SlideShare une entreprise Scribd logo
1  sur  9
IEEE Title:

A Sensor Utilization Scheme for the Coverage Guarantee Criteria in Wireless Sensor Network


Modified Title:

Random Coverage of Cluster in WSN using Energy aware routing protocol


Objective of the project:

To improve the lifetime and to maximize the energy consumption in wireless sensor network


Abstract

       A cluster-based wireless sensor network (WSN) where each sensor node takes turn to be

cluster head. The main function of the cluster head is to oversee the communication within and

between clusters while the remaining sensor nodes are involved in sensing of the surrounding

environment. We address the sensor utilization problem where non-cluster head nodes in a

cluster make decision to whether to be active and join the sensing process. The decision is based

on the remaining energy of a sensor, and a performance criterion. Here, we use the probability

that given point in the cluster is covered by at least N sensors. By using a probabilistic model, it

can be analytically calculated. Since only the high energy and necessary sensors are used, the



                                Ambit lick Solutions
                   Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
energy consumption can be greatly decreased. Using energy aware routing protocol overall

energy usage and lifetime can be improved.


Literature review:


1. A Survey on Routing Protocols and Challenge of Holes in Wireless Sensor Networks:


       Extensive usage of wireless sensor networks is the reason of development of many

routing protocols. In this paper, the working of few routing protocols has been discussed, which

are energy aware and some of them also provide reliability in data transmission. Performance of

various protocols has been presented through simulation results that have been reported by

leading researchers for the purpose of their comparison. The challenges faced by wireless sensor

networks are also discussed in the paper. These challenges (i.e. coverage holes, routing holes,

jamming holes, black/sink holes and worm holes) effect the performance of routing protocols.


2. An Energy Aware Routing Protocol with Sleep Scheduling for Wireless Sensor

Networks:


       Wireless Sensor Networks (WSNs) consist of a large number of small and low cost

sensor nodes powered by small batteries and equipped with various sensing devices. Usually, for

many applications, once a WSN is deployed, probably in an inhospitable terrain, it is expected to

gather the required data for quite some time, say for years. Since each sensor node has limited

energy, these nodes are usually put to sleep to conserve energy, and this helps to prolong the

                                Ambit lick Solutions
                   Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
network lifetime. There are two major approaches to sleep scheduling of sensor nodes, viz. (i)

random (ii) synchronized. Any sleep scheduling scheme has to ensure that data can always be

routed from source to sink. In this paper, we propose a novel approach for sleep scheduling of

sensor nodes using a tree and an energy aware routing protocol which is integrated with the

proposed sleep scheduling scheme. The tree is rooted at the sink node. The internal nodes of the

tree remain awake and the leaf nodes are made to sleep. This provides an assured path from any

node to the sink node. The tree is periodically reconstructed considering the remaining energy of

each node with a view to balance energy consumption of nodes, and removes any failed nodes

from the tree. The proposed approach also considerably reduces average energy consumption

rate of each node as we are able to put more number of nodes to sleep in comparison to other

approaches. Additional fault-tolerance is provided by keeping two paths from each node towards

the sink. Extensive simulation studies of the proposed routing protocol has been carried out using

Castalia simulator, and its performance has been compared with that of a routing protocol, called

GSP, which incorporates sleep scheduling using random approach. The simulation results show

that the proposed approach has longer network lifetime in comparison to that provided by GSP,

and the energy consumption of nodes is also balanced.




                                Ambit lick Solutions
                   Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
3. A QoS-geographic and energy aware routing protocol for Wireless Sensor Networks:


       Recent technological advances in miniaturization and wireless communication have made

Wireless Sensor Networks an active research field. The increasing number of multimedia and

real-time applications for Wireless Sensor Networks has led to a growing interest in Quality of

Service for this category of networks. In this paper, we propose a QoS-geographic and energy

aware routing protocol for Wireless Sensor Networks. The proposed protocol performs

admission control, accounts for bandwidth requirements and considers the sensors residual

energy while taking routing decisions. The protocol also optimizes the delay of carried flows by

adopting a selective forwarding approach based on sensor location.


4. Distributed Deployment Schemes for Mobile Wireless Sensor Networks to Ensure

Multilevel Coverage:


       One of the research issues in wireless sensor networks (WSNs) is how to efficiently

deploy sensors to cover an area. In this paper, we solve the k-coverage sensor deployment

problem to achieve multi-level coverage of an area I. We consider two sub-problems: k-coverage

placement and distributed dispatch problems. The placement problem asks how to determine the

minimum number of sensors required and their locations in I to guarantee that I is k-covered and

the network is connected; the dispatch problem asks how to schedule mobile sensors to move to

the designated locations according to the result computed by the placement strategy such that the

energy consumption due to movement is minimized. Our solutions to the placement problem

                                Ambit lick Solutions
                   Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
consider both the binary and probabilistic sensing models, and allow an arbitrary relationship

between the communication distance and sensing distance of sensors. For the dispatch problem,

we propose a competition-based and a pattern-based schemes. The former allows mobile sensors

to bid for their closest locations, while the latter allows sensors to derive the target locations on

their own. Our proposed schemes are efficient in terms of the number of sensors required and are

distributed in nature. Simulation results are presented to verify their effectiveness.


5. Random coverage with guaranteed connectivity: joint scheduling for wireless sensor

networks:


       Sensor scheduling plays a critical role for energy efficiency of wireless sensor networks.

Traditional methods for sensor scheduling use either sensing coverage or network connectivity,

but rarely both. In this paper, we deal with a challenging task: without accurate location

information, how do we schedule sensor nodes to save energy and meet both constraints of

sensing coverage and network connectivity? Our approach utilizes an integrated method that

provides statistical sensing coverage and guaranteed network connectivity. We use random

scheduling for sensing coverage and then turn on extra sensor nodes, if necessary, for network

connectivity. Our method is totally distributed, is able to dynamically adjust sensing coverage

with guaranteed network connectivity, and is resilient to time asynchrony. We present analytical

results to disclose the relationship among node density, scheduling parameters, coverage quality,




                                 Ambit lick Solutions
                    Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
detection probability, and detection delay. Analytical and simulation results demonstrate the

effectiveness of our joint scheduling method




SYSTEM ANALYSES:


Existing System:


Source Dependent Broadcasting Protocols


Proposed System:


       A broadcasting node uses existing source dependent broadcasting protocols to select a set

       of forwarding nodes to cover all its 2-hop neighbors. Then, it adjusts its transmission

       power to reach its furthest forwarding node.

       The node determines whether its current forwarding nodes as well as transmission power

       are able to cover all its immediate neighbors. If yes, it continues to broadcast the

       message. Otherwise, it attempts to find additional forwarding nodes to reach those

       uncovered neighbors or simply extends its current transmission power to reach the

       furthest uncovered neighbor.

       Variable Transmission Power Protocols.

       Power law model


                               Ambit lick Solutions
                   Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
o
               Precv = Ptx / rn

       Enhanced PABLO

       Enhanced Inside-Out Power Adaptive Approach (E-INOP)




Algorithm :


Dominant Pruning (DP) Protocol :


       The earliest deterministic broadcasting protocols. A node that receives a broadcast

message from source node and selects a minimum number of forwarding nodes from Network to

cover all nodes. The greedy algorithm is adopted to select forwarding nodes from the network to

cover all nodes.




1) Node v establishes the set B(u; v) and U(u; v) using


       N(N(v)), N(u), and N(v):


       U(u; v) = N(N(v)) �N(u) � N(v)


       B(u; v) = N(v) � N(u)




                                Ambit lick Solutions
                   Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
2) Node v then executes the greedy algorithm to select forwarding nodes from B(u; v) to cover

all nodes in U(u; v).


Total Dominant Pruning (TDP) Protocol


       TDP is more effective than DP in reducing redundant broadcasting but it incurs

additional overhead in piggybacking each data message with a list of 2-hop neighbors of the

senders.


The TDP algorithm is:


       1) Node v establishes the set B(u; v) and U(u; v) using


               N(N(v)) and N(N(u)):


               U(u; v) = N(N(v)) �N(N(u))


               B(u; v) = N(v) �N(u)


       2) Node v then executes the greedy algorithm to select forwarding nodes from B(u; v) to

cover all nodes in U(u; v).


Partial Dominant Pruning (PDP) Protocol


       PDP algorithm does not require additional overhead, like TDP. Instead of just excluding

nodes in network. the 2-hop neighbor set to be covered.


                                Ambit lick Solutions
                    Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
The PDP algorithm is summarized below:


1) Node v establishes the set B(u; v) and U(u; v) using


       N(N(v)), N(u), N(v), and N(N(u)  N(v)):


       U(u; v) = N(N(v))�N(u)�N(v)�N(N(u)N(v))


       B(u; v) = N(v) � N(u)


2) Node v then executes the greedy algorithm to select forwarding nodes from B(u; v) to cover

all nodes in U(u; v).




                                Ambit lick Solutions
                    Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com

Contenu connexe

Plus de ambitlick

Ambitlick ns2 2013
Ambitlick ns2 2013Ambitlick ns2 2013
Ambitlick ns2 2013
ambitlick
 
Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013
ambitlick
 
Handling selfishness in replica allocation
Handling selfishness in replica allocationHandling selfishness in replica allocation
Handling selfishness in replica allocation
ambitlick
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocols
ambitlick
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroups
ambitlick
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secrets
ambitlick
 
Integrated institutional portal
Integrated institutional portalIntegrated institutional portal
Integrated institutional portal
ambitlick
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroups
ambitlick
 

Plus de ambitlick (20)

DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
 
Low cost Java 2013 IEEE projects
Low cost Java 2013 IEEE projectsLow cost Java 2013 IEEE projects
Low cost Java 2013 IEEE projects
 
Ambitlick ns2 2013
Ambitlick ns2 2013Ambitlick ns2 2013
Ambitlick ns2 2013
 
Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013
 
Handling selfishness in replica allocation
Handling selfishness in replica allocationHandling selfishness in replica allocation
Handling selfishness in replica allocation
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocols
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroups
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secrets
 
IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2  IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2
 
Adaptive weight factor estimation from user review 1
Adaptive weight factor estimation from user   review 1Adaptive weight factor estimation from user   review 1
Adaptive weight factor estimation from user review 1
 
Integrated institutional portal
Integrated institutional portalIntegrated institutional portal
Integrated institutional portal
 
Embassy
EmbassyEmbassy
Embassy
 
Crm
Crm Crm
Crm
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocols
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroups
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secrets
 
Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”
 
Energy efficient protocol for deterministic
Energy efficient protocol for deterministicEnergy efficient protocol for deterministic
Energy efficient protocol for deterministic
 
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
 
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
A Privacy-Preserving Location Monitoring System for Wireless Sensor NetworksA Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
 

Dernier

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Dernier (20)

Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 

A Sensor Utilization Scheme for the Coverage Guarantee Criteria in Wireless Sensor Network

  • 1. IEEE Title: A Sensor Utilization Scheme for the Coverage Guarantee Criteria in Wireless Sensor Network Modified Title: Random Coverage of Cluster in WSN using Energy aware routing protocol Objective of the project: To improve the lifetime and to maximize the energy consumption in wireless sensor network Abstract A cluster-based wireless sensor network (WSN) where each sensor node takes turn to be cluster head. The main function of the cluster head is to oversee the communication within and between clusters while the remaining sensor nodes are involved in sensing of the surrounding environment. We address the sensor utilization problem where non-cluster head nodes in a cluster make decision to whether to be active and join the sensing process. The decision is based on the remaining energy of a sensor, and a performance criterion. Here, we use the probability that given point in the cluster is covered by at least N sensors. By using a probabilistic model, it can be analytically calculated. Since only the high energy and necessary sensors are used, the Ambit lick Solutions Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 2. energy consumption can be greatly decreased. Using energy aware routing protocol overall energy usage and lifetime can be improved. Literature review: 1. A Survey on Routing Protocols and Challenge of Holes in Wireless Sensor Networks: Extensive usage of wireless sensor networks is the reason of development of many routing protocols. In this paper, the working of few routing protocols has been discussed, which are energy aware and some of them also provide reliability in data transmission. Performance of various protocols has been presented through simulation results that have been reported by leading researchers for the purpose of their comparison. The challenges faced by wireless sensor networks are also discussed in the paper. These challenges (i.e. coverage holes, routing holes, jamming holes, black/sink holes and worm holes) effect the performance of routing protocols. 2. An Energy Aware Routing Protocol with Sleep Scheduling for Wireless Sensor Networks: Wireless Sensor Networks (WSNs) consist of a large number of small and low cost sensor nodes powered by small batteries and equipped with various sensing devices. Usually, for many applications, once a WSN is deployed, probably in an inhospitable terrain, it is expected to gather the required data for quite some time, say for years. Since each sensor node has limited energy, these nodes are usually put to sleep to conserve energy, and this helps to prolong the Ambit lick Solutions Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 3. network lifetime. There are two major approaches to sleep scheduling of sensor nodes, viz. (i) random (ii) synchronized. Any sleep scheduling scheme has to ensure that data can always be routed from source to sink. In this paper, we propose a novel approach for sleep scheduling of sensor nodes using a tree and an energy aware routing protocol which is integrated with the proposed sleep scheduling scheme. The tree is rooted at the sink node. The internal nodes of the tree remain awake and the leaf nodes are made to sleep. This provides an assured path from any node to the sink node. The tree is periodically reconstructed considering the remaining energy of each node with a view to balance energy consumption of nodes, and removes any failed nodes from the tree. The proposed approach also considerably reduces average energy consumption rate of each node as we are able to put more number of nodes to sleep in comparison to other approaches. Additional fault-tolerance is provided by keeping two paths from each node towards the sink. Extensive simulation studies of the proposed routing protocol has been carried out using Castalia simulator, and its performance has been compared with that of a routing protocol, called GSP, which incorporates sleep scheduling using random approach. The simulation results show that the proposed approach has longer network lifetime in comparison to that provided by GSP, and the energy consumption of nodes is also balanced. Ambit lick Solutions Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 4. 3. A QoS-geographic and energy aware routing protocol for Wireless Sensor Networks: Recent technological advances in miniaturization and wireless communication have made Wireless Sensor Networks an active research field. The increasing number of multimedia and real-time applications for Wireless Sensor Networks has led to a growing interest in Quality of Service for this category of networks. In this paper, we propose a QoS-geographic and energy aware routing protocol for Wireless Sensor Networks. The proposed protocol performs admission control, accounts for bandwidth requirements and considers the sensors residual energy while taking routing decisions. The protocol also optimizes the delay of carried flows by adopting a selective forwarding approach based on sensor location. 4. Distributed Deployment Schemes for Mobile Wireless Sensor Networks to Ensure Multilevel Coverage: One of the research issues in wireless sensor networks (WSNs) is how to efficiently deploy sensors to cover an area. In this paper, we solve the k-coverage sensor deployment problem to achieve multi-level coverage of an area I. We consider two sub-problems: k-coverage placement and distributed dispatch problems. The placement problem asks how to determine the minimum number of sensors required and their locations in I to guarantee that I is k-covered and the network is connected; the dispatch problem asks how to schedule mobile sensors to move to the designated locations according to the result computed by the placement strategy such that the energy consumption due to movement is minimized. Our solutions to the placement problem Ambit lick Solutions Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 5. consider both the binary and probabilistic sensing models, and allow an arbitrary relationship between the communication distance and sensing distance of sensors. For the dispatch problem, we propose a competition-based and a pattern-based schemes. The former allows mobile sensors to bid for their closest locations, while the latter allows sensors to derive the target locations on their own. Our proposed schemes are efficient in terms of the number of sensors required and are distributed in nature. Simulation results are presented to verify their effectiveness. 5. Random coverage with guaranteed connectivity: joint scheduling for wireless sensor networks: Sensor scheduling plays a critical role for energy efficiency of wireless sensor networks. Traditional methods for sensor scheduling use either sensing coverage or network connectivity, but rarely both. In this paper, we deal with a challenging task: without accurate location information, how do we schedule sensor nodes to save energy and meet both constraints of sensing coverage and network connectivity? Our approach utilizes an integrated method that provides statistical sensing coverage and guaranteed network connectivity. We use random scheduling for sensing coverage and then turn on extra sensor nodes, if necessary, for network connectivity. Our method is totally distributed, is able to dynamically adjust sensing coverage with guaranteed network connectivity, and is resilient to time asynchrony. We present analytical results to disclose the relationship among node density, scheduling parameters, coverage quality, Ambit lick Solutions Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 6. detection probability, and detection delay. Analytical and simulation results demonstrate the effectiveness of our joint scheduling method SYSTEM ANALYSES: Existing System: Source Dependent Broadcasting Protocols Proposed System: A broadcasting node uses existing source dependent broadcasting protocols to select a set of forwarding nodes to cover all its 2-hop neighbors. Then, it adjusts its transmission power to reach its furthest forwarding node. The node determines whether its current forwarding nodes as well as transmission power are able to cover all its immediate neighbors. If yes, it continues to broadcast the message. Otherwise, it attempts to find additional forwarding nodes to reach those uncovered neighbors or simply extends its current transmission power to reach the furthest uncovered neighbor. Variable Transmission Power Protocols. Power law model Ambit lick Solutions Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 7. o Precv = Ptx / rn Enhanced PABLO Enhanced Inside-Out Power Adaptive Approach (E-INOP) Algorithm : Dominant Pruning (DP) Protocol : The earliest deterministic broadcasting protocols. A node that receives a broadcast message from source node and selects a minimum number of forwarding nodes from Network to cover all nodes. The greedy algorithm is adopted to select forwarding nodes from the network to cover all nodes. 1) Node v establishes the set B(u; v) and U(u; v) using N(N(v)), N(u), and N(v): U(u; v) = N(N(v)) �N(u) � N(v) B(u; v) = N(v) � N(u) Ambit lick Solutions Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 8. 2) Node v then executes the greedy algorithm to select forwarding nodes from B(u; v) to cover all nodes in U(u; v). Total Dominant Pruning (TDP) Protocol TDP is more effective than DP in reducing redundant broadcasting but it incurs additional overhead in piggybacking each data message with a list of 2-hop neighbors of the senders. The TDP algorithm is: 1) Node v establishes the set B(u; v) and U(u; v) using N(N(v)) and N(N(u)): U(u; v) = N(N(v)) �N(N(u)) B(u; v) = N(v) �N(u) 2) Node v then executes the greedy algorithm to select forwarding nodes from B(u; v) to cover all nodes in U(u; v). Partial Dominant Pruning (PDP) Protocol PDP algorithm does not require additional overhead, like TDP. Instead of just excluding nodes in network. the 2-hop neighbor set to be covered. Ambit lick Solutions Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 9. The PDP algorithm is summarized below: 1) Node v establishes the set B(u; v) and U(u; v) using N(N(v)), N(u), N(v), and N(N(u) N(v)): U(u; v) = N(N(v))�N(u)�N(v)�N(N(u)N(v)) B(u; v) = N(v) � N(u) 2) Node v then executes the greedy algorithm to select forwarding nodes from B(u; v) to cover all nodes in U(u; v). Ambit lick Solutions Mail Id: Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com