SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
Hemantkumar Damor, Jitendra S. Dhobi / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.1187-1190
1187 | P a g e
A Review on Energy Optimization in Wireless Sensor Networks
Hemantkumar Damor1
, Jitendra S. Dhobi2
1, 2
Computer Engineering Department Govt. Engineering College, Modasa
Abstract
IEEE 802.11 standard defines the
principles of Wireless LAN (Local Area Network). It
mainly categorized into 2 different topologies:
Infrastructure Network and Ad-hoc network. Ad-
hoc networks can uses only created networks for
“this purpose only” goal. On other way,
Infrastructure network uses fixed “permanent”
infrastructure. The main objective behind this both
type of topology is to save energy in Wireless Sensor
Nodes (WSNs). Connection of different WSNs are
called as Wireless Sensor Networks. In this paper,
we will review some of the techniques for energy
optimization in Wireless Sensor Networks.
Keywords— Energy Optimization, Wireless Sensor
Network, Review, Power saving, MAC protocols,
Routing protocol, survey
I. INTRODUCTION
Sensor Network (WSN) is a typical sensor
network made up of a huge number of less power,
less cost distributed devices. These devices are called
as nodes. They are deployed in the environment that
is being sensed and controlled [1].This network is
composed of a large number of small nodes which
able to pass messages with each other and it can be
used to monitor inaccessible areas. Due to this reason,
each node has memory, processor, battery and
wireless antenna. Nodes can not only sense scalars
like acoustic, light and temperature from the
environment but may also process and transmit them
by radio. It uses free band 2.4 GHz to transmit the
data. Some special nodes must be present with
special configuration and special hardware to process,
collect and store data from the WSN’s nodes. The
special node is known as Base Station (BS). Now a
day, the WSNs are mostly based on low cost
processors and low energy consumers and small
memory. The WSNs must have long life because in
many applications, the networks are used for remote
areas where recharging and/or replacement of power
supply is very difficult or prohibitive due to some
restriction or safety issues. But the availability of
cheap hardware for the radio communication
frequency, there can be a lot numerous topologies for
WSNs [2][3][4].So, in such type of areas, we need to
use protocols that can self organize and optimize
energy consumption[2].
WSNs must have following characteristics [3]
1. It must be self-organizing
2. It must use small range wireless communication
and multi-hop routing protocols
3. Very huge number of nodes and cooperation
between nodes.
4. Different WSN topologies.
5. Resources like battery, memory must be limited.
The challenges in deployment of WSNs are
as follows [1-3][5][6]:
1. The WSNs are used for not only collecting
environmental information but it also used for
changing the environment information.
2. The resources are limited and memory is less. It
should manage all the complex functionality using
different topologies.
3. There are many uncertainties in WSNs. They can
affect the functionality of WSN.
4. One of the big challenges of WSN is to make the
node as self-organizing and self-optimizing.
5. There can be a large number of WSN nodes but
network must have limited number of nodes that
guarantee the desired WSN service.
6. WSN operates in the real world. So, it must have
real-time features as per need.
7. WSNs are not safe because it uses free band. So,
there must be some security for managing original
data.
WSNs are made up of integrate general-purpose
computing with heterogeneous sensing nodes and
wireless communication and low power sensor. The
power unit is one of the most important components
of a sensor node [8].A WSN can limit the radio
frequency channel, due to, that is to say, unstable
links, limit of physical protection of each sensor node,
actual of each nodes connection, variation topology
in addition dangerousness about routing security is
high by activity spite nodes. The restrictions in the
hardware of the sensor nodes, makes it difficult to
guarantee the maintenance of security because of its
vulnerability.[9][10].A WSN is consists of spatially
distributed autonomous sensors together monitor
physical or environmental conditions. A sensor
network normally makes a wireless ad-hoc network,
that is, each sensor is deployed with a multi-hop
routing algorithm. The network does not have any
already existing infrastructure, such as routers in
wired networks or access points in managed
(infrastructure) wireless networks. In place of this,
each node participates in routing by just forwarding
the data for other nodes, and so the determination of
which nodes forward data is made based upon the
network connectivity and many other parameters.
Base Stations act as a gateway between the sensor
nodes and the end user. Figure 1 shows the basic
components of a sensor node [11].
Hemantkumar Damor, Jitendra S. Dhobi / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.1187-1190
1188 | P a g e
Figure 1 Components of Sensor node [11]
II. MOTIVATING EXAMPLE
The RFId (Radio Frequency Identifier) is
also one type of identifier in small wireless networks.
It can be used in many applications. In a library, each
and every book can identify by its ID called RFId. In
a case where anyone want to take a book out of
library without knowing to the administrative staff,
the sensor of RFId near to the exit of the library can
catch such persons. So, these RFId is just playing role
of transmitter and receiver. In another example, forest
fire monitoring system, the RFId's are used for
monitoring the fire in the forest where human can not
be available all the time. All RFIds are placed in the
areas where we want to know about fire. The RFIds
are very cheap in cost, so there can be many RFIds in
such places. So, whenever the rapid change in
temperature is found, the RFIds can pass the message
to other nearer nodes and make a chain to pass the
message to observer. Here, RFIds are not having
capability of processing the inputs. So, the concept of
Wireless Sensor Node was introduced. WSNs can
provide same functionality as provided by RFId.
Both uses Radio Frequency free band (i.e 2.4 GHz).
We can have some processing capability in WSNs.
There are same resource constraints (battery life,
memory) in both. WSNs are used in such type of
applications. Another important application of WSNs
is to monitor the inside sea movements. Sensors can
be thrown freely (sensors are very cheap) in the
ocean and they are monitored by the base station. The
Base Station can make decision in problematic
situations. WSNs are always having a Base Station
(BS) to receive the signal from the sensors. Due to
energy constraints, sensors can not pass the message
directly to the BS but it send to neighbour node and
then similar way the message can reach to BS. The
main constraint is energy as WSNs are operated with
small battery life. So, to improve the battery life of
WSNs we need to go for energy optimization
techniques for WSNs. It is discussed in the
subsequent sections.
III. VARIOUS WSN PROTOCOLS AND
TECHNIQUES
A. MAC layer techniques
The main portion of the node's energy is
spent on radio transmission and on listening the
medium for message [7]. For sending and receiving
the data, node requires more energy compared to
processing data. The performance depends upon how
fairly and efficiently the node shares the medium
because they have a single medium for
communication shared by nodes. MAC protocols
manage communication and regulate the shared
medium such that performance is improved.
i) ZigBee technology The main aim of ZigBee
technology is to have WSNs, made up of large
nodes, work with less energy consumption. It is
based on Open System Interconnection (OSI).
ZigBee works with IEEE 802.15.4 standard. It
defines the lower physical and MAC layer. Its
physical layer operates in 2 frequencies 868/915
MHz or 2.4GHz. It can have maximum 255Kbps
of maximum transfer rate. It is mainly based
upon Carrier Sense Multiple Access - Collision
Avoidance (CSMA-CA). IEEE 802.15.4 can
operation in one of the 2 modes namely
Beaconless Mode (without beacon packet) and
Beacon Mode (beacons are periodically sent to
co-ordinate nodes).
ii) Other techniques Other techniques used as MAC
layer techniques are Time Division Multiple
Access (TDMA) and Duty Cycles (DC). In
TDMA, the time spent by devices on the channel
is divided into time periods called as time
slots.Each time slot is used by one device
exclusively. The TDMA MAC protocol is based
upon cross layer optimization based upon
Physical layers and MAC[12].Its main goal is to
reduce the energy consumption. FlexiTP and
PEDAMACS are TDMA MAC protocol
examples. The Duty Cycles (DC) techniques
divides the operating time of devices into 2
periods namely Active and Inactive(sleeping).
Shorter the Active time, lesser the energy
consumption and higher energy saving. Longer
the active time, more energy is utilized.
B. Network layer (Routing) approaches
The main objective of WSNs application is
to gather the data from nodes and transfer the data to
sink in energy efficient way using proper routing
protocol. A clustering protocol REACA's functions
are divided into 2 cycles: in first cycle, network
configuration is done, while in second cycle, message
transmission is considered. In this protocol, cluster
head is choosen based upon battery energy level[13].
EARQ is another routing protocol based upon energy
Hemantkumar Damor, Jitendra S. Dhobi / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.1187-1190
1189 | P a g e
level. Its main objective is to use greatest energy
level path inside WSN. It can be implemetable in
industry applications. MMSPEED is another routing
protocol approach which is able to guarantee
probabilistic QoS (Quality of Service) in WSNs. It
considers different options of speed delivery in time
domain[14]. The q-switch routing algorithm is a
routing technique for the support of non uniform
node distribution strategy. In this approach, authors
also suggested that in this protocol, the unbalanced
energy consumption is unavoidable[15]. Energy
Efficient Broadcast Problem (EEBP) in ad hoc
wireless networks is : find a broadcast tree such that
the energy cost of the broadcast tree is minimized.
Green Wave Sleep Scheduling(GWSS) was inspired
by synchronized traffic lights. The main objective is
to support Duty Cycling in WSN's routing. Moving
sequence of consecutive green light (active states) is
called as Green Wave. In this approach, the sleeping
nodes are considered as red light and the data is not
passed from such nodes [16].
C. Transmission control approaches
There are many Transmission Power
Control (TPC) approaches available. Its main goal is
to reduce the energy consumption and improve the
channel capacity. TPC solutions work with single
transmission power for whole network. Some of the
TCP studies focus on the improvement of the channel
capacity.Some of experimental studies shows that
energy consumption is reduced in low-power
WSNs.One of the algorithm is Power Control
Algorithm with Backlisting (PCBL), in this algorithm,
each node transmit the packet with different
transmission power levels to find optimal trasmission
power based on Packet Reception Ratio (PRR) [17].
To get the optimal transmission power for a
particular link, Adaptive Transmission Power Control
(ATPC) algorithm is used. To empoy a feedback
based ATPC algorithm and to estimate optimal
transmission power level, the Received Signal
Strength(RSS) and the Link Quality Indicator (LQI)
parameters are being used.
IEEE 802.11 WLANs and IEEE 802.15.1
Bluetooth wireless networks operates on 2.4 GHz
ISM band. So, there is a chance that these devices
interefere the normal working of WSN devices
because transmission power of WSN devices is less
compared to bluetooth and WLAN devices[18].
Practically, TPC algorithm is considered as
Interference aware Transmission Power Control (I-
TPC) [18]. In this algorithm, each node adjust the
RSS target to provide acceptable SINR (Signal- to -
Interference - plus - Noise - Ratio) when interference
are detected.
Local algorithms individually adjust the
node's transmission power [19]. These type of
approaches do not require any MAC protocol or
dedicated route protocols.They implements Local
Mean Algorithm (LMA). In it, each node periodically
sends a life message and each receiving nodes
respond with life acknowledge messages. Everytime
before sending any information, each node counts the
number of received acknowledge messages and
compare it with the threshold value. LMA approach
allow each node to have count of each neighbors.
Some of the global approaches like Equal
Transmission Power (ETP) are comparable with local
algorithms. When going for network's confidence
level, scalability and implimatability, local
algorithms are better compared to global.
D. Autonomic Approaches
Autonomic computing was introduced by
IBM in 2001 to describe the systems that are self-
manageable [20].The main properties with are [21]:
Self- configuration: It concern with system's ability to
configure by itself for achieving high level goals.
Self-optimization: It concern with the change in
system pro-actively to optimize the performance or
quality of service.
Self-healing: It deals with the identification
and solving the problem in the system.
Self-protection: It concern with system security
against malicious attacks or unauthorized changes.
Generic Machine Learning Algorithm (GMLA)
was developed to make use of trade-off between
different metrices. When network topology is
unknown to base station, GMLA's main goal is to
improve the communication efficiency[22]. Another
algorithm called Variable Offset Algorithm (VOA)
was proposed to reduce the communication
efficiency in dense WSN with star topology [22].
IV. Conclusions
Wireless Sensor Network is the best solution
to access the data from inaccessible areas. The
devices used for this analysis is having restriction of
limited battery life. In this paper, we have discussed
different possible areas where we can reduce the
energy consumption caused by the node and result
into saving the battery life. Moreover, we can say that
the main reason behind energy consumption is the
data processing process and data transmission
process. We can look for the algorithms which can
reduce this both criteria. From above discussion, we
can conclude that MAC protocols can manage energy
consumption during WSN communication. It is the
most energy consuming process in WSNs. On other
hand, transmission power consumption is also a
major problem in WSNs. Transmission control
protocols can be used to lower the transmission
power overhead. But if the transmission power
becomes still lower then it can increase the
vulnerability to fluctuations generated by SINR.
Based upon the route selected, the energy consumed
by the node can be increase or decrease. So, in order
to reduce the energy consumption, routing protocols
Hemantkumar Damor, Jitendra S. Dhobi / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 4, Jul-Aug 2013, pp.1187-1190
1190 | P a g e
are used. Some of the protocols obey the property of
“self”. These protocols can handle, manage and
decide based upon the different situation and take
their decision.
V. Acknowledgment
Authors would like to thank the Computer
department of Government Engineering College,
Modasa for providing the resources to carry out this
work. Author would also like to thank Gujarat
Technological University to motivate us to work.
REFERENCES
[1] Stankovic, J.A.; Abdelzaher, T.F.; Lu, C.; Sha,
L. & Hou, J. C. (2003). “Real-Time
Communication and Coordination in
Embedded Sensor Networks”. Proceedings of
the IEEE, Vol. 91, No. 7, pp. 1002-1022, 2003
[2] Akyildiz, I. F.; Su W.; Sankarasubramaniam Y.
& Cayirci E. (2002). “A Survey on Sensor
Networks”. IEEE Communications Magazine,
pp. 102-114.
[3] Ilyas, M. & Mahgoub, I. (2005). “Handbook of
Sensor Networks: Compact Wireless and
Wired Sensing Systems,” CRC Press Inc.,
Boca Raton, USA.
[4] Oliver, R. S. & Fohler, G. (2010). “Timeliness
in Wireless Sensor Networks: Common
Misconceptions”. Proceedings of the 9th
International Workshop on Real]Time
Networks, Brussels, Belgium, July 2010.
[5] Molla, M. & Ahamed, S. I., “A Survey for
Sensor Network and Challenges”. (2006).
Proceedings of the 2006 International
Conference on Parallel Processing Workshops,
2006.
[6] Yick, J.; Mukherjee, B. & Ghosal, D. (2008).
“Wireless sensor network survey”. Computer
Networks, no. 52, pp. 2292–2330.
[7] Gholamzadeh, B. & Nabovati, H. (2008).
“Concepts for Designing Low Power Wireless
Sensor Networks”, World Academy of Science,
Engineering and Technology.
[8] M.Ismail, M.Y.Sanavullah, “Security
Topology in Wireless Sensor Networks With
Routing Optimisation”IEEE 2008.
[9] G.M. Ben Ezovski, S.E. Watkins, "The
Electronic Sensor Node and the Future of
Government-Issued RFID-Based
Identification", RFID 2007.IEEE International
Conference, pp 15-22, 2007.
[10] I.F. Akyiliz, W. Su, Y.Sankarasubramaniam
and E. Cayirci, "A Survey on Sensor Network",
IEEE Communication Magazine, pp 102-114,
2002.
[11] Debmalya, Bhattacharya and
R.Krishnamoorthy, “Power Optimization in
Wireless Sensor Networks”, IJCSI
International Journal of Computer Science
Issues, Vol. 8, Issue 5, No 2, September 2011,
pp. 415-419.
[12] Shi, L. & Fapojuwo, A. O. (2010). “TDMA
Scheduling with Optimized Energy Efficiency
and Minimum Delay in Clustered Wireless
Sensor Networks”. IEEE Transactions on
Mobile Computing, Vol. 9, No. 7, July 2010.
[13] Quan, Z.; Subramanian, A. & Sayed, A. H.
(2007). “REACA: An Efficient Protocol
Architecture for Large Scale Sensor Networks.
IEEE Transactions on Wireless
Communications”, Vol. 6, No. 10, pp. 3846-
3855, 2007.
[14] Felemban, E.; Lee, C. & Ekicin, E. (2006).
“MMSPEED: Multipath Multi]SPEED
Protocol for QoS Guarantee of Reliability and
Timeliness in Wireless Sensor Networks”.
IEEE Transactions on Mobile Computing,
Vol.5, No. 6, pp. 738-754.
[15] Wu, X.; Chen, G. & Das, S. K. (2008).
“Avoiding Energy Holes in Wireless Sensor
Networks with Nonuniform Node
Distribution”. IEEE Transactions on Parallel
and Distributed Systems, Vol. 19, No. 5.
[16] Guha, S.; Basu, P.; Chau, C. & Gibbens, R.
(2011). “Green Wave Sleep Scheduling:
Optimizing Latency and Throughput in Duty
Cycling Wireless Networks”. IEEE Journal on
Selected Areas in Communications, Vol. 29,
No. 8.
[17] Lin, S.; Zhang, J.; Zhou, G.; Gu, L.; He, T. &
Stankovic, J. A. (2006). “ATPC: Adaptive
Transmission Power Control for Wireless
Sensor Networks”. Proceedings of SenSys’06,
November 2006.
[18] Kim, J. & Know, Y. (2008). “Interference-
Aware Transmission Power Control for
Wireless Sensor Networks”. IEICE Trans.
Commun., Vol. E91-B, No. 11, November
2008.
[19] Kubisch, M.; Karl, H.; Wolisz, A.; Zhong, L.
C. & Rabaey, J. (2003). “Distributed
Algorithms for Transmission Power Control in
Wireless Sensor Networks”, Proceedings of
WCNS03, IEEE Wireless Communications
and Networking Conference, March 2003.
[20] Kephart, J.O. , Chess, D.M., “The Vision of
Autonomic Computing”, IEEE Computer,
2003.
[21] Huebscher, M. C. & McCann, J. A. (2008). “A
survey of autonomic computing degrees,
models, and applications”. ACM Comput
Surveys.
[22] Pinto, A.R., Montez, C. “Autonomic
Approaches for Enhancing Communication
QoS in Dense Wireless Sensor Networks with
Real Time Requirements”, 2010 IEEE Int. Test
Conference, 2010. 1-10.

Contenu connexe

Tendances

IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...IRJET Journal
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET Journal
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkijcsa
 
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET Journal
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Networkiosrjce
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Editor IJARCET
 
Energy Consumption in chain based routing protocol in wireless sensor network
Energy Consumption in chain based routing protocol in wireless sensor networkEnergy Consumption in chain based routing protocol in wireless sensor network
Energy Consumption in chain based routing protocol in wireless sensor networkBADALKUMAR56
 
Wireless sensor networks dcs
Wireless sensor networks dcsWireless sensor networks dcs
Wireless sensor networks dcsAbhishek Raj
 
01 computer communication and networks v
01 computer communication and networks v01 computer communication and networks v
01 computer communication and networks vSwarup Kumar Boro
 
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEYijujournal
 
Power Optimization Technique for Sensor Network
Power Optimization Technique for Sensor NetworkPower Optimization Technique for Sensor Network
Power Optimization Technique for Sensor NetworkEditor IJCATR
 
Mobile Relay Configuration in Data-Intensuive Wireless Sensor with Three Rout...
Mobile Relay Configuration in Data-Intensuive Wireless Sensor with Three Rout...Mobile Relay Configuration in Data-Intensuive Wireless Sensor with Three Rout...
Mobile Relay Configuration in Data-Intensuive Wireless Sensor with Three Rout...IJERA Editor
 
Wireless sensor networks software architecture
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architectureAdeel Javaid
 
Power Management in Wireless Sensor Network
Power Management in Wireless  Sensor NetworkPower Management in Wireless  Sensor Network
Power Management in Wireless Sensor NetworkIRJET Journal
 
A RELATIVE STUDY ON CELLULAR, WSN AND MANETS
A RELATIVE STUDY ON CELLULAR, WSN AND MANETSA RELATIVE STUDY ON CELLULAR, WSN AND MANETS
A RELATIVE STUDY ON CELLULAR, WSN AND MANETSIAEME Publication
 

Tendances (19)

IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Energy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor networkEnergy efficient mac protocols for wireless sensor network
Energy efficient mac protocols for wireless sensor network
 
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Network
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581
 
Energy Consumption in chain based routing protocol in wireless sensor network
Energy Consumption in chain based routing protocol in wireless sensor networkEnergy Consumption in chain based routing protocol in wireless sensor network
Energy Consumption in chain based routing protocol in wireless sensor network
 
Wireless sensor networks dcs
Wireless sensor networks dcsWireless sensor networks dcs
Wireless sensor networks dcs
 
01 computer communication and networks v
01 computer communication and networks v01 computer communication and networks v
01 computer communication and networks v
 
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
TIME SYNCHRONIZATION IN WIRELESS SENSOR NETWORKS: A SURVEY
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Power Optimization Technique for Sensor Network
Power Optimization Technique for Sensor NetworkPower Optimization Technique for Sensor Network
Power Optimization Technique for Sensor Network
 
Mobile Relay Configuration in Data-Intensuive Wireless Sensor with Three Rout...
Mobile Relay Configuration in Data-Intensuive Wireless Sensor with Three Rout...Mobile Relay Configuration in Data-Intensuive Wireless Sensor with Three Rout...
Mobile Relay Configuration in Data-Intensuive Wireless Sensor with Three Rout...
 
Wireless sensor networks software architecture
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architecture
 
Power Management in Wireless Sensor Network
Power Management in Wireless  Sensor NetworkPower Management in Wireless  Sensor Network
Power Management in Wireless Sensor Network
 
A RELATIVE STUDY ON CELLULAR, WSN AND MANETS
A RELATIVE STUDY ON CELLULAR, WSN AND MANETSA RELATIVE STUDY ON CELLULAR, WSN AND MANETS
A RELATIVE STUDY ON CELLULAR, WSN AND MANETS
 
Aq4103266271
Aq4103266271Aq4103266271
Aq4103266271
 
K016136062
K016136062K016136062
K016136062
 

En vedette

Examen del primer trimestre. hector armas
Examen del primer trimestre. hector armasExamen del primer trimestre. hector armas
Examen del primer trimestre. hector armasarmas97
 
Modelos De Maridos
Modelos De MaridosModelos De Maridos
Modelos De Maridosluisa matos
 
Oak cosmetics apresentacao_negocio_2012
Oak cosmetics apresentacao_negocio_2012Oak cosmetics apresentacao_negocio_2012
Oak cosmetics apresentacao_negocio_2012Mayort MMN
 
Palestra Adriana Torres
Palestra Adriana TorresPalestra Adriana Torres
Palestra Adriana Torresquintadigital
 
2012 uesjls-1 a-lalangui peña julen german
2012 uesjls-1 a-lalangui peña julen german2012 uesjls-1 a-lalangui peña julen german
2012 uesjls-1 a-lalangui peña julen germanJulen Lalangui
 
Natal na eslováquia
Natal na eslováquiaNatal na eslováquia
Natal na eslováquiaNatercia
 
eTwinning - 2014
 eTwinning - 2014 eTwinning - 2014
eTwinning - 2014Natercia
 
Material de apoio trabalho de sala literatura
Material de apoio trabalho de sala literaturaMaterial de apoio trabalho de sala literatura
Material de apoio trabalho de sala literaturaKarla Mascarenhas
 
Artigo.jell
Artigo.jellArtigo.jell
Artigo.jellSilmatuk
 
5 reasons to employ css in your design
5 reasons to employ css in your design5 reasons to employ css in your design
5 reasons to employ css in your designGaurav Jain
 
Aprendizagem Novos Paradigmas
Aprendizagem Novos ParadigmasAprendizagem Novos Paradigmas
Aprendizagem Novos ParadigmasGuta de Franco
 

En vedette (20)

Gp3412021206
Gp3412021206Gp3412021206
Gp3412021206
 
Ge3411331139
Ge3411331139Ge3411331139
Ge3411331139
 
Gl3411791186
Gl3411791186Gl3411791186
Gl3411791186
 
Bx35430434
Bx35430434Bx35430434
Bx35430434
 
Examen del primer trimestre. hector armas
Examen del primer trimestre. hector armasExamen del primer trimestre. hector armas
Examen del primer trimestre. hector armas
 
Modelos De Maridos
Modelos De MaridosModelos De Maridos
Modelos De Maridos
 
Géneros
GénerosGéneros
Géneros
 
Oak cosmetics apresentacao_negocio_2012
Oak cosmetics apresentacao_negocio_2012Oak cosmetics apresentacao_negocio_2012
Oak cosmetics apresentacao_negocio_2012
 
Palestra Adriana Torres
Palestra Adriana TorresPalestra Adriana Torres
Palestra Adriana Torres
 
2012 uesjls-1 a-lalangui peña julen german
2012 uesjls-1 a-lalangui peña julen german2012 uesjls-1 a-lalangui peña julen german
2012 uesjls-1 a-lalangui peña julen german
 
Natal na eslováquia
Natal na eslováquiaNatal na eslováquia
Natal na eslováquia
 
Ech modulo6
Ech modulo6Ech modulo6
Ech modulo6
 
eTwinning - 2014
 eTwinning - 2014 eTwinning - 2014
eTwinning - 2014
 
Domótica
DomóticaDomótica
Domótica
 
Material de apoio trabalho de sala literatura
Material de apoio trabalho de sala literaturaMaterial de apoio trabalho de sala literatura
Material de apoio trabalho de sala literatura
 
Artigo.jell
Artigo.jellArtigo.jell
Artigo.jell
 
5 reasons to employ css in your design
5 reasons to employ css in your design5 reasons to employ css in your design
5 reasons to employ css in your design
 
Aboladaamizade
AboladaamizadeAboladaamizade
Aboladaamizade
 
Aprendizagem Novos Paradigmas
Aprendizagem Novos ParadigmasAprendizagem Novos Paradigmas
Aprendizagem Novos Paradigmas
 
49 387-1-pb
49 387-1-pb49 387-1-pb
49 387-1-pb
 

Similaire à Gm3411871190

De3211001104
De3211001104De3211001104
De3211001104IJMER
 
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksSpread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksIDES Editor
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
A Review Paper on Energy Capable Routing in Wireless Sensor Network
A Review Paper on Energy Capable Routing in Wireless Sensor NetworkA Review Paper on Energy Capable Routing in Wireless Sensor Network
A Review Paper on Energy Capable Routing in Wireless Sensor Networkijtsrd
 
Challenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksChallenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksAuwal Amshi
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...IJTET Journal
 
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSijassn
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networkspijans
 
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...IJNSA Journal
 
A RELATIVE STUDY ON CELLULAR, WSN AND MANETS
A RELATIVE STUDY ON CELLULAR, WSN AND MANETSA RELATIVE STUDY ON CELLULAR, WSN AND MANETS
A RELATIVE STUDY ON CELLULAR, WSN AND MANETSIAEME Publication
 
207088 633815660985047486
207088 633815660985047486207088 633815660985047486
207088 633815660985047486Sathish Pilla
 
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...IJEEE
 

Similaire à Gm3411871190 (20)

De3211001104
De3211001104De3211001104
De3211001104
 
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksSpread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
 
Ijetr021229
Ijetr021229Ijetr021229
Ijetr021229
 
Ijetr021229
Ijetr021229Ijetr021229
Ijetr021229
 
Chapter
ChapterChapter
Chapter
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
A Review Paper on Energy Capable Routing in Wireless Sensor Network
A Review Paper on Energy Capable Routing in Wireless Sensor NetworkA Review Paper on Energy Capable Routing in Wireless Sensor Network
A Review Paper on Energy Capable Routing in Wireless Sensor Network
 
Challenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksChallenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networks
 
G017344246
G017344246G017344246
G017344246
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
 
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
 
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
EFFECT OF HASH FUNCTION ON PERFORMANCE OF LOW POWER WAKE UP RECEIVER FOR WIRE...
 
Oj3425062509
Oj3425062509Oj3425062509
Oj3425062509
 
A RELATIVE STUDY ON CELLULAR, WSN AND MANETS
A RELATIVE STUDY ON CELLULAR, WSN AND MANETSA RELATIVE STUDY ON CELLULAR, WSN AND MANETS
A RELATIVE STUDY ON CELLULAR, WSN AND MANETS
 
207088 633815660985047486
207088 633815660985047486207088 633815660985047486
207088 633815660985047486
 
Kb3418101813
Kb3418101813Kb3418101813
Kb3418101813
 
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
 
FINAL
FINALFINAL
FINAL
 

Dernier

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 

Dernier (20)

Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 

Gm3411871190

  • 1. Hemantkumar Damor, Jitendra S. Dhobi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1187-1190 1187 | P a g e A Review on Energy Optimization in Wireless Sensor Networks Hemantkumar Damor1 , Jitendra S. Dhobi2 1, 2 Computer Engineering Department Govt. Engineering College, Modasa Abstract IEEE 802.11 standard defines the principles of Wireless LAN (Local Area Network). It mainly categorized into 2 different topologies: Infrastructure Network and Ad-hoc network. Ad- hoc networks can uses only created networks for “this purpose only” goal. On other way, Infrastructure network uses fixed “permanent” infrastructure. The main objective behind this both type of topology is to save energy in Wireless Sensor Nodes (WSNs). Connection of different WSNs are called as Wireless Sensor Networks. In this paper, we will review some of the techniques for energy optimization in Wireless Sensor Networks. Keywords— Energy Optimization, Wireless Sensor Network, Review, Power saving, MAC protocols, Routing protocol, survey I. INTRODUCTION Sensor Network (WSN) is a typical sensor network made up of a huge number of less power, less cost distributed devices. These devices are called as nodes. They are deployed in the environment that is being sensed and controlled [1].This network is composed of a large number of small nodes which able to pass messages with each other and it can be used to monitor inaccessible areas. Due to this reason, each node has memory, processor, battery and wireless antenna. Nodes can not only sense scalars like acoustic, light and temperature from the environment but may also process and transmit them by radio. It uses free band 2.4 GHz to transmit the data. Some special nodes must be present with special configuration and special hardware to process, collect and store data from the WSN’s nodes. The special node is known as Base Station (BS). Now a day, the WSNs are mostly based on low cost processors and low energy consumers and small memory. The WSNs must have long life because in many applications, the networks are used for remote areas where recharging and/or replacement of power supply is very difficult or prohibitive due to some restriction or safety issues. But the availability of cheap hardware for the radio communication frequency, there can be a lot numerous topologies for WSNs [2][3][4].So, in such type of areas, we need to use protocols that can self organize and optimize energy consumption[2]. WSNs must have following characteristics [3] 1. It must be self-organizing 2. It must use small range wireless communication and multi-hop routing protocols 3. Very huge number of nodes and cooperation between nodes. 4. Different WSN topologies. 5. Resources like battery, memory must be limited. The challenges in deployment of WSNs are as follows [1-3][5][6]: 1. The WSNs are used for not only collecting environmental information but it also used for changing the environment information. 2. The resources are limited and memory is less. It should manage all the complex functionality using different topologies. 3. There are many uncertainties in WSNs. They can affect the functionality of WSN. 4. One of the big challenges of WSN is to make the node as self-organizing and self-optimizing. 5. There can be a large number of WSN nodes but network must have limited number of nodes that guarantee the desired WSN service. 6. WSN operates in the real world. So, it must have real-time features as per need. 7. WSNs are not safe because it uses free band. So, there must be some security for managing original data. WSNs are made up of integrate general-purpose computing with heterogeneous sensing nodes and wireless communication and low power sensor. The power unit is one of the most important components of a sensor node [8].A WSN can limit the radio frequency channel, due to, that is to say, unstable links, limit of physical protection of each sensor node, actual of each nodes connection, variation topology in addition dangerousness about routing security is high by activity spite nodes. The restrictions in the hardware of the sensor nodes, makes it difficult to guarantee the maintenance of security because of its vulnerability.[9][10].A WSN is consists of spatially distributed autonomous sensors together monitor physical or environmental conditions. A sensor network normally makes a wireless ad-hoc network, that is, each sensor is deployed with a multi-hop routing algorithm. The network does not have any already existing infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks. In place of this, each node participates in routing by just forwarding the data for other nodes, and so the determination of which nodes forward data is made based upon the network connectivity and many other parameters. Base Stations act as a gateway between the sensor nodes and the end user. Figure 1 shows the basic components of a sensor node [11].
  • 2. Hemantkumar Damor, Jitendra S. Dhobi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1187-1190 1188 | P a g e Figure 1 Components of Sensor node [11] II. MOTIVATING EXAMPLE The RFId (Radio Frequency Identifier) is also one type of identifier in small wireless networks. It can be used in many applications. In a library, each and every book can identify by its ID called RFId. In a case where anyone want to take a book out of library without knowing to the administrative staff, the sensor of RFId near to the exit of the library can catch such persons. So, these RFId is just playing role of transmitter and receiver. In another example, forest fire monitoring system, the RFId's are used for monitoring the fire in the forest where human can not be available all the time. All RFIds are placed in the areas where we want to know about fire. The RFIds are very cheap in cost, so there can be many RFIds in such places. So, whenever the rapid change in temperature is found, the RFIds can pass the message to other nearer nodes and make a chain to pass the message to observer. Here, RFIds are not having capability of processing the inputs. So, the concept of Wireless Sensor Node was introduced. WSNs can provide same functionality as provided by RFId. Both uses Radio Frequency free band (i.e 2.4 GHz). We can have some processing capability in WSNs. There are same resource constraints (battery life, memory) in both. WSNs are used in such type of applications. Another important application of WSNs is to monitor the inside sea movements. Sensors can be thrown freely (sensors are very cheap) in the ocean and they are monitored by the base station. The Base Station can make decision in problematic situations. WSNs are always having a Base Station (BS) to receive the signal from the sensors. Due to energy constraints, sensors can not pass the message directly to the BS but it send to neighbour node and then similar way the message can reach to BS. The main constraint is energy as WSNs are operated with small battery life. So, to improve the battery life of WSNs we need to go for energy optimization techniques for WSNs. It is discussed in the subsequent sections. III. VARIOUS WSN PROTOCOLS AND TECHNIQUES A. MAC layer techniques The main portion of the node's energy is spent on radio transmission and on listening the medium for message [7]. For sending and receiving the data, node requires more energy compared to processing data. The performance depends upon how fairly and efficiently the node shares the medium because they have a single medium for communication shared by nodes. MAC protocols manage communication and regulate the shared medium such that performance is improved. i) ZigBee technology The main aim of ZigBee technology is to have WSNs, made up of large nodes, work with less energy consumption. It is based on Open System Interconnection (OSI). ZigBee works with IEEE 802.15.4 standard. It defines the lower physical and MAC layer. Its physical layer operates in 2 frequencies 868/915 MHz or 2.4GHz. It can have maximum 255Kbps of maximum transfer rate. It is mainly based upon Carrier Sense Multiple Access - Collision Avoidance (CSMA-CA). IEEE 802.15.4 can operation in one of the 2 modes namely Beaconless Mode (without beacon packet) and Beacon Mode (beacons are periodically sent to co-ordinate nodes). ii) Other techniques Other techniques used as MAC layer techniques are Time Division Multiple Access (TDMA) and Duty Cycles (DC). In TDMA, the time spent by devices on the channel is divided into time periods called as time slots.Each time slot is used by one device exclusively. The TDMA MAC protocol is based upon cross layer optimization based upon Physical layers and MAC[12].Its main goal is to reduce the energy consumption. FlexiTP and PEDAMACS are TDMA MAC protocol examples. The Duty Cycles (DC) techniques divides the operating time of devices into 2 periods namely Active and Inactive(sleeping). Shorter the Active time, lesser the energy consumption and higher energy saving. Longer the active time, more energy is utilized. B. Network layer (Routing) approaches The main objective of WSNs application is to gather the data from nodes and transfer the data to sink in energy efficient way using proper routing protocol. A clustering protocol REACA's functions are divided into 2 cycles: in first cycle, network configuration is done, while in second cycle, message transmission is considered. In this protocol, cluster head is choosen based upon battery energy level[13]. EARQ is another routing protocol based upon energy
  • 3. Hemantkumar Damor, Jitendra S. Dhobi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1187-1190 1189 | P a g e level. Its main objective is to use greatest energy level path inside WSN. It can be implemetable in industry applications. MMSPEED is another routing protocol approach which is able to guarantee probabilistic QoS (Quality of Service) in WSNs. It considers different options of speed delivery in time domain[14]. The q-switch routing algorithm is a routing technique for the support of non uniform node distribution strategy. In this approach, authors also suggested that in this protocol, the unbalanced energy consumption is unavoidable[15]. Energy Efficient Broadcast Problem (EEBP) in ad hoc wireless networks is : find a broadcast tree such that the energy cost of the broadcast tree is minimized. Green Wave Sleep Scheduling(GWSS) was inspired by synchronized traffic lights. The main objective is to support Duty Cycling in WSN's routing. Moving sequence of consecutive green light (active states) is called as Green Wave. In this approach, the sleeping nodes are considered as red light and the data is not passed from such nodes [16]. C. Transmission control approaches There are many Transmission Power Control (TPC) approaches available. Its main goal is to reduce the energy consumption and improve the channel capacity. TPC solutions work with single transmission power for whole network. Some of the TCP studies focus on the improvement of the channel capacity.Some of experimental studies shows that energy consumption is reduced in low-power WSNs.One of the algorithm is Power Control Algorithm with Backlisting (PCBL), in this algorithm, each node transmit the packet with different transmission power levels to find optimal trasmission power based on Packet Reception Ratio (PRR) [17]. To get the optimal transmission power for a particular link, Adaptive Transmission Power Control (ATPC) algorithm is used. To empoy a feedback based ATPC algorithm and to estimate optimal transmission power level, the Received Signal Strength(RSS) and the Link Quality Indicator (LQI) parameters are being used. IEEE 802.11 WLANs and IEEE 802.15.1 Bluetooth wireless networks operates on 2.4 GHz ISM band. So, there is a chance that these devices interefere the normal working of WSN devices because transmission power of WSN devices is less compared to bluetooth and WLAN devices[18]. Practically, TPC algorithm is considered as Interference aware Transmission Power Control (I- TPC) [18]. In this algorithm, each node adjust the RSS target to provide acceptable SINR (Signal- to - Interference - plus - Noise - Ratio) when interference are detected. Local algorithms individually adjust the node's transmission power [19]. These type of approaches do not require any MAC protocol or dedicated route protocols.They implements Local Mean Algorithm (LMA). In it, each node periodically sends a life message and each receiving nodes respond with life acknowledge messages. Everytime before sending any information, each node counts the number of received acknowledge messages and compare it with the threshold value. LMA approach allow each node to have count of each neighbors. Some of the global approaches like Equal Transmission Power (ETP) are comparable with local algorithms. When going for network's confidence level, scalability and implimatability, local algorithms are better compared to global. D. Autonomic Approaches Autonomic computing was introduced by IBM in 2001 to describe the systems that are self- manageable [20].The main properties with are [21]: Self- configuration: It concern with system's ability to configure by itself for achieving high level goals. Self-optimization: It concern with the change in system pro-actively to optimize the performance or quality of service. Self-healing: It deals with the identification and solving the problem in the system. Self-protection: It concern with system security against malicious attacks or unauthorized changes. Generic Machine Learning Algorithm (GMLA) was developed to make use of trade-off between different metrices. When network topology is unknown to base station, GMLA's main goal is to improve the communication efficiency[22]. Another algorithm called Variable Offset Algorithm (VOA) was proposed to reduce the communication efficiency in dense WSN with star topology [22]. IV. Conclusions Wireless Sensor Network is the best solution to access the data from inaccessible areas. The devices used for this analysis is having restriction of limited battery life. In this paper, we have discussed different possible areas where we can reduce the energy consumption caused by the node and result into saving the battery life. Moreover, we can say that the main reason behind energy consumption is the data processing process and data transmission process. We can look for the algorithms which can reduce this both criteria. From above discussion, we can conclude that MAC protocols can manage energy consumption during WSN communication. It is the most energy consuming process in WSNs. On other hand, transmission power consumption is also a major problem in WSNs. Transmission control protocols can be used to lower the transmission power overhead. But if the transmission power becomes still lower then it can increase the vulnerability to fluctuations generated by SINR. Based upon the route selected, the energy consumed by the node can be increase or decrease. So, in order to reduce the energy consumption, routing protocols
  • 4. Hemantkumar Damor, Jitendra S. Dhobi / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 4, Jul-Aug 2013, pp.1187-1190 1190 | P a g e are used. Some of the protocols obey the property of “self”. These protocols can handle, manage and decide based upon the different situation and take their decision. V. Acknowledgment Authors would like to thank the Computer department of Government Engineering College, Modasa for providing the resources to carry out this work. Author would also like to thank Gujarat Technological University to motivate us to work. REFERENCES [1] Stankovic, J.A.; Abdelzaher, T.F.; Lu, C.; Sha, L. & Hou, J. C. (2003). “Real-Time Communication and Coordination in Embedded Sensor Networks”. Proceedings of the IEEE, Vol. 91, No. 7, pp. 1002-1022, 2003 [2] Akyildiz, I. F.; Su W.; Sankarasubramaniam Y. & Cayirci E. (2002). “A Survey on Sensor Networks”. IEEE Communications Magazine, pp. 102-114. [3] Ilyas, M. & Mahgoub, I. (2005). “Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems,” CRC Press Inc., Boca Raton, USA. [4] Oliver, R. S. & Fohler, G. (2010). “Timeliness in Wireless Sensor Networks: Common Misconceptions”. Proceedings of the 9th International Workshop on Real]Time Networks, Brussels, Belgium, July 2010. [5] Molla, M. & Ahamed, S. I., “A Survey for Sensor Network and Challenges”. (2006). Proceedings of the 2006 International Conference on Parallel Processing Workshops, 2006. [6] Yick, J.; Mukherjee, B. & Ghosal, D. (2008). “Wireless sensor network survey”. Computer Networks, no. 52, pp. 2292–2330. [7] Gholamzadeh, B. & Nabovati, H. (2008). “Concepts for Designing Low Power Wireless Sensor Networks”, World Academy of Science, Engineering and Technology. [8] M.Ismail, M.Y.Sanavullah, “Security Topology in Wireless Sensor Networks With Routing Optimisation”IEEE 2008. [9] G.M. Ben Ezovski, S.E. Watkins, "The Electronic Sensor Node and the Future of Government-Issued RFID-Based Identification", RFID 2007.IEEE International Conference, pp 15-22, 2007. [10] I.F. Akyiliz, W. Su, Y.Sankarasubramaniam and E. Cayirci, "A Survey on Sensor Network", IEEE Communication Magazine, pp 102-114, 2002. [11] Debmalya, Bhattacharya and R.Krishnamoorthy, “Power Optimization in Wireless Sensor Networks”, IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 5, No 2, September 2011, pp. 415-419. [12] Shi, L. & Fapojuwo, A. O. (2010). “TDMA Scheduling with Optimized Energy Efficiency and Minimum Delay in Clustered Wireless Sensor Networks”. IEEE Transactions on Mobile Computing, Vol. 9, No. 7, July 2010. [13] Quan, Z.; Subramanian, A. & Sayed, A. H. (2007). “REACA: An Efficient Protocol Architecture for Large Scale Sensor Networks. IEEE Transactions on Wireless Communications”, Vol. 6, No. 10, pp. 3846- 3855, 2007. [14] Felemban, E.; Lee, C. & Ekicin, E. (2006). “MMSPEED: Multipath Multi]SPEED Protocol for QoS Guarantee of Reliability and Timeliness in Wireless Sensor Networks”. IEEE Transactions on Mobile Computing, Vol.5, No. 6, pp. 738-754. [15] Wu, X.; Chen, G. & Das, S. K. (2008). “Avoiding Energy Holes in Wireless Sensor Networks with Nonuniform Node Distribution”. IEEE Transactions on Parallel and Distributed Systems, Vol. 19, No. 5. [16] Guha, S.; Basu, P.; Chau, C. & Gibbens, R. (2011). “Green Wave Sleep Scheduling: Optimizing Latency and Throughput in Duty Cycling Wireless Networks”. IEEE Journal on Selected Areas in Communications, Vol. 29, No. 8. [17] Lin, S.; Zhang, J.; Zhou, G.; Gu, L.; He, T. & Stankovic, J. A. (2006). “ATPC: Adaptive Transmission Power Control for Wireless Sensor Networks”. Proceedings of SenSys’06, November 2006. [18] Kim, J. & Know, Y. (2008). “Interference- Aware Transmission Power Control for Wireless Sensor Networks”. IEICE Trans. Commun., Vol. E91-B, No. 11, November 2008. [19] Kubisch, M.; Karl, H.; Wolisz, A.; Zhong, L. C. & Rabaey, J. (2003). “Distributed Algorithms for Transmission Power Control in Wireless Sensor Networks”, Proceedings of WCNS03, IEEE Wireless Communications and Networking Conference, March 2003. [20] Kephart, J.O. , Chess, D.M., “The Vision of Autonomic Computing”, IEEE Computer, 2003. [21] Huebscher, M. C. & McCann, J. A. (2008). “A survey of autonomic computing degrees, models, and applications”. ACM Comput Surveys. [22] Pinto, A.R., Montez, C. “Autonomic Approaches for Enhancing Communication QoS in Dense Wireless Sensor Networks with Real Time Requirements”, 2010 IEEE Int. Test Conference, 2010. 1-10.