Mobility Based Tree Construction for ZigBee Wireless Networks
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 1
Abstract
ZigBee is a specification for wireless personal area networks with low power, low cost, and a low data rate. It’s defined by IEEE 802.15.4 standard. In ZigBee wireless network, tree topology is commonly practiced to form wireless sensor networks and perform data delivery applications. In an environment splendidly connected with ZigBee devices, major topological changes can occur due to device failures, mobility and other factor. The reconstruction method designed to reduce the effect of topology changes. In this paper, we explain reduces the frequency route tree construction in mobility patterns and increase the data delivery ratio, and reduce the packet loss caused by node mobility of route tree construction. Overhearing mechanism also includes for mobile nodes to improve the data delivery ratio. We develop an efficient algorithm for mobility based tree construction. The effectiveness framework network topologies constructed using ZigBee is verified by NS2 simulation against a real world circumstances.
Authors and Affiliations
S. G. Santhi , K. Chitralakshmi
Enhanced Double Layer Security using RSA over DNA based Data Encryption System
In this paper we propose an enhanced algorithm to communicate data securely for communication and information security. The DNA cryptography is a new and promising area in cryptography. Here we propose techniques that us...
Impact of Social Media Sentiments and Economic Indicators in Stock Market Prediction
Nowadays, stock market is the one of the major sources of raising resources for India and is act as a key driver for economic growth of a country. The stock market forecasting is a very difficult and highly complicated t...
Implementation of Knowledge Mining with Ontology
Today, huge amount of data available on the web in the form of unstructured, semi-structured and unstructured data. With the use of ontology we can make structured data and use of knowledge mining. As, the knowledge mini...
Preventing mitm attack in simple secure pairing in Bluetooth
Secure simple pairing has been adopted by Bluetooth version “Bluetooth 2.1+EDR(ENHANCED DATA RATE).It should be noted that for establishing Bluetooth connection that uses Diffie hellman public cryptography in its commu...
Design & Evaluation For Conversion from Dv to Mpeg4 Video in Grid Environment
The term, grid computing, has become one of the latest buzz words in the IT industry Grid computing is an innovative approach that leverages existing IT infrastructure to optimize computer resources and manage data and c...