SlideShare une entreprise Scribd logo
1  sur  7
Energy-Efficient Cluster-Based Service Discovery in

                   Wireless Sensor Networks



Scope:

      To minimizing the communication costs during discovery of services

and maintenance of a functional distributed service registry




Abstract

Wireless Sensor Networks (WSNs) is an emerging technology that opens a

wide perspective for future applications in ubiquitous computing and

ambient intelligence. A typical application of a WSN consists of gathering

data from large areas and processing it at a central location. Designing a

service discovery protocol for WSN environments implies a number of

challenges. Since sensor nodes are likely to be battery powered, the first

objective is to minimize the energy consumption. As the energy is spent



                     Ambit lick Solutions
         Mail Id : Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
mostly during communication, minimizing the energy consumption

translates into minimizing the communication cost.




Problem Definition:



       The problem is challenging especially in large scale, dense networks,

where significant traffic is generated due to the intrinsic broadcast nature of

the wireless communication. A second challenge is to react rapidly to the

network topology changes, which directly affect the consistency of the

distributed directory.




Proposed System:

   •   Energy-efficient service discovery protocol

   •   A lightweight clustering algorithm that builds a distributed directory

       of service registrations.


                         Ambit lick Solutions
          Mail Id : Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
•    An energy-efficient service discovery protocol that exploits the

        clustering structure.

   •    DMAC Clustering Algorithm




Modules:

       Discovery of services

       Maintenance of the distributed directory

       Clustering algorithm

       Construction of clusters




Discovery of services:

        Our service discovery protocol uses an underlying clustering

structure, where the cluster heads (or root nodes) form a distributed directory

of service descriptions. During the discovery process, messages are


                       Ambit lick Solutions
           Mail Id : Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
exchanged among the cluster head nodes. Therefore, the design issue for

minimizing the discovery cost is that the root nodes have to be sparsely

distributed on the deployment area. The clustering algorithm should

construct an independent set of cluster heads, i.e. two root nodes are not

allowed to be neighbors.




      Each node keeps a registry of service descriptions of the nodes placed

below in hierarchy. The root node knows all the service descriptions offered

by the nodes in its cluster. Since the registration process requires unicast

messages to be transmitted from children to parents, it can be easily

integrated with the transfer of knowledge on adjacent clusters. Thus, the

message Update Info is used for both service registrations and transferring

the knowledge on adjacent clusters. Integrated version of the Update Info

message, where a node updates the information on both the adjacent clusters

and the known services


                     Ambit lick Solutions
         Mail Id : Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
Maintenance of the distributed directory:

      Make decisions based on 1-hop neighborhood information. Clustering

algorithms that require each node to have complete topology knowledge

over a number of hops are expensive with regard to the maintenance cost.

We aim to build a lightweight clustering structure that requires only the 1-

hop neighborhood topology information.



      Avoid chain reactions. Several clustering algorithms suffer from the

chain reaction problem, where a single topology change in the network may

trigger significant changes in clustering structure. For a distributed directory

composed of cluster head nodes, a chain reaction leads to high overhead for

maintaining consistent service registries. Therefore, an energy-efficient

solution should avoid chain reactions, such that local topology changes

determine only local modifications of the directory structure.




                     Ambit lick Solutions
          Mail Id : Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
Distribute the knowledge on adjacent clusters among cluster

members. The knowledge on adjacent clusters should be distributed among

the ordinary nodes. Only the root needs to know all the nearby clusters.




Clustering algorithm:



Our clustering structure is a forest composed of a set of disjoint trees or

clusters. The height of the cluster is the longest path from the root node to a

leaf. We say that two trees are adjacent if there are two nodes, one from each

tree, that are connected through a link.

   •   The capability grades are unique, as the node hardware identifier may

       be used to break ties.

   •   The lower layers (such as MAC) filter out asymmetrical links, so that

       we can rely on bidirectional communication.

   •   A node is aware of its neighbors and their capability grades.

   •   The lower layers (such as transport) provide a reliable, best-effort

       message delivery service.


                      Ambit lick Solutions
          Mail Id : Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
Construction of clusters

   • Nodes that have the highest capability grades among their neighbors

      declare the cluster heads and broadcast a Set Root message

      announcing their roles.

   • The remaining nodes choose as parent the neighbor with the highest

      capability grade.

   • When a node receives a Set Root message from its parent, it learns the

      cluster membership and rebroadcasts the Set Root message.




                    Ambit lick Solutions
         Mail Id : Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com

Contenu connexe

Tendances

Cluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor NetworksCluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor Networkseditor1knowledgecuddle
 
The comparison between routing protocols based on lifetime of wireless sensor...
The comparison between routing protocols based on lifetime of wireless sensor...The comparison between routing protocols based on lifetime of wireless sensor...
The comparison between routing protocols based on lifetime of wireless sensor...inventionjournals
 
Enhancing Survivability, Lifetime, and Energy Efficiency of Wireless Networks
Enhancing Survivability, Lifetime, and Energy Efficiency of Wireless NetworksEnhancing Survivability, Lifetime, and Energy Efficiency of Wireless Networks
Enhancing Survivability, Lifetime, and Energy Efficiency of Wireless NetworksIJRES Journal
 
Cross layer design for power control and link
Cross layer design for power control and linkCross layer design for power control and link
Cross layer design for power control and linkIJCNCJournal
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocolijceronline
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Surveyijsrd.com
 
ETDCC: Energy-Efficient Transmission Scheme for Dynamic Climatic Conditions i...
ETDCC: Energy-Efficient Transmission Scheme for Dynamic Climatic Conditions i...ETDCC: Energy-Efficient Transmission Scheme for Dynamic Climatic Conditions i...
ETDCC: Energy-Efficient Transmission Scheme for Dynamic Climatic Conditions i...TELKOMNIKA JOURNAL
 
Computer Network - Introduction to Networks
Computer Network - Introduction to NetworksComputer Network - Introduction to Networks
Computer Network - Introduction to NetworksSwapnil Agrawal
 
Improving the network lifetime of mane ts through cooperative mac protocol de...
Improving the network lifetime of mane ts through cooperative mac protocol de...Improving the network lifetime of mane ts through cooperative mac protocol de...
Improving the network lifetime of mane ts through cooperative mac protocol de...Pvrtechnologies Nellore
 
Energy efficient cluster-based service discovery in wireless sensor networks
Energy efficient cluster-based service discovery in wireless sensor networksEnergy efficient cluster-based service discovery in wireless sensor networks
Energy efficient cluster-based service discovery in wireless sensor networksambitlick
 
Efficient multicast delivery for data redundancy minimization
Efficient multicast delivery for data redundancy minimizationEfficient multicast delivery for data redundancy minimization
Efficient multicast delivery for data redundancy minimizationJayakrishnan U
 
K-means clustering-based WSN protocol for energy efficiency improvement
K-means clustering-based WSN protocol for energy efficiency improvement K-means clustering-based WSN protocol for energy efficiency improvement
K-means clustering-based WSN protocol for energy efficiency improvement IJECEIAES
 
Iaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd Iaetsd
 

Tendances (20)

Cluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor NetworksCluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor Networks
 
The comparison between routing protocols based on lifetime of wireless sensor...
The comparison between routing protocols based on lifetime of wireless sensor...The comparison between routing protocols based on lifetime of wireless sensor...
The comparison between routing protocols based on lifetime of wireless sensor...
 
F0963440
F0963440F0963440
F0963440
 
Enhancing Survivability, Lifetime, and Energy Efficiency of Wireless Networks
Enhancing Survivability, Lifetime, and Energy Efficiency of Wireless NetworksEnhancing Survivability, Lifetime, and Energy Efficiency of Wireless Networks
Enhancing Survivability, Lifetime, and Energy Efficiency of Wireless Networks
 
Cross layer design for power control and link
Cross layer design for power control and linkCross layer design for power control and link
Cross layer design for power control and link
 
2. 8482 1-pb
2. 8482 1-pb2. 8482 1-pb
2. 8482 1-pb
 
06425531
0642553106425531
06425531
 
Ijetr021235
Ijetr021235Ijetr021235
Ijetr021235
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocol
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
 
ETDCC: Energy-Efficient Transmission Scheme for Dynamic Climatic Conditions i...
ETDCC: Energy-Efficient Transmission Scheme for Dynamic Climatic Conditions i...ETDCC: Energy-Efficient Transmission Scheme for Dynamic Climatic Conditions i...
ETDCC: Energy-Efficient Transmission Scheme for Dynamic Climatic Conditions i...
 
Computer Network - Introduction to Networks
Computer Network - Introduction to NetworksComputer Network - Introduction to Networks
Computer Network - Introduction to Networks
 
Networking dcoer
Networking dcoerNetworking dcoer
Networking dcoer
 
Improving the network lifetime of mane ts through cooperative mac protocol de...
Improving the network lifetime of mane ts through cooperative mac protocol de...Improving the network lifetime of mane ts through cooperative mac protocol de...
Improving the network lifetime of mane ts through cooperative mac protocol de...
 
Ci24561565
Ci24561565Ci24561565
Ci24561565
 
Energy efficient cluster-based service discovery in wireless sensor networks
Energy efficient cluster-based service discovery in wireless sensor networksEnergy efficient cluster-based service discovery in wireless sensor networks
Energy efficient cluster-based service discovery in wireless sensor networks
 
Mobile ad hoc networks and its clustering scheme
Mobile ad hoc networks and its clustering schemeMobile ad hoc networks and its clustering scheme
Mobile ad hoc networks and its clustering scheme
 
Efficient multicast delivery for data redundancy minimization
Efficient multicast delivery for data redundancy minimizationEfficient multicast delivery for data redundancy minimization
Efficient multicast delivery for data redundancy minimization
 
K-means clustering-based WSN protocol for energy efficiency improvement
K-means clustering-based WSN protocol for energy efficiency improvement K-means clustering-based WSN protocol for energy efficiency improvement
K-means clustering-based WSN protocol for energy efficiency improvement
 
Iaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by using
 

En vedette

Hoe rijk is eurocommissaris Marianne Thyssen?
Hoe rijk is eurocommissaris Marianne Thyssen?Hoe rijk is eurocommissaris Marianne Thyssen?
Hoe rijk is eurocommissaris Marianne Thyssen?Thierry Debels
 
A novel pause count backoff algorithm for channel access
A novel pause count backoff algorithm for channel accessA novel pause count backoff algorithm for channel access
A novel pause count backoff algorithm for channel accessambitlick
 
Architecture for reliable service discovery
Architecture for reliable service discoveryArchitecture for reliable service discovery
Architecture for reliable service discoveryambitlick
 
TCP Fairness for Uplink and Downlink Flows in WLANs
TCP Fairness for Uplink and Downlink Flows in WLANsTCP Fairness for Uplink and Downlink Flows in WLANs
TCP Fairness for Uplink and Downlink Flows in WLANsambitlick
 
Vorstelijk Vermogen - interview Thierry Debels - P-Magazine
Vorstelijk Vermogen - interview Thierry Debels - P-MagazineVorstelijk Vermogen - interview Thierry Debels - P-Magazine
Vorstelijk Vermogen - interview Thierry Debels - P-MagazineThierry Debels
 
IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2  IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2 ambitlick
 
On Multihop Distances in Wireless Sensor Networks with Random Node Locations
On Multihop Distances in Wireless Sensor Networks with Random Node LocationsOn Multihop Distances in Wireless Sensor Networks with Random Node Locations
On Multihop Distances in Wireless Sensor Networks with Random Node Locationsambitlick
 
Mahindra Renault Sandero
Mahindra Renault SanderoMahindra Renault Sandero
Mahindra Renault SanderoAhmad Sy
 
De snoepreisjes van de Europese Unie
De snoepreisjes van de Europese UnieDe snoepreisjes van de Europese Unie
De snoepreisjes van de Europese UnieThierry Debels
 
An efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharingAn efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharingambitlick
 
Admission control and routing in multi hop wireless networks
Admission control and routing in multi hop wireless networksAdmission control and routing in multi hop wireless networks
Admission control and routing in multi hop wireless networksambitlick
 
Dynamic aodv
Dynamic aodvDynamic aodv
Dynamic aodvambitlick
 
Stichting van Jacques van Ypersele kreeg geld van rijke Amerikanen
Stichting van Jacques van Ypersele kreeg geld van rijke AmerikanenStichting van Jacques van Ypersele kreeg geld van rijke Amerikanen
Stichting van Jacques van Ypersele kreeg geld van rijke AmerikanenThierry Debels
 
A collaborative wireless sensor network routing
A collaborative wireless sensor network routingA collaborative wireless sensor network routing
A collaborative wireless sensor network routingambitlick
 
Waarom proces van Delphine wellicht met sisser afloopt
Waarom proces van Delphine wellicht met sisser aflooptWaarom proces van Delphine wellicht met sisser afloopt
Waarom proces van Delphine wellicht met sisser aflooptThierry Debels
 
Jean-Jacques De Gucht richt bedrijf op
Jean-Jacques De Gucht richt bedrijf opJean-Jacques De Gucht richt bedrijf op
Jean-Jacques De Gucht richt bedrijf opThierry Debels
 

En vedette (16)

Hoe rijk is eurocommissaris Marianne Thyssen?
Hoe rijk is eurocommissaris Marianne Thyssen?Hoe rijk is eurocommissaris Marianne Thyssen?
Hoe rijk is eurocommissaris Marianne Thyssen?
 
A novel pause count backoff algorithm for channel access
A novel pause count backoff algorithm for channel accessA novel pause count backoff algorithm for channel access
A novel pause count backoff algorithm for channel access
 
Architecture for reliable service discovery
Architecture for reliable service discoveryArchitecture for reliable service discovery
Architecture for reliable service discovery
 
TCP Fairness for Uplink and Downlink Flows in WLANs
TCP Fairness for Uplink and Downlink Flows in WLANsTCP Fairness for Uplink and Downlink Flows in WLANs
TCP Fairness for Uplink and Downlink Flows in WLANs
 
Vorstelijk Vermogen - interview Thierry Debels - P-Magazine
Vorstelijk Vermogen - interview Thierry Debels - P-MagazineVorstelijk Vermogen - interview Thierry Debels - P-Magazine
Vorstelijk Vermogen - interview Thierry Debels - P-Magazine
 
IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2  IEEE -2012-13 Projects IN NS2
IEEE -2012-13 Projects IN NS2
 
On Multihop Distances in Wireless Sensor Networks with Random Node Locations
On Multihop Distances in Wireless Sensor Networks with Random Node LocationsOn Multihop Distances in Wireless Sensor Networks with Random Node Locations
On Multihop Distances in Wireless Sensor Networks with Random Node Locations
 
Mahindra Renault Sandero
Mahindra Renault SanderoMahindra Renault Sandero
Mahindra Renault Sandero
 
De snoepreisjes van de Europese Unie
De snoepreisjes van de Europese UnieDe snoepreisjes van de Europese Unie
De snoepreisjes van de Europese Unie
 
An efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharingAn efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharing
 
Admission control and routing in multi hop wireless networks
Admission control and routing in multi hop wireless networksAdmission control and routing in multi hop wireless networks
Admission control and routing in multi hop wireless networks
 
Dynamic aodv
Dynamic aodvDynamic aodv
Dynamic aodv
 
Stichting van Jacques van Ypersele kreeg geld van rijke Amerikanen
Stichting van Jacques van Ypersele kreeg geld van rijke AmerikanenStichting van Jacques van Ypersele kreeg geld van rijke Amerikanen
Stichting van Jacques van Ypersele kreeg geld van rijke Amerikanen
 
A collaborative wireless sensor network routing
A collaborative wireless sensor network routingA collaborative wireless sensor network routing
A collaborative wireless sensor network routing
 
Waarom proces van Delphine wellicht met sisser afloopt
Waarom proces van Delphine wellicht met sisser aflooptWaarom proces van Delphine wellicht met sisser afloopt
Waarom proces van Delphine wellicht met sisser afloopt
 
Jean-Jacques De Gucht richt bedrijf op
Jean-Jacques De Gucht richt bedrijf opJean-Jacques De Gucht richt bedrijf op
Jean-Jacques De Gucht richt bedrijf op
 

Similaire à Energy cluster

Unit 1
Unit 1Unit 1
Unit 1sasi
 
Lan switching & wirless lecture # 1
Lan switching & wirless lecture # 1Lan switching & wirless lecture # 1
Lan switching & wirless lecture # 1SaifullahSiddiqui7
 
Networking for MBA
Networking for MBANetworking for MBA
Networking for MBAKK Bajpai
 
Terabit Network- Tbps Network
Terabit Network- Tbps NetworkTerabit Network- Tbps Network
Terabit Network- Tbps Networkvishal gupta
 
monotoring Basics2
monotoring Basics2monotoring Basics2
monotoring Basics2Programmer
 
SDC: A Distributed Clustering Protocol
SDC: A Distributed Clustering ProtocolSDC: A Distributed Clustering Protocol
SDC: A Distributed Clustering ProtocolCSCJournals
 
A Survey On Secure Cooperative Bait Detection Approach For...
A Survey On Secure Cooperative Bait Detection Approach For...A Survey On Secure Cooperative Bait Detection Approach For...
A Survey On Secure Cooperative Bait Detection Approach For...Jennifer Perry
 
Unit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptxUnit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptxABYTHOMAS46
 
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...IJERD Editor
 
Logical design of io t
Logical design of io tLogical design of io t
Logical design of io tKunal Bangar
 
Lab Seminar 2009 12 01 Message Drop Reduction And Movement
Lab Seminar 2009 12 01  Message Drop Reduction And MovementLab Seminar 2009 12 01  Message Drop Reduction And Movement
Lab Seminar 2009 12 01 Message Drop Reduction And Movementtharindanv
 
Cross layer design and optimization
Cross layer design and optimizationCross layer design and optimization
Cross layer design and optimizationDANISHAMIN950
 
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...Narendra Singh Yadav
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx183JAIDEEP
 

Similaire à Energy cluster (20)

Unit 1
Unit 1Unit 1
Unit 1
 
MPLS ppt
MPLS pptMPLS ppt
MPLS ppt
 
Lan switching & wirless lecture # 1
Lan switching & wirless lecture # 1Lan switching & wirless lecture # 1
Lan switching & wirless lecture # 1
 
Networking for MBA
Networking for MBANetworking for MBA
Networking for MBA
 
Terabit Network- Tbps Network
Terabit Network- Tbps NetworkTerabit Network- Tbps Network
Terabit Network- Tbps Network
 
monotoring Basics2
monotoring Basics2monotoring Basics2
monotoring Basics2
 
Link_NwkingforDevOps
Link_NwkingforDevOpsLink_NwkingforDevOps
Link_NwkingforDevOps
 
SDC: A Distributed Clustering Protocol
SDC: A Distributed Clustering ProtocolSDC: A Distributed Clustering Protocol
SDC: A Distributed Clustering Protocol
 
A Survey On Secure Cooperative Bait Detection Approach For...
A Survey On Secure Cooperative Bait Detection Approach For...A Survey On Secure Cooperative Bait Detection Approach For...
A Survey On Secure Cooperative Bait Detection Approach For...
 
Unit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptxUnit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptx
 
Camp finall
Camp finallCamp finall
Camp finall
 
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
 
3
33
3
 
Logical design of io t
Logical design of io tLogical design of io t
Logical design of io t
 
Lab Seminar 2009 12 01 Message Drop Reduction And Movement
Lab Seminar 2009 12 01  Message Drop Reduction And MovementLab Seminar 2009 12 01  Message Drop Reduction And Movement
Lab Seminar 2009 12 01 Message Drop Reduction And Movement
 
Cross layer design and optimization
Cross layer design and optimizationCross layer design and optimization
Cross layer design and optimization
 
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...
A Low Control Overhead Cluster Maintenance Scheme for Mobile Ad hoc NETworks ...
 
Chapter3
Chapter3Chapter3
Chapter3
 
unit1 network model osi and tcpip.pptx
unit1  network model osi and tcpip.pptxunit1  network model osi and tcpip.pptx
unit1 network model osi and tcpip.pptx
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 

Plus de ambitlick

DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...ambitlick
 
Low cost Java 2013 IEEE projects
Low cost Java 2013 IEEE projectsLow cost Java 2013 IEEE projects
Low cost Java 2013 IEEE projectsambitlick
 
Ambitlick ns2 2013
Ambitlick ns2 2013Ambitlick ns2 2013
Ambitlick ns2 2013ambitlick
 
Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013ambitlick
 
Handling selfishness in replica allocation
Handling selfishness in replica allocationHandling selfishness in replica allocation
Handling selfishness in replica allocationambitlick
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocolsambitlick
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsambitlick
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsambitlick
 
Adaptive weight factor estimation from user review 1
Adaptive weight factor estimation from user   review 1Adaptive weight factor estimation from user   review 1
Adaptive weight factor estimation from user review 1ambitlick
 
Integrated institutional portal
Integrated institutional portalIntegrated institutional portal
Integrated institutional portalambitlick
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocolsambitlick
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsambitlick
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsambitlick
 
Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”ambitlick
 
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...ambitlick
 
Energy efficient protocol for deterministic
Energy efficient protocol for deterministicEnergy efficient protocol for deterministic
Energy efficient protocol for deterministicambitlick
 
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...ambitlick
 
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
A Privacy-Preserving Location Monitoring System for Wireless Sensor NetworksA Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networksambitlick
 

Plus de ambitlick (20)

DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
 
Low cost Java 2013 IEEE projects
Low cost Java 2013 IEEE projectsLow cost Java 2013 IEEE projects
Low cost Java 2013 IEEE projects
 
Ambitlick ns2 2013
Ambitlick ns2 2013Ambitlick ns2 2013
Ambitlick ns2 2013
 
Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013
 
Handling selfishness in replica allocation
Handling selfishness in replica allocationHandling selfishness in replica allocation
Handling selfishness in replica allocation
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocols
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroups
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secrets
 
Adaptive weight factor estimation from user review 1
Adaptive weight factor estimation from user   review 1Adaptive weight factor estimation from user   review 1
Adaptive weight factor estimation from user review 1
 
Integrated institutional portal
Integrated institutional portalIntegrated institutional portal
Integrated institutional portal
 
Embassy
EmbassyEmbassy
Embassy
 
Crm
Crm Crm
Crm
 
Mutual distance bounding protocols
Mutual distance bounding protocolsMutual distance bounding protocols
Mutual distance bounding protocols
 
Moderated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroupsModerated group authoring system for campus wide workgroups
Moderated group authoring system for campus wide workgroups
 
Efficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secretsEfficient spread spectrum communication without pre shared secrets
Efficient spread spectrum communication without pre shared secrets
 
Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”Comments on “mabs multicast authentication based on batch signature”
Comments on “mabs multicast authentication based on batch signature”
 
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
Energy-Efficient Protocol for Deterministic and Probabilistic Coverage In Sen...
 
Energy efficient protocol for deterministic
Energy efficient protocol for deterministicEnergy efficient protocol for deterministic
Energy efficient protocol for deterministic
 
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
Estimating Parameters of Multiple Heterogeneous Target Objects Using Composit...
 
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
A Privacy-Preserving Location Monitoring System for Wireless Sensor NetworksA Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
 

Dernier

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 

Dernier (20)

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 

Energy cluster

  • 1. Energy-Efficient Cluster-Based Service Discovery in Wireless Sensor Networks Scope: To minimizing the communication costs during discovery of services and maintenance of a functional distributed service registry Abstract Wireless Sensor Networks (WSNs) is an emerging technology that opens a wide perspective for future applications in ubiquitous computing and ambient intelligence. A typical application of a WSN consists of gathering data from large areas and processing it at a central location. Designing a service discovery protocol for WSN environments implies a number of challenges. Since sensor nodes are likely to be battery powered, the first objective is to minimize the energy consumption. As the energy is spent Ambit lick Solutions Mail Id : Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 2. mostly during communication, minimizing the energy consumption translates into minimizing the communication cost. Problem Definition: The problem is challenging especially in large scale, dense networks, where significant traffic is generated due to the intrinsic broadcast nature of the wireless communication. A second challenge is to react rapidly to the network topology changes, which directly affect the consistency of the distributed directory. Proposed System: • Energy-efficient service discovery protocol • A lightweight clustering algorithm that builds a distributed directory of service registrations. Ambit lick Solutions Mail Id : Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 3. An energy-efficient service discovery protocol that exploits the clustering structure. • DMAC Clustering Algorithm Modules: Discovery of services Maintenance of the distributed directory Clustering algorithm Construction of clusters Discovery of services: Our service discovery protocol uses an underlying clustering structure, where the cluster heads (or root nodes) form a distributed directory of service descriptions. During the discovery process, messages are Ambit lick Solutions Mail Id : Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 4. exchanged among the cluster head nodes. Therefore, the design issue for minimizing the discovery cost is that the root nodes have to be sparsely distributed on the deployment area. The clustering algorithm should construct an independent set of cluster heads, i.e. two root nodes are not allowed to be neighbors. Each node keeps a registry of service descriptions of the nodes placed below in hierarchy. The root node knows all the service descriptions offered by the nodes in its cluster. Since the registration process requires unicast messages to be transmitted from children to parents, it can be easily integrated with the transfer of knowledge on adjacent clusters. Thus, the message Update Info is used for both service registrations and transferring the knowledge on adjacent clusters. Integrated version of the Update Info message, where a node updates the information on both the adjacent clusters and the known services Ambit lick Solutions Mail Id : Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 5. Maintenance of the distributed directory: Make decisions based on 1-hop neighborhood information. Clustering algorithms that require each node to have complete topology knowledge over a number of hops are expensive with regard to the maintenance cost. We aim to build a lightweight clustering structure that requires only the 1- hop neighborhood topology information. Avoid chain reactions. Several clustering algorithms suffer from the chain reaction problem, where a single topology change in the network may trigger significant changes in clustering structure. For a distributed directory composed of cluster head nodes, a chain reaction leads to high overhead for maintaining consistent service registries. Therefore, an energy-efficient solution should avoid chain reactions, such that local topology changes determine only local modifications of the directory structure. Ambit lick Solutions Mail Id : Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 6. Distribute the knowledge on adjacent clusters among cluster members. The knowledge on adjacent clusters should be distributed among the ordinary nodes. Only the root needs to know all the nearby clusters. Clustering algorithm: Our clustering structure is a forest composed of a set of disjoint trees or clusters. The height of the cluster is the longest path from the root node to a leaf. We say that two trees are adjacent if there are two nodes, one from each tree, that are connected through a link. • The capability grades are unique, as the node hardware identifier may be used to break ties. • The lower layers (such as MAC) filter out asymmetrical links, so that we can rely on bidirectional communication. • A node is aware of its neighbors and their capability grades. • The lower layers (such as transport) provide a reliable, best-effort message delivery service. Ambit lick Solutions Mail Id : Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com
  • 7. Construction of clusters • Nodes that have the highest capability grades among their neighbors declare the cluster heads and broadcast a Set Root message announcing their roles. • The remaining nodes choose as parent the neighbor with the highest capability grade. • When a node receives a Set Root message from its parent, it learns the cluster membership and rebroadcasts the Set Root message. Ambit lick Solutions Mail Id : Ambitlick@gmail.com , Ambitlicksolutions@gmail.Com