Energy Efficient Scheme for Improving the Performance of Wireless Sensor Networks
Journal Title: International Journal of P2P Network Trends and Technology(IJPTT) - Year 2014, Vol 9, Issue 1
Abstract
The wireless sensor networks sensing the neighbor nodes to disseminated the information to every sensor nodes on the networks area. The random walk through topology is mentioning in this paper for obtaining the results of the sensor networks. The NS2 simulator has been using for deploying the sensor networks and importing 802.15.4 module. The purpose of this module in wireless sensor networks for consuming less power and increase the throughput of the WSNs networks. The proposed Algorithm is using in this paper for tackle the link failure problems with Ad Hoc on demand distance vector routing (AODV) protocol. The RREQ and RREP messages delivered on the sensor networks for filling the routing table information. Each information updated when a sensor node communicates with the destination node. The Euclidean edge length also counted in this paper to sort every sensor node so that the node knows the position of the neighbor node and the distance between the two nodes not more than several meters.
Authors and Affiliations
Bhupinderjeet Singh , Gurpreet Singh
Policy Management in Adhoc Networks
Policy-based management is based on defining a set of global rules, according to which a network or distributed system must operate. In the last few years, policy-based management has begun to emerge as the dominan...
Mobile Ad-hoc Network Simulators, A Survey and Comparisons
Wireless communication technologies have been making growing interest in the past years, which has resulted in many proposals of their new applications. From indoor wireless local area networks to outdoor cellular mobile...
Speaker Independent Recognition System with Mouse Movements
Speech recognition is potentially a multi-billion dollar industry in the near future. It is a natural alternative interface to computers for people with limited mobility in their arms and hands, sight, hearing limi...
A Systematic Security Approach in Software Requirements Engineering
Many software organizations today are confronted with challenge of building secure software systems. Traditional software engineering principles place little emphasis on security. These principles tend to tread s...
Offensive Decoy Technology For Cloud Data Attacks
Cloud Computing enables multiple users to, share common computing resources, and to access and store their personal and business information. These new paradigms have thrown new data security challenges. The majority of...