An Efficient Mechanism Protocol for Wireless Sensor Networks by using Grids
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 3
Abstract
Multilevel short-distance clustering communication is an important scheme to reduce lost data packets over the path to the sink, particularly when nodes are deployed in a dense WSN (wireless sensor network). Our proposed protocol solves the problems of single hop paths in the TDTCGE (two-dimensional technique based on center of gravity and energy) method, which addresses only single-hop problems and does not minimize distances between nodes by using multi-hop nodes with multilevel clustering grids to avoid dropped packets and to guarantee reliable paths without failures. In multilevel clustering grids, transmitted data are aggregated from lower-level grids to upper-level grids. In this paper, the proposed protocol obtains the optimal path for data transmission between cluster heads and the sink for heterogeneous WSNs. The cluster head nodes play an important role in forwarding data originating from other normal nodes that aggregate data to upper clusterheads. This routing approach is more efficient than other routing approaches, and it provides a reliable protocol for avoidance of data loss. In addition, the proposed protocol produces sleep and wakeup signals to the nodes and cluster heads via an MD (mediation device), thereby reducing energy consumption. Simulation results demonstrate the efficiency of the proposed method in terms of fewer dropped packets and high energy efficiency. The network environment overcomes the drawbacks of failure paths and provides reliable transmission to the sink.
Authors and Affiliations
Emad Ibbini, Kweh Yeah Lun, Mohamed Othman, Zurina Mohd Hanapi
Systematic Evaluation of Social Recommendation Systems: Challenges and Future
The issue of information overload could be effectively managed with the help of intelligent system which is capable of proactively supervising the users in accessing relevant or useful information in a tailored way, by p...
An Analysis of Encryption and Decryption Application by using One Time Pad Algorithm
Security of data in a computer is needed to protect critical data and information from other parties. One way to protect data is to apply the science of cryptography to perform data encryption. There are wide variety of...
A Novel Technique for Glitch and Leakage Power Reduction in CMOS VLSI Circuits
Leakage power has become a serious concern in nanometer CMOS technologies. Dynamic and leakage power both are the main contributors to the total power consumption. In the past, the dynamic power has dominated the total p...
Quizrevision: A Mobile Application using the Google MIT App Inventor Language Compared with LMS
At Qassim University, the Blackboard (https://lms.qu.edu.sa) Learning Management System (LMS) is used. An exploratory study was conducted on 105 randomly selected students attending Qassim University. Of these, 91 studen...
Workplace Design and Employee’s Performance and Health in Software Industry of Pakistan
Factors like colour, light, air quality, environmental conditions, and noise has a great effect on the Health and Performance of office employees. All these factors have the impact on employee’s performance and are the r...