A Fast Convergence and Quick Route Updates Based EnergyAware Tree-Based Routing Protocol for Mobile WSNS
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract: Wireless Sensor Networks is the result of latest advancements in the field of wireless technology. Therecent upgrades to the wireless network provides the opportunity to wireless sensor networks to fully utilize allthe possible resources to achieve results in the desired area of deployment, further leading to increased energyrequirements within the network. There are plenty of routing algorithms applicable inside WSNs which claim tomaintain the desired energy levels within the network by controlling certain parameters such as packet delay,load, etc. In this paper we have proposed a tree based routing approach that makes the use of aomdv routing tochoose the path for transmission by taking each sensor node’s distance and residual energy as a parameter andperforms effective load balancing to increase the network lifetime. The Proposed model is tested under variousperformance parameters like network load, throughput, data loss and delay and the results shows an increasednetwork lifetime incomparison to the existing model. The proposed work has been implemented in the Ns-2simulator. The experimental results have shown the significant improvement in the results obtained from the proposed algorithm implementation.General Terms: Routing Algorithm, Path forwarding, Energy consumption, Energy-aware routing.
Authors and Affiliations
Amanpreet Singh, Rohit Bajaj, Ph. D
A Distant node Based Multicast Routing protocol for Sparse area vehicle to vehicle communication
Inter-vehicular communication(IVC) is one of the most advanced research areas for last few years. Traditional Mobile-adhoc-network(MANET) protocols are proved to be not that much effective in Vehicularadhoc-netwo...
Improvising Data Locality and Availability in Hbase Ecosystem
Abstract: In this paper, we try to represent the importance of data locality with the HBase architecture. HBase has a dynamic master slave architecture but the emphasis on data locality, i.e. getting the logic or p...
SMS EncryptionUsing One-Time Pad Cipher
Abstract: The content of the SMS is very crucial. It consists of an imperative information. Unknown participants can not retrieve it. To protect the SMS content, the sender must provide the unique characterbefore it is...
Increasing the Visibility of Search using Genetic Algorithm
Abstract : The vast repository of informational databases i.e. Web is available to the user in the form of textual documents. It’s a challenge to develop an effective information retrieval approach that can ease the user...
Palm Vein Extraction and Matching For Personal Identification
Abstract : The most common method used for authentication is Textual passwords. But Textual passwords are in risk to eves dropping, dictionary attacks, social engineering and shoulder surfing. Biometric passwords a...