Lifetime Analysis Using Encoding Technique in Wireless Sensor Network
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 9, Issue 3
Abstract
The significant challenge in Wireless Sensor network is to maximize the network lifetime through minimizing energy. The monitoring area close to the Sinknode forms a bottleneck zone because of large traffic- flow which limits the network lifetime in wireless sensor network. In this paper, we introduce an encoding technique for reducing energy consumption in the bottleneck zone. An efficient communication paradigm has been adopted in the bottleneck zone by combining duty cycle and encoding technique. Energy efficiency of the bottleneck zone increases because more volume of data will be transmitted to the Sink with the same number of transmissions. Hence the lifetime of wireless Sensor network is enhanced. Life time can be analysed by considering with two scenarios of single hop and multihop.The lifetimeupper bounds have been analysed by combining duty cycle and encoding technique. The simulation results demonstrate the efficacy of proposed technique.
Authors and Affiliations
M. Selvi , J. Vanitha , V. Shanthi , S. Yasotha
OSI Reference Model: An Overview
A reference model is a conceptual blueprint of how communication should take place. It addresses all the process required for effective communication and divides these processes into logical grouping called layers. When...
Multiple Criteria Decision Making Methodology for Network security
Technology and it’s requirement comes in various ways, considering one of the aspect as the building tool to next level journey of security as Information Security, i.e. how it plays the role in making and controlling th...
RW-Homeomorphism in Topological Spaces
A bijection f:(X,)→(Y, σ) is called regular weakly homeomorphism if f and f[sup]-1[/sup] are rw-continuous. Also we introduce new class of maps namely rw-homeomorphism. This class of maps is closed under composition of...
Anomaly Detection Based on Access Behavior and Document Rank Algorithm
Distributed denial of service (DDoS) attack is ongoing dangerous threat to the Internet. Commonly, DDoS attacks are carried out at the network layer, e.g., SYN flooding,ICMP flooding and UDP flooding, which are called DD...
Dynamic Load Balancing Algorithm in the Global-Local Order
Most traditional dynamic load balancing schemes for hierarchical environments have applied local load balancing first and have expands it to the global load balancing. The major problem of the approach is that unnecessar...