purpose of this mechanism is to reduce the time in which nodes update their hierarchies, especially when extreme conditions occur due to loss of critical links in the logical topology. This will diminish auto-configuration network delays and reduce the packet loss problem by disconnecting links. 4) Persistent nodes mechanism: Some nodes do not respond to every N D packet. This can be due to packet collisions or low quality links, among other causes. To prevent unreliable changes, caused by node faults, in the neighbor tables we use a scheme that employs a slow erasure of a neighbor node and uses a variable called neighbor persistence. Prior to the transmission of a N D packet, persistence is

4 reduced by 1 for every registered node in the neighbor table. If a NDR packet is received from a neighbor, persistence takes a maximum value p. Therefore, if after successive p ND packet emissions the origin node did not receive any NDR packets from the node that initially had persistence p, then the route to this node is erased from the table. This mechanism solves the problem of inconstant changes in the neighbor tables. This problem can be caused by the momentary disconnection of the nodes. For example, occasionally, due to interference or packet collisions, the nodes do not respond in time to its neighbors, which then modify the neighbor tables. Thus, the node persistence mechanism gives more opportunities for weak links to keep association with the routing tables and avoids abrupt changes. 5) Source routing mechanism: This mechanism is used to route packets from the coordinator node to any node in the network. The coordinator node builds the whole topology of the network after it gathers the neighbor tables from the nodes. Then, the coordinator node is able to specify the complete path to be followed by the packet to reach its destination. Using the example in Figure 1, we will explain how to route a packet from the coordinator node to node 8. Because of the coordinator node builds the whole network topology and knows the exact paths to each of the nodes, it has the route to node 8: This route lists the nodes the packet must go through to reach its destination. B. Example It is important to note that the network link configuration depends on the implemented protocol. Figure 2 shows the possible links established when connecting nodes on AODV, DSR and MPH. In AODV the routing tables have the next hop for all the routes, while in DSR, the route is included in the packet. Thus, nodes use this information to determine the next hop in order to reach the coordinator. In MPH the routing is from children nodes to parents. The node chooses one parent (if it has more than one) and sends the packet. MPH shall guarantee always the shortest route to the coordinator node. In AODV and DSR the shortest route from the routing table is guaranteed, but this route is not necessarily the shortest route to reach the destination. We present a specific example using Figure 3 for a node that is sending a packet to the coordinator. If node 9 wants to send information to node 0, the possible routes the packet could go according to each routing protocol would be as follows. For AODV and DSR protocols the formed routes are very similar, however AODV has lifetime for those routes and the storing of these routes will be different for each protocol. Then, the possible routes that the packet would make according to the two protocols would be: , , , , , , , , , , , and so on. While the only route the packet would follow under MPH protocol is: The AODV and DSR routes are chosen by node 9 taking into account nodes save routes in all directions, while nodes in the MPH protocol save ascending routes to the coordinator (only through their parents). This makes MPH ensures the shortest route in all cases, however, AODV and DSR can be updated then a longer route. Fig. 2. Logical links for AODV, DSR and MPH. IV. PROPOSED METRICS AND SIMULATION ENVIRONMENT The authors compare MPH protocol performance with commonly used protocols in sensor networks, such as AODV and DSR. Although AODV and DSR are reactive protocols and MPH has a hierarchical configuration, we can analyze their performance with specific metrics and compare them. We use the following metrics in the comparison: overall energy consumption, delay, hop count and delivered packets. The delay and power consumption in a network are directly related to the complexity of the routing algorithms. When a routing protocol employs many algorithms and processes to send a packet, sensors will have longer delays and high energy consumption. We propose the MPH protocol with features such as hierarchical topology, source routing from sink to nodes and rapid topology reconfiguration when faced with an unexpected change. Based on the packet delivery ratio we can have an indication of the efficiency of the routing protocol. This is influenced by the number of hops that packets go through in their way to their destination; the smaller this number, the lower the packet loss will be. Route reliability is an important aspect when it is necessary that the routing protocol have the shortest routes available. A routing protocol provides reliability when nodes have on their tables (routing tables or neighbor tables) valid paths, i.e., routes that have not expired or have not been invalidated by the disconnection of a node. The overhead of the routing protocol will impact channel occupancy. The lower the overhead, the lower the probability of collisions, which will in turn decrease packet retransmissions. This ensures that information will be delivered more quickly and reliably. We built an event-driven network simulator, programmed in C++ with the ability to manage the nodes as separate

5 elements together. The nodes communicate via control and traffic packets and develop all tasks to be part of a network: starting, transmission, switching, receiving, channel listening, shutdown and consumption of the microcontroller. The aim of this work is to analyze important metrics in a WSN, as mentioned above, in connection with the proposed MPH protocol. For the simulations we consider a grid arrangement with 49 nodes. The horizontal and vertical grid separation is 5 m, and nodes have a coverage range of 8 m. We take a data rate of 250 kbps and a packet length of 22 Bytes. The load traffic for each node is 20 packets/sec. The coordinator node is located in one corner, establishing crowns or rings of nodes around the root node, as shown in Figure 3. All network nodes must forward packets to the coordinator node directly (one hop) or indirectly (multiple hops forming a route with intermediate nodes). Fig. 3. Network Topology. We assume a packet loss for each link of 1% [13]. The MAC Layer is constructed based on the unslotted Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol [13], established by the IEEE /Zigbee standard, with the collision avoidance model and retransmissions. The Network Layer was put to the test with the different implementation of routing protocols such as AODV, DSR and our own MPH protocol. A. Results and Discussion From the discussion above, we consider the following five important metrics that are indicative of network performance: delay, energy, delivered packets, overhead and availability of routes. 1) Delay: One of the fundamental parameters for optimizing a sensor network is the end-to-end delay. The time a packet takes to reach its destination is variable due to several factors, for instance: the transmission speed, the packet size and, the delay of the packet in each hop in the route. Collisions and packet retransmissions also increase the end-to-end delay. The delay is related to the network complexity. The MPH protocol, through the election of a hierarchical topology, produces a reduction of the delays in the information process delivery. TABLE IV ENERGY MODEL. Voltage (mv) Current (ma) Time (ms) Start-up mode MCU running on 32-MHz clock CSMA/CA algorithm Switch from RX to TX Switch from TX to RX Radio in RX mode (processing and waiting) Radio in TX mode Shut down mode It is important to consider the delay involved in reorganizing the network due to changes in connectivity, for example due to new nodes or nodes that switch off or are faulty. Table III shows relevant delays obtained in the simulations of the MPH protocol compared with the AODV and DSR protocols. The first row shows the time required to complete the process of table maintenance performed by a neighbor node. With this process, each node builds its neighbor table. The second row describes the time it takes a packet to travel from the farthest node to the coordinator (these are the nodes of the last ring shown in Figure 4). The time denoted by ( ) is the time it takes AODV and DSR in route discovery process. In the third row we obtained the time it takes a packet from the nearest ring in Figure 4 (one hop) to get to its destination, for each of the protocols. Finally, in the fourth row we randomly turned off 20% of the network nodes. Again, we observed how long it takes a packet to reach the coordinator node from the farthest node in the topology. Here, the time denoted by ( ) defines the route discovery time for AODV and DSR, and the transient time for topology arrangement for MPH. This metric takes into account the self-configuring time of the network due to the dynamics of the wireless scenario, such as node disconnections. This is where we see the ability of each routing protocol to overcome topology changes and reorganize the network, reflected as the time it takes to recover from such events. 2) Energy: Energy is a valuable metric in WSN performance because here the sensors can optimize processing tasks and they should remain functional as long as possible without having to replace the batteries. The energy model implemented for the three protocols studied is presented in Table II. When MPH is used, nodes do not store routing tables, and routing is done via the optimal route. Therefore, this protocol provides large energy savings. This can be seen in Figure 4.a, where we also observe that AODV and DSR use more total energy than MPH because they handle more routing overhead causing more collisions and retransmissions. 3) Packet delivery ratio: Another interesting metric of the network performance is how many packets reach their destination successfully. We took a radius of 10m and analyzed the percentage of delivered packets for the three protocols. The value that this metric takes is a consequence of the ability of a routing protocol to reorganize the network. Besides, if the number of hops the packets pass through is smaller, there will be fewer errors in the information delivery. Results are depicted in Figure 4.c.

6 TABLE III DELAY PARAMETER AODV DSR MPH Neighbor discovery process for an average of 8 neighbors ms ms ms Average time it takes a traffic packet to reach its destination without shutdown ms and ms and ms nodes in the network (ring farthest to destination) ms ms Average time it takes a traffic packet to reach its destination without shutdown nodes in the network (ring closest to destination) ms ms ms Average time it takes a traffic packet to reach its destination with 20% shutdown ms and 84.17ms and ms ms and nodes in the network (ring farthest to destination) ms ms 4) Overhead: Reactive protocols such as AODV and DSR have low overhead because routes are discovered only when they are needed. However, MPH uses fewer control packets than AODV and DSR, thus nodes have low processing and simple management of neighbor tables. Therefore, MPH maintains neighbor tables with less control packets. This behavior can be seen in Figure 4.b. Fig. 5. % Nodes off vs % Reliable routes. TABLE V % VALID ROUTES. Fig. 4. (a) Total energy, (b) Overhead, (c) Packet delivery ratio. 5) Availability of routes: Reliable routes or valid routes are the routes that are active and the node can use for sending traffic. These routes may expire (according to the routing protocol) or may disappear from the tables due to disconnections of neighbor nodes. The most reliable routes will ensure more reliable delivery of information. We turned off a percentage of network nodes to observe nodes disconnections. In this way we could see how some routes become invalid and how nodes respond to reconfigure valid routes in the network, depending on the protocol. The % of reliable routes is presented in Figure 5. Thanks to the persistence mechanism in MPH, neighbor tables become safer as well as more reliable thanks to the DV packet reactivity mechanism, compared with AODV and DSR. This is because in AODV routes have timers that expire after certain period. On the other hand, DSR is aware that one route is obsolete only when it receives a route error message. In Table V we took a sampling period of 100 seconds. We made tests every 10 seconds in which we compute the average number of valid routes available in case the node has to send a traffic packet right at this moment. In the AODV and DSR TIME % Valid Routes AODV DSR MPH cases, occasionally some routes have just expired or some node in the route has been disconnected: these cases will result in invalid routes. On the other hand, in MPH almost all the time the neighbor tables have valid routes ready to be used. With regard to diversity of routes and hop count, we present Table VI. The MPH protocol gets routes with minimum number of hops but it has fewer routes. The advantage of MPH compared to the AODV and DSR protocols is that MPH does not require routing tables, the decision of a node to route a packet to the coordinator is very simple because a node chooses the most widely used route. On the other hand, we see that AODV and DSR have more routes to the coordinator but they do not always guarantee the shortest route. It is true that the node chooses the shortest route from its routing table but maybe this route is not the shortest to the destination. This effect can be caused due to the packet loss probability.

7 TABLE VI VALID ROUTES AND HOPS. TIME AODV DSR MPH Routes Hops Routes Hops Routes Hops V. NETWORK IMPLEMENTATION OF THE MPH PROTOCOL The MPH protocol was successfully deployed in a real network under a variety of conditions of temperature, humidity and obstacles. The number of nodes forming the network was 90 and 1 coordinator node, the farthest node to the coordinator node is 10 hops, and the average hop delay is 15 milliseconds. The area coverage was 0.16 km 2. We built the MPH protocol on top of the MAC layer of the standard using the CC2530 chip from Texas Instruments. The power transmission for each node was 4.5 dbm. Figure 6 shows one of the nodes running the MPH protocol Fig. 7. Real network. number of hops required for each node to the destination node (coordinator). Here we observe, via a histogram, the average number of hops that shows the simulator has a very similar distribution to the results of the real network. This shows that the simulator accurately reflects the network conditions. Figure 9 shows the delay as an another important metric to monitor network processes under protocol MPH. The delay allows to determine more specifically the proximity of actual results with respect to the simulated results. Both graphs show very similar distributions, showing the fidelity of the simulation results with respect to a real network in a specific environment. Fig. 6. Wireless node. Figure 7 shows the real network made with nodes built by us in order to test the MPH protocol. This same topology was used in the simulation to reproduce the results and compare them. In order to evaluate the protocol performance from both the real network and the simulator, we analyze the number of hops and delay, provided these metrics directly impact the energy model. Figure 8 shows the distribution of hops in all nodes in the actual network. These hops are taken from each node to the coordinator. Subsequently, the same network under the same conditions was implemented in the simulator in order to compare the behavior of the MPH protocol in a real environment and a simulation. We analyze the average Fig. 8. a) Hop distribution in the real network, b) Hop distribution in the simulation. VI. CONCLUSION In MPH, the coordinator node can be aware of approximately the whole topology due to the source routing mechanism. In AODV and DSR, the routes from the coordinator to some node are calculated in the same way that the other routes. So MPH has the facility that the coordinator node can access any node to send information, statistics or measurements requests. While in AODV and DSR, the coordinator has to discover the route to a specific node if it does not have it.

8 Fig. 9. a) Delay distribution in the real network, b) Delay distribution in the simulation. MPH protocol has less control packets, therefore less overhead, resulting in fewer collisions, so there will be less packet retransmissions compared with AODV and DSR. Moreover, this is reflected in the energy saving metric from MAC layer. Results for MPH protocol are encouraging because this protocol has good performance in terms of processing, fast and efficient information delivery and energy conservation. Protocols such as AODV and DSR are very efficient in terms of backup routes and connectivity from any node to any node in the network. The combination of a hierarchical topology with self-configuration and maintenance mechanisms of the MPH protocol makes the nodes optimize network processes, reduce delays, take short routes to the destination and decrease network overhead. All this is reflected in the successful delivery of information. [10] A. Nezhad, A. Miri, D. Makrakis, D., Location privacy and anonymity preserving routing for wireless sensor networks, Computer Networks 52, pp , Dec [11] H. Luo, Y. Liu, S. Das, Routing Correlated Data in Wireless Sensor Networks: A Survey, IEEE Network 21, pp , Dec [12] N. Kulkarni, R. Prasad, H. Cornean, N. Gupta, Performance Evaluation of AODV, DSDV & DSR for Quasi Random Deployment of Sensor Nodes in Wireless Sensor Networks, International Conference on Devices and Communications (ICDeCom), pp. 1-5, [13] Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (WPANs), IEEE Std (Revision of IEEE Std ), pp , Jul [14] C. Sergiou, V. Vassiliou, A. Paphitis, Hierarchical Tree Alternative Path (HTAP) algorithm for congestion control in wireless sensor networks, Ad Hoc Networks 11, pp , [15] C. Perkins, E. Royer, Ad-hoc on-demand distance vector routing, IEEE Workshop on Mobile Computing Systems and Applications, WMCSA, pp , [16] D. Maltz, J. Broch, J. Jetcheva, D. Johnson, The effects of on-demand behavior in routing protocols for multihop wireless ad hoc networks, IEEE Journal on Selected Areas in Communications 17, pp , [17] A. Gagarin, S. Hussain, L. Yang, Distributed hierarchical search for balanced energy consumption routing spanning trees in wireless sensor networks, Journal of Parallel and Distributed Computing 70, pp , Sep ACKNOWLEDGMENT This work has been supported by the Institute of Science and Technology of the Federal District (ICyTDF) under projects PICOO10-77 and 396/2010. REFERENCES [1] M. Yigitel, O. Incel, C. Ersoy, Qos-aware mac protocols for wireless sensor networks: A survey, Computer Networks 55, pp , Jun [2] W. Qiu, E. Skafidas, P. Hao, Enhanced tree routing for wireless sensor networks, Ad Hoc Networks 7, pp , May [3] M. Liu, S. Xu, S. Sun, An agent-assisted QoS-based routing algorithm for wireless sensor networks, Journal of Network and Computer Applications 35, pp , Jan [4] C. Mavromoustakis, H. Karatza, Optimized QoS priority routing for service tunability and overhead reduction using swarm based active network scheme, Computer Communications 29, pp , Mar [5] S. Santhi, G. Sadasivam, Performance Evaluation of Different Routing Protocols to Minimize Congestion in Heterogeneous Network, International Conference on Recent Trends in Information Technology (ICRTIT), pp , Jun [6] G. Ding, Z. Sahinoglu, P. Orlik, J. Zhang, B. Bhargava, Tree-Based Data Broadcast in IEEE and ZigBee Networks, IEEE Transactions on Mobile Computing 5, pp , [7] I. Demirkol, C. Ersoy, Energy and delay optimized contention for wireless sensor networks, Computer Networks 53, pp , Aug [8] F. Cuomo, E. Cipollone, A. Abbagnale, Performance analysis of IEEE wireless sensor networks: An insight into the topology formation process, Computer Networks 53, pp , Dec [9] W. Qiu, E. Skafidas, Q. Cheng, A hybrid routing protocol for wireless sensor networks, International Symposium on Communications and Information Technologies, ISCIT, pp , 2007.

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Routing protocols in WSN

Routing protocols in WSN Routing protocols in WSN 1.1 WSN Routing Scheme Data collected by sensor nodes in a WSN is typically propagated toward a base station (gateway) that links the WSN with other networks where the data can

More information

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks

An Industrial Employee Development Application Protocol Using Wireless Sensor Networks RESEARCH ARTICLE An Industrial Employee Development Application Protocol Using Wireless Sensor Networks 1 N.Roja Ramani, 2 A.Stenila 1,2 Asst.professor, Dept.of.Computer Application, Annai Vailankanni

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET) INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976- & TECHNOLOGY (IJCET) ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,

More information

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks Mina Malekzadeh Golestan University Zohre Fereidooni Golestan University M.H. Shahrokh Abadi

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis and Enhancement of Routing Protocol in Manet Vol.2, Issue.2, Mar-Apr 2012 pp-323-328 ISSN: 2249-6645 Performance Analysis and Enhancement of Routing Protocol in Manet Jaya Jacob*, V.Seethalakshmi** *II MECS, Sri Shakthi Institute of Engineering and

More information

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service) 2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS

CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS CLUSTER BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS M.SASIKUMAR 1 Assistant Professor, Dept. of Applied Mathematics and Computational Sciences, PSG College of Technology, Coimbatore, Tamilnadu,

More information

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol

1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol 1 Multipath Node-Disjoint Routing with Backup List Based on the AODV Protocol Vahid Zangeneh i and Shahriar Mohammadi ii * ABSTRACT In recent years, routing has been the most focused area in ad hoc networks

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

QUALITY OF SERVICE EVALUATION IN IEEE NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi

QUALITY OF SERVICE EVALUATION IN IEEE NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi QUALITY OF SERVICE EVALUATION IN IEEE 802.15.4 NETWORKS *Shivi Johri, **Mrs. Neelu Trivedi *M.Tech. (ECE) in Deptt. of ECE at CET,Moradabad, U.P., India **Assistant professor in Deptt. of ECE at CET, Moradabad,

More information

ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS

ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS May Cho Aye and Aye Moe Aung Faculty of Information and Communication Technology, University of Technology (Yatanarpon Cyber City), Pyin Oo

More information

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS

ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS e-issn 2455 1392 Volume 1 Issue 1, November 2015 pp. 1-7 http://www.ijcter.com ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS Komal Shah 1, Heena Sheth 2 1,2 M. S. University, Baroda Abstract--

More information

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks Unicast Routing in Mobile Ad Hoc Networks 1 Routing problem 2 Responsibility of a routing protocol Determining an optimal way to find optimal routes Determining a feasible path to a destination based on

More information

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-

More information

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network

A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network A Comparative study of On-Demand Data Delivery with Tables Driven and On-Demand Protocols for Mobile Ad-Hoc Network Humayun Bakht Research Fellow, London School of Commerce, United Kingdom humayunbakht@yahoo.co.uk

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

MultiHop Routing for Delay Minimization in WSN

MultiHop Routing for Delay Minimization in WSN MultiHop Routing for Delay Minimization in WSN Sandeep Chaurasia, Saima Khan, Sudesh Gupta Abstract Wireless sensor network, consists of sensor nodes in capacity of hundred or thousand, which deployed

More information

An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina

An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina An Efficient Data-Centric Routing Approach for Wireless Sensor Networks using Edrina Rajasekaran 1, Rashmi 2 1 Asst. Professor, Department of Electronics and Communication, St. Joseph College of Engineering,

More information

Analysis and Comparison of DSDV and NACRP Protocol in Wireless Sensor Network

Analysis and Comparison of DSDV and NACRP Protocol in Wireless Sensor Network Analysis and Comparison of and Protocol in Wireless Sensor Network C.K.Brindha PG Scholar, Department of ECE, Rajalakshmi Engineering College, Chennai, Tamilnadu, India, brindhack@gmail.com. ABSTRACT Wireless

More information

A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN

A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN A PERFORMANCE EVALUATION OF YMAC A MEDIUM ACCESS PROTOCOL FOR WSN Albeiro Cortés Cabezas and José de Jesús Salgado Patrón Department of Electronic Engineering, Surcolombiana University, Neiva, Colombia

More information

Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network

Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge of Applications and Network International Journal of Information and Computer Science (IJICS) Volume 5, 2016 doi: 10.14355/ijics.2016.05.002 www.iji-cs.org Scheduling of Multiple Applications in Wireless Sensor Networks Using Knowledge

More information

Simulation and Performance Analysis of Throughput and Delay on Varying Time and Number of Nodes in MANET

Simulation and Performance Analysis of Throughput and Delay on Varying Time and Number of Nodes in MANET International Journal of Recent Research and Review, Vol. VII, Issue 2, June 2014 ISSN 2277 8322 Simulation and Performance Analysis of and on Varying and Number of Nodes in MANET Arun Jain 1, Ramesh Bharti

More information

Fig. 2: Architecture of sensor node

Fig. 2: Architecture of sensor node Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com To Reduce

More information

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN

Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Analysis of Cluster-Based Energy-Dynamic Routing Protocols in WSN Mr. V. Narsing Rao 1, Dr.K.Bhargavi 2 1,2 Asst. Professor in CSE Dept., Sphoorthy Engineering College, Hyderabad Abstract- Wireless Sensor

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes Sudheer Kumar 1, Akhilesh Yadav 2 Department of Computer Science and Engineering Kanpur Institute of Technology, Kanpur sudheerkr21@gmail.co

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK

WSN NETWORK ARCHITECTURES AND PROTOCOL STACK WSN NETWORK ARCHITECTURES AND PROTOCOL STACK Sensing is a technique used to gather information about a physical object or process, including the occurrence of events (i.e., changes in state such as a drop

More information

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY NOVEL REVIEW OF MANET ROUTING PROTOCOLS Nippun Kamboj*, Dr. Munishwar Rai Department of Computer Applications Maharishi Markandeshwar

More information

A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI

A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI 1 Yongxian SONG, 2 Rongbiao ZHANG and Fuhuan

More information

Impulse Radio Ultra Wide Band Based Mobile Adhoc Network Routing Performance Analysis

Impulse Radio Ultra Wide Band Based Mobile Adhoc Network Routing Performance Analysis American Journal of Applied Sciences, 10 (4): 361-366, 2013 ISSN: 1546-9239 2013 Sreedhar and Venkatesh, This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0 license

More information

An Energy Efficient and Minimum Latency Routing Protocol for Multihop WSNs

An Energy Efficient and Minimum Latency Routing Protocol for Multihop WSNs An Energy Efficient and Minimum Latency Routing Protocol for Multihop WSNs Changyan Yi and Ken Ferens Electrical and Computer Engineering, University of Manitoba, Winnipeg, MB, Canada yic3@cc.umanitoba.ca,

More information

Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks

Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks Multiple-Metric Hybrid Routing Protocol for Heterogeneous Wireless Access Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at Charlotte,

More information

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5. Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management

More information

Novel Cluster Based Routing Protocol in Wireless Sensor Networks

Novel Cluster Based Routing Protocol in Wireless Sensor Networks ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 32 Novel Cluster Based Routing Protocol in Wireless Sensor Networks Bager Zarei 1, Mohammad Zeynali 2 and Vahid Majid Nezhad 3 1 Department of Computer

More information

INTEGRATION OF AD HOC WIRELESS SENSOR NETWORKS IN A VIRTUAL INSTRUMENTATION CONFIGURATION

INTEGRATION OF AD HOC WIRELESS SENSOR NETWORKS IN A VIRTUAL INSTRUMENTATION CONFIGURATION Bulletin of the Transilvania University of Braşov Vol. 7 (56) No. 2-2014 Series I: Engineering Sciences INTEGRATION OF AD HOC WIRELESS SENSOR NETWORKS IN A VIRTUAL INSTRUMENTATION CONFIGURATION Mihai MACHEDON-PISU

More information

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,

More information

Wireless Sensor Networks, energy efficiency and path recovery

Wireless Sensor Networks, energy efficiency and path recovery Wireless Sensor Networks, energy efficiency and path recovery PhD dissertation Anne-Lena Kampen Trondheim 18 th of May 2017 Outline Introduction to Wireless Sensor Networks WSN Challenges investigated

More information

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks Joo-Han Song, Vincent Wong and Victor Leung Department of Electrical and Computer Engineering The University of British Columbia 56

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study

Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hoc Networks: A Comprehensive Study M. Tarique, A. Hossain, R. Islam and C. Akram Hossain Dept. of Electrical and Electronic Engineering, American

More information

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks Tejomayee Nath #1 & Suneeta Mohanty *2 # School of Computer Engineering, KIIT University Bhubaneswar,, India Abstract

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN

International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March ISSN International Journal of Scientific & Engineering Research, Volume 6, Issue 3, March-2015 1464 Performance Evaluation of AODV and DSDV Routing Protocols through Clustering in MANETS Prof. A Rama Rao, M

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN:

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 2, April-May, 2013 ISSN: Fast Data Collection with Reduced Interference and Increased Life Time in Wireless Sensor Networks Jayachandran.J 1 and Ramalakshmi.R 2 1 M.Tech Network Engineering, Kalasalingam University, Krishnan koil.

More information

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model Deepak Agrawal, Brajesh Patel Department of CSE Shri Ram Institute of Technology Jabalpur,

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION

CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION CHAPTER 5 ANT-FUZZY META HEURISTIC GENETIC SENSOR NETWORK SYSTEM FOR MULTI - SINK AGGREGATED DATA TRANSMISSION 5.1 INTRODUCTION Generally, deployment of Wireless Sensor Network (WSN) is based on a many

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication

Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication Vol., Issue.3, May-June 0 pp--7 ISSN: - Maximizing the Lifetime of Clustered Wireless Sensor Network VIA Cooperative Communication J. Divakaran, S. ilango sambasivan Pg student, Sri Shakthi Institute of

More information

SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK

SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK SECURE AND EFFICIENT HYBRID APPROACH FOR DATA TRANSMISSION IN ZIGBEE NETWORK P.M.Shareefa Jareena *1, T.Samraj Lawrence #2, and V.Perathu Selvi #3 * Student, Dept of CSE (SNW), Francis Xavier Engineering

More information

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks Distributed Sensor Networks Volume 2013, Article ID 858765, 6 pages http://dx.doi.org/10.1155/2013/858765 Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless

More information

Mobile Agent Driven Time Synchronized Energy Efficient WSN

Mobile Agent Driven Time Synchronized Energy Efficient WSN Mobile Agent Driven Time Synchronized Energy Efficient WSN Sharanu 1, Padmapriya Patil 2 1 M.Tech, Department of Electronics and Communication Engineering, Poojya Doddappa Appa College of Engineering,

More information

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Journal homepage: www.mjret.in ISSN:2348-6953 A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Ms. Amruta Kodole 1, Prof. P. M. Agarkar 2 Computer Engineering Dr. D. Y. Patil School Of Engineering

More information

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET S. J. Sultanuddin 1 and Mohammed Ali Hussain 2 1 Department of Computer Science Engineering, Sathyabama University,

More information

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group

More information

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach ISSN (Print): 1694 0814 10 Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach Manoj Kumar Mishra 1, Binod Kumar Pattanayak 2, Alok Kumar Jagadev 3, Manojranjan Nayak 4 1 Dept.

More information

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks Gunyoung Koh, Duyoung Oh 1 and Heekyoung Woo 2 1 School of Electrical Engineering and Computer Science Seoul National University,

More information

A Comparative Analysis of Pro-active Routing Protocols in MANET

A Comparative Analysis of Pro-active Routing Protocols in MANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.144

More information

Figure 1: Ad-Hoc routing protocols.

Figure 1: Ad-Hoc routing protocols. Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks Sukhchandan Lally and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {lally, ljilja}@sfu.ca

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols 1 Why can t we use conventional routing algorithms here?? A sensor node does not have an identity (address) Content based and data centric

More information

Time Synchronization in Wireless Sensor Networks: CCTS

Time Synchronization in Wireless Sensor Networks: CCTS Time Synchronization in Wireless Sensor Networks: CCTS 1 Nerin Thomas, 2 Smita C Thomas 1, 2 M.G University, Mount Zion College of Engineering, Pathanamthitta, India Abstract: A time synchronization algorithm

More information

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks

Literature Review on Characteristic Analysis of Efficient and Reliable Broadcast in Vehicular Networks International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 6, Number 3 (2013), pp. 205-210 International Research Publication House http://www.irphouse.com Literature Review

More information

Reconfigure ZigBee Network Based on System Design

Reconfigure ZigBee Network Based on System Design Wireless Sensor Network, 2009, 3, 206-211 doi:10.4236/wsn.2009.13027 Published Online October 2009 (http://www.scirp.org/journal/wsn/). Reconfigure ZigBee Network Based on System Design Yuan XU, Shubo

More information

World Journal of Engineering Research and Technology WJERT

World Journal of Engineering Research and Technology WJERT wjert, 2018, Vol. 4, Issue 4, 527-537. Original Article ISSN 2454-695X Mukhtiar et al. WJERT www.wjert.org SJIF Impact Factor: 5.218 RPD: RELIABLE PACKETS DELIVERY CONGESTION CONTROL SCHEME IN WIRELESS

More information

Power aware Multi-path Routing Protocol for MANETS

Power aware Multi-path Routing Protocol for MANETS Power aware Multi-path Routing Protocol for MANETS Shruthi P Murali 1,Joby John 2 1 (ECE Dept, SNGCE, India) 2 (ECE Dept, SNGCE, India) Abstract: Mobile Adhoc Network consists of a large number of mobile

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Performance Analysis of MANET Routing Protocols OLSR and AODV

Performance Analysis of MANET Routing Protocols OLSR and AODV VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz

More information

To enhance Routing in ZigBee Wireless Networks

To enhance Routing in ZigBee Wireless Networks To enhance Routing in ZigBee Wireless Networks P.Chanthiya Assistant Professor Department of Computer Science & Engineering, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, India Abstract The

More information

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET Bhabani Sankar Gouda Department of Computer Science & Engineering National Institute

More information

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE Journal of Engineering Science and Technology Vol. 4, No. 2 (2009) 132-141 School of Engineering, Taylor s University College A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE 802.11 AND IEEE

More information

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu

Chapter 5 Ad Hoc Wireless Network. Jang Ping Sheu Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson

More information

Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks

Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks Delay Performance of Multi-hop Wireless Sensor Networks With Mobile Sinks Aswathy M.V & Sreekantha Kumar V.P CSE Dept, Anna University, KCG College of Technology, Karappakkam,Chennai E-mail : aswathy.mv1@gmail.com,

More information

Survey on Reliability Control Using CLR Method with Tour Planning Mechanism in WSN

Survey on Reliability Control Using CLR Method with Tour Planning Mechanism in WSN Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.854

More information

2013, IJARCSSE All Rights Reserved Page 85

2013, IJARCSSE All Rights Reserved Page 85 Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Overview of

More information

Ad Hoc Networks: Issues and Routing

Ad Hoc Networks: Issues and Routing Ad Hoc Networks: Issues and Routing Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario K.Gautham 1, Nagajothi A 2 Student, Computer Science and Engineering,

More information

Experimental Evaluation on the Performance of Zigbee Protocol

Experimental Evaluation on the Performance of Zigbee Protocol Experimental Evaluation on the Performance of Zigbee Protocol Mohd Izzuddin Jumali, Aizat Faiz Ramli, Muhyi Yaakob, Hafiz Basarudin, Mohamad Ismail Sulaiman Universiti Kuala Lumpur British Malaysian Institute

More information

A Study of Bellman-Ford, DSR and WRP Routing Protocols with Respect to Performance Parameters for Different Number of Nodes

A Study of Bellman-Ford, DSR and WRP Routing Protocols with Respect to Performance Parameters for Different Number of Nodes A Study of Bellman-Ford, DSR and WRP Routing Protocols with Respect to Performance Parameters for Different Number of Nodes Ruchi Khandelwal 1 & Akhilesh Kosta 2 Department of Computer Science and Engineering

More information

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14 Routing Algorithms Link- State algorithm Each node maintains a view of the whole network topology Find the shortest path

More information

QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks

QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks QoS Challenges and QoS-Aware MAC Protocols in Wireless Sensor Networks S. Shiney Lillia PG Student, Department of Computer Science and Engineering, National Institute of Technology Puducherry, Puducherry,

More information

Wireless Sensor Networks CS742

Wireless Sensor Networks CS742 Wireless Sensor Networks CS742 Outline Overview Environment Monitoring Medical application Data-dissemination schemes Media access control schemes Distributed algorithms for collaborative processing Architecture

More information

Ad Hoc Networks: Introduction

Ad Hoc Networks: Introduction Ad Hoc Networks: Introduction Module A.int.1 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Ad Hoc networks: introduction A.int.1-2

More information

Reliable Time Synchronization Protocol for Wireless Sensor Networks

Reliable Time Synchronization Protocol for Wireless Sensor Networks Reliable Time Synchronization Protocol for Wireless Sensor Networks Soyoung Hwang and Yunju Baek Department of Computer Science and Engineering Pusan National University, Busan 69-735, South Korea {youngox,yunju}@pnu.edu

More information

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet African Journal of Basic & Applied Sciences 9 (1): 27-32, 2017 ISSN 2079-2034 IDOSI Publications, 2017 DOI: 10.5829/idosi.ajbas.2017.27.32 Dynamic Search Technique Used for Improving Passive Source Routing

More information

Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV)

Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV) Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV) WADHAH AL-MANDHARI, KOICHI GYODA 2, NOBUO NAKAJIMA Department of Human Communications The University

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

Data Gathering for Wireless Sensor Network using PEGASIS Protocol

Data Gathering for Wireless Sensor Network using PEGASIS Protocol Data Gathering for Wireless Sensor Network using PEGASIS Protocol Kumari Kalpna a, Kanu Gopal b, Navtej katoch c a Deptt. of ECE, College of Engg.& Mgmt.,Kapurthala, b Deptt. of CSE, College of Engg.&

More information

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

AN EFFICIENT POWER CONTROLLED ROUTING IN MANETs

AN EFFICIENT POWER CONTROLLED ROUTING IN MANETs AN EFFICIENT POWER CONTROLLED ROUTING IN MANETs R. Madhanmohan Assistant Professor, Department of Computer Science and Engineering, Annamalai University, Annamalai nagar, Tamilnadu, India ABSTRACT A MANET

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK COMPARISON OF MANET REACTIVE ROUTING PROTOCOLS USING OPNET SIMULATOR SANGEETA MONGA

More information

Estimate the Routing Protocols for Internet of Things

Estimate the Routing Protocols for Internet of Things Estimate the Routing Protocols for Internet of Things 1 Manjushree G, 2 Jayanthi M.G 1,2 Dept. of Computer Network and Engineering Cambridge Institute of Technology Bangalore, India Abstract Internet of

More information