SlideShare a Scribd company logo
1 of 4
Download to read offline
IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 2, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 353
Enchancing the Data Collection in Tree based Wireless Sensor Networks
R.Yazhini1
K.Jayarajan2
1
PG-Scholar 2
Associate Professor
1, 2
Computer Engineering Department
1,2
Selvam College of Technology, Namakkal, India
Abstract— Number of techniques used in Wireless Sensor
Network to improve data collection from sensor nodes. It
achieve by minimize the schedule length and dynamic
channel assignment. Schedule length minimized by BFS
algorithm without interfering links. Interfering links can be
eliminated by transmission power control and multi
frequency. The power can be save by using beacon signal.
Collection of data can also be limited by topology of
network. So the nodes are arranged in form. The capacitated
minimal spanning trees and degree- constrained spanning
trees give significant improvement in scheduling. Finally the
data collection is enhancing in terms of security by using T-
Hash Chain algorithm.
Key terms: Convergecast, beacon signal, Scheduling,
aggregation, Multi channels, routing trees.
I. INTRODUCTION
The sensor nodes sense the outside environment
and transfer the sensed data to controller through number of
sensor nodes. This is a basic operation in wireless sensor
networks (WSN) [1]. We use the wireless sensor network
from home application to industry applications. Because it
plays a very important role in our life. For example in home
application we use sensor in air cooler remote to sense room
temperature. In industry application for example in oil
industry the sensor nodes detect oil or gas leakage. Here we
study two types of data collection. (i) Raw data
convergecast (ii) aggregated convergecast. Many-to-one is
known as convergecast.
The data packets are individually relayed to the
sink through a network in raw data convergecast. It is for
one-shot data collection. In aggregated convergecast the
summarized data is collected. For example in outside
temperature calculation the sensor node aggregate different
temperature by using average or maximum or minimum
value. Data compression is occurred in aggregated
convergecast not in raw data convergecast. TDMA (Time
Division Multiple Access) are better choice to enhance data
collection because it eliminates interference and
retransmission. TDMA also helps to minimize schedule
length.
Quick access of data is limited by (i) interference in
wireless network (ii) half duplex (iii) topology of network
(iv) security. We implement number techniques and
algorithms that provide success improvements. For
enhancement we join transmission power control with
scheduling, multiple frequency allow concurrent
transmission of data. Topology of network form in tree
based. It helps us for further enhancement.
InterferenceA.
Interference is a one of the factor of limiting the
data collection fast. So it can be eliminated by transmission
control and multi frequency. Once we eliminate the
interference and we can achieve lower bound scheduling.
Lower achieve by BFS-Timeslot algorithm without any
interference.
TopologyB.
The sensor nodes must be placed within range with
each other. That is sensor nodes coverage area must be
interlink. Aggregation performance 10 times improved by
using degree- constrained spanning trees. For raw data
combination of multi-channel scheduling and capacitated
minimal spanning trees minimizes the schedule length by
50%.
In Fig 1 the sensor nodes placed in tree topology
based. Black color node is a sink. Other nodes are child
nodes of sink. The child nodes send the data to parent node
and it send to sink. Parent node aggregate data which is
collected from its children node. Parent node does not send
data to sink before it collects data from its entire children
node. This problem is found by Chen et al. [8].
Fig 1. Topology of sensor network.
Channel AssignmentC.
We evaluate three channel assignment performance
(i) Joint Frequency and Time Slot Scheduling (JFTSS), (ii)
Receiver-Based Assignment(RBCA) [4] and (iii) Tree-
Based Channel Assignment (TMCP) [5].This method
concentrate channel assignment problem at different
methods link level, node level or cluster level. We analysis
that TMCP perform better in aggregated convergecast
compared to JFTSS and RBCA on minimum-hop routing
trees. But TMCP performs worse on degree constrained
trees. RBCA and JFTSS perform better than TMCP for raw-
data convergecast.
Enhancing the Data Collection in Tree Based Wireless Sensor Networks
(IJSRD/Vol. 1/Issue 2/2013/0073)
All rights reserved by www.ijsrd.com
354
II. RELATED WORKS
The goal of enhance data collection is minimize the
schedule length for aggregated has been studied by us in [4]
[6] [3] [7] [8].Raw data also studied in [2] [9]-
[11].Evolution of different channel assignments methods
and tree topology has been studied in [1].To enhance data
collection we use above mentioned channel techniques and
algorithms.
In previous work we studied data collection is
limited by interference, topology, schedule length. We did
not consider and study out security [1]. What is the usage of
enhancement with attackers? Attacker may change our data
or they deviate data from correct path. So security also very
important factor to enhance the data collection. In our work
we provide security by using T-Hash chain algorithm.
III. TDMA SCHEDULING
First we focus on periodic aggregation convergecast. It is to
calculate the minimum achievable schedule length using an
interference aware TDMA protocol.
Periodic AggregationA.
Data aggregation is a common technique in wireless sensor
network it removes redundancy and reduces the
transmission power control. This aggregation leads to
reduce power consumption for data transmission and
improve the life of sensor node. Aggregation performed in
many ways
1) Data compression
2) Data correlation.
By using encryption and decryption concept the sensed data
can be aggregated. Data correlation is performed by
readings.
For example in continuous monitoring application
all the nodes have capability to aggregate the data which is
received from its children node and finally itself it generate
single packet before send to other node.
In temperature aggregation process the node collect all
values from its children node and finally it take AVG or
MIN or MAX value of temperature is send to other nodes.
BFS-Timeslot Assignment Algorithm1)
Lower bound is achieved by using BFS algorithm without
interfering link. Present timeslot is combine with BFS
algorithm is called BFS-Timeslot Assignment [1].
BFS algorithm search from root node to child
node. This also used for connectivity maintenance. In edge
each of graphs the minimum different timeslot is assigned.
BFS-Time Slot Assignment Algorithm
1. Input T = (V,ET)
2. while ET≠ ø do
3. e← next edge from ET in BFS order
4. Assign minimum time slot t to edge e respecting
adjacency and Interfering constraints
5. ET ← ET {e}
6. end while
Local-Timeslot Assignment2)
We combine the timeslot with local algorithm is called
Local-Timeslot Assignment; it runs locally by each every
node at every time slot. Sensed data is transfer sink from top
sub-tree.
Sink cannot receive all data from more nodes at a
time. So sink collect data from top sub-tree which one has
large number packets. Sink buffer must be kept busy when
sink receives data.
If top sub tree buffer is empty then sink collect data
from child of top sub tree likewise sink receive data from
top to bottom.
Local-Time Slot Assignment Algorithm
1. Node. Buffer = full
2. if{node is sink} then
3. Among the eligible top-subtree, choose the one
with the largest number of total(remaining)
packets, say top-subtree i
4. Schedule int(root(i),s)respecting interfering
constraint
5. Else
6. If{node.buffer==empty} then
7. Choose a random child c of ode whose buffer is
full
8. Schedule link(c,node) respecting interfering
constraint
9. C.buffer = empty
10. Node.buffer = full
11. end if
12. end if
IV. MULTICHANNEL SCHEDULING
Multi-channel is a method to eliminate interference by
enabling concurrent transmission over different frequency.
We explain three channel assignment methods and it
consider the channel assignment problem at different level:
link level (JFTSS) node l level (RBCA), or cluster level
(TMCP).
Joint Frequency Time Slot Scheduling (JFTSS)A.
JFTSS provide greedy joint solution for constructing
maximum schedule. A schedule is said to be maximal if it
meets adjacency and interfering constraints. JFTSS for
single-channel systems and multi – channel systems are
discussed in [12] and [13] respectively.
JFTSS schedules a network. The schedule is
starting from the link which has the highest number of
packets to be transmitted. Suppose if the link loads are equal
such as in aggregation, the most constrained link is to be
schedule first. JFTSS first it sort the link according to the
loads and constraints. If the time slot is filled by loads then
the next time slot is assign for arriving loads. Likewise
JFTSS schedule network.
Advantage of JFTSS is easy to incorporate the physical
interference model, but it is hard to have a distributed
solution.
Tree-Based Multi-Channel Protocol (TMCP)B.
TMCP is a greedy, tree –based, multi-channel protocol for
data collection application [5]. TMCP partition the network
into subtree then it minimize the intratree interference by
assigning different channels to nodes that residing on
different branches starting from top to bottom. The time
slots are assigned to nodes by using BFS Time Slot
Assignment algorithm [1].
Enhancing the Data Collection in Tree Based Wireless Sensor Networks
(IJSRD/Vol. 1/Issue 2/2013/0073)
All rights reserved by www.ijsrd.com
355
Advantage of TMCP is it is designed to support
convergecast traffic and does not require channel switching.
Contention inside the branch not resolved since all nodes on
same branch communicate on the same channel.
Receiver-Based Channel Assignment (RBCA)C.
In RBCA we statically assigned the channels to the receivers
to remove many possible interfering links. The children of a
common parent transmit on the same channel. The algorithm
assigns the same channel to the entire receiver. After that it
create set of interfering parents based on SINR threshold [1]
and iteratively assigns the next available channel starting
from most interfered parent.
To avoid overlaps over adjacent channel SINR
value at receiver may not always high.
Since all interfering parents are assigned different
frequencies sink can receive on static frequency.
Routing TreesD.
The network topology and degree of connectivity also affect
the scheduling performance. In this section we describe
algorithm to construct topologies with specific properties to
minimize schedule length.
Aggregated Data CollectionE.
Aggregation means the sink node collect information from
their children node and finally the collected data are
compressed as a single packet and it sends to nearby nodes.
First we construct trees then we compare their performance
with unbalanced trees. In both case bottleneck problems
occurred often.
To overcome this we use heuristic it is described in
Degree-Constrained Trees [1]. The algorithm starts with the
sink node, and adds a node at every iteration to the tree.
When it reaches maximum degree it stops to add nodes with
in tree. If we limit the number of children per node and by
enough frequencies then we will reduce schedule length.
The Degree –Constrained Tree algorithm had detailed and
each steps gives brief explanation.
Degree-Constrained Trees Algorithm
1. Input: G(V,E),s,max_degree
2. T {s}
3. For all i є V do
4. C(i) 0; HC(i) ∞
5. end for
6. HC(s) 0
7. While |T| ≠ |V| do
8. Choose i` € T such that:
a. (i,i`)є E, for some i є T with C(i) <
max_degree-1
b. HC(i`) is minimized
T T U {i`}
9. HC(i`) = HC(i)+1
10. C(i)← C(i)+1
11. If iє V, C(i)=max_degree then
12. Break
13. end if
14. end while
T-Hash Chain AlgorithmF.
The sensor nodes are arranged in tree based by
using above algorithms. The sink nodes are placed between
the nodes. Some of the nodes only sense data and
remaining nodes transfer the gathered information.
Sensor nodes
Sink nodes
, Are different two data types
Fig. 2. Aggregation Process
In fig 2 the sensor nodes sense the information and
it forward to the nearby sink nodes. The sink node had
collected the data from many sensor nodes and finally sink
aggregate the data and forward that aggregated or
compressed packet to the its nearby children nodes.
Likewise up to controller this process will be continued. If
any sensor had lost or didn’t receive the data packet, that
sensor can collect the packet from the neighbour sink node.
Aggregation process avoids
(i) Duplication copy of data,
(ii) Reduce schedule length
(iii) Reduce the loss of data.
(iv) Reduce congestion
B
A Hacker
C
Sensor node
Sink
Hacker
Fig 3. Data sent Using T-Hash chain
Enhancing the Data Collection in Tree Based Wireless Sensor Networks
(IJSRD/Vol. 1/Issue 2/2013/0073)
All rights reserved by www.ijsrd.com
356
In Fig 3 node A send security question to the
nearby children nodes. If node the nodes send the correct
answer then node A sends the sensed data to that near nodes.
Else it will not send the data to the node which one sent the
wrong answer. Each and every time the security questions
changed.
In here red color node is a hacker node. So node A
did not send a packet to hacker node. Likewise each and
every data transaction the security questions throw between
nodes and sink. By this algorithm we can enhance the data
collection from tree based wireless sensor networks.
Efficient Usage of PowerG.
The node will go to ideal mode when it does not send the
packets. If the near node wants to send the packet to ideal
node means the near node send beacon signal to that ideal
node. After that the ideal node comes and it gets ready to
receive the data. In that time the node act as a busy node,
when it is transmitting. After the transaction completion the
again goes to ideal mode. By this way we can consume the
power.
V. CONCLUSION
In this paper we studied enhanced convergecast in WSN.
The sensor nodes are arranged in tree topology by using
three algorithms. In here node communicate using TDMA
to reduce the schedule length. A power is saved by sending
bacon signal. We observed that RBCA and JFTSS channel
assignment schemes are more efficient method compared to
TMCP to eliminate interference. By using T-Hash chain the
hackers identified and will not send the data to that node.
REFERENCES
[1] Ozlem Durmaz incel, Amitabha Ghosh, Bhaskar
Krishnamachari, and Krishnakant Chintalapudi” Fast
Data Collection in Tree-Based Wireless Sensor
Networks” mobile computing,vol. 11, issue : 1,pp.86-
99.
[2] S. Gandham, Y. Zhang, and Q. Huang, “Distributed
time-optimal scheduling for convergecast in
wireless sensor networks,” Computer Networks, vol.
52, no. 3, pp. 610–629, 2008.
[3] T. Moscibroda, “The worst-case capacity of wireless
sensor networks,”in IPSN ’07, Cambridge, MA, USA,
pp. 1–10.
[4] O.D.Incel and B.Krishnamachari, “Enhancing the data
collection rate of tree-based aggregation in wireless
sensor networks,” in SECON ’08, San Francisco, CA,
USA, pp. 569–577.
[5] Y. Wu, J. Stankovic, T. He, and S. Lin, “Realistic and
efficient multi-channel communications in wireless
sensor networks,” in INFOCOM ’08, pp. 1193–1201.
[6] A. Ghosh, O. D. Incel, V. A. Kumar, and B.
Krishnamachari, “Multi-channel scheduling algorithms
for fast aggregated convergecast in sensor networks,” in
MASS ’09, Macau, China.
[7] V. Annamalai, S. Gupta, and L. Schwiebert,“Ontree-
based convergecasting in wireless networks,” in WCNC
’03, vol. 3, pp. 1942–1947.
[8] X. Chen, X. Hu, and J. Zhu, “Minimum data
aggregation time problem in wireless sensor networks,”
in MSN ’05, pp. 133–142.
[9] W. Song, F. Yuan, and R. LaHusen, “Time-optimum
packet scheduling for many-to-one routing in wireless
sensor networks,” in MASS ’06, pp. 81–90.
[10]H. Choi, J. Wang, and E. Hughes, “Scheduling for
information gathering on sensor network,” Wireless
Networks (Online), 2007.
[11] N. Lai, C.King, and C. Lin, “On maximizing the
throughput of convergecast in wireless sensor
networks,” in GPC ’08, pp. 396– 408.
[12] G. Sharma, R. Mazumdar, and N. Shroff, “On the
complexity of scheduling in wireless networks,” in
MobiCom ’06, Los Angeles, CA, USA, pp. 227–238.
[13] X. Lin and S. Rasool, “A distributed joint channel-
assignment, scheduling and routing algorithm for multi-
channel ad-hoc wireless networks,” in INFOCOM ’07,
pp. 1118–1126

More Related Content

What's hot

Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSEfficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSijircee
 
Power saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling techniquePower saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling techniqueeSAT Publishing House
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
 
Energy efficient communication techniques for wireless micro sensor networks
Energy efficient communication techniques for wireless micro sensor networksEnergy efficient communication techniques for wireless micro sensor networks
Energy efficient communication techniques for wireless micro sensor networksPushpita Biswas
 
Maximizing Network Lifetime by Using Smart Cluster Head Selection
Maximizing Network Lifetime by Using Smart Cluster Head SelectionMaximizing Network Lifetime by Using Smart Cluster Head Selection
Maximizing Network Lifetime by Using Smart Cluster Head Selectioniosrjce
 
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc Networks
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc NetworksFuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc Networks
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc NetworksA. Sufian
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
Fast Data Collection with Interference and Life Time in Tree Based Wireless S...
Fast Data Collection with Interference and Life Time in Tree Based Wireless S...Fast Data Collection with Interference and Life Time in Tree Based Wireless S...
Fast Data Collection with Interference and Life Time in Tree Based Wireless S...IJMER
 
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...IJECEIAES
 
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...ijceronline
 
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...A. Sufian
 
Paper id 35201569
Paper id 35201569Paper id 35201569
Paper id 35201569IJRAT
 
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORK
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORKA PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORK
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORKIJCNCJournal
 
Multiple Downlink Fair Packet Scheduling Scheme in Wi-Max
Multiple Downlink Fair Packet Scheduling Scheme in Wi-MaxMultiple Downlink Fair Packet Scheduling Scheme in Wi-Max
Multiple Downlink Fair Packet Scheduling Scheme in Wi-MaxEditor IJCATR
 

What's hot (17)

Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETSEfficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
Efficient Of Multi-Hop Relay Algorithm for Efficient Broadcasting In MANETS
 
i2ct_submission_105
i2ct_submission_105i2ct_submission_105
i2ct_submission_105
 
Power saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling techniquePower saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling technique
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Destination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANETDestination Aware APU Strategy for Geographic Routing in MANET
Destination Aware APU Strategy for Geographic Routing in MANET
 
Energy efficient communication techniques for wireless micro sensor networks
Energy efficient communication techniques for wireless micro sensor networksEnergy efficient communication techniques for wireless micro sensor networks
Energy efficient communication techniques for wireless micro sensor networks
 
Maximizing Network Lifetime by Using Smart Cluster Head Selection
Maximizing Network Lifetime by Using Smart Cluster Head SelectionMaximizing Network Lifetime by Using Smart Cluster Head Selection
Maximizing Network Lifetime by Using Smart Cluster Head Selection
 
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc Networks
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc NetworksFuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc Networks
Fuzzy Route Switching for Energy Preservation(FEP) in Ad Hoc Networks
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
Fast Data Collection with Interference and Life Time in Tree Based Wireless S...
Fast Data Collection with Interference and Life Time in Tree Based Wireless S...Fast Data Collection with Interference and Life Time in Tree Based Wireless S...
Fast Data Collection with Interference and Life Time in Tree Based Wireless S...
 
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
 
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...
 
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
Fuzzy-controlled Scheduling of Real Time Data Packets (FSRP) in Mobile Ad Hoc...
 
Paper id 35201569
Paper id 35201569Paper id 35201569
Paper id 35201569
 
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORK
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORKA PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORK
A PROPOSAL FOR IMPROVE THE LIFETIME OF WIRELESS SENSOR NETWORK
 
Multiple Downlink Fair Packet Scheduling Scheme in Wi-Max
Multiple Downlink Fair Packet Scheduling Scheme in Wi-MaxMultiple Downlink Fair Packet Scheduling Scheme in Wi-Max
Multiple Downlink Fair Packet Scheduling Scheme in Wi-Max
 

Similar to Enchancing the Data Collection in Tree based Wireless Sensor Networks

Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...IJNSA Journal
 
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IJNSA Journal
 
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...ijasuc
 
Efficient Tree-based Aggregation and Processing Time for Wireless Sensor Netw...
Efficient Tree-based Aggregation and Processing Time for Wireless Sensor Netw...Efficient Tree-based Aggregation and Processing Time for Wireless Sensor Netw...
Efficient Tree-based Aggregation and Processing Time for Wireless Sensor Netw...CSCJournals
 
A New Energy-Efficient Routing Protocol for Wireless Body Area Sensor Networks
A New Energy-Efficient Routing Protocol for Wireless Body Area Sensor NetworksA New Energy-Efficient Routing Protocol for Wireless Body Area Sensor Networks
A New Energy-Efficient Routing Protocol for Wireless Body Area Sensor NetworksLeila_maleke
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop CommunicationIJCSIS Research Publications
 
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesAnalysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesIOSR Journals
 
Priority Based Multi Sen Car Technique in WSN
Priority Based Multi Sen Car Technique in WSNPriority Based Multi Sen Car Technique in WSN
Priority Based Multi Sen Car Technique in WSNijcnes
 
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR ...
CONSENSUS BASED DATA AGGREGATION FOR  ENERGY CONSERVATION IN WIRELESS SENSOR ...CONSENSUS BASED DATA AGGREGATION FOR  ENERGY CONSERVATION IN WIRELESS SENSOR ...
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR ...ijdpsjournal
 
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...ijdpsjournal
 
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...IJECEIAES
 
Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811praveen369
 
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETProviding A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETEditor IJCATR
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ijac journal
 

Similar to Enchancing the Data Collection in Tree based Wireless Sensor Networks (20)

Fa36942946
Fa36942946Fa36942946
Fa36942946
 
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
Implementing packet broadcasting algorithm of mimo based mobile ad hoc networ...
 
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
IMPLEMENTING PACKET BROADCASTING ALGORITHM OF MIMO BASED MOBILE AD-HOC NETWOR...
 
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
 
Efficient Tree-based Aggregation and Processing Time for Wireless Sensor Netw...
Efficient Tree-based Aggregation and Processing Time for Wireless Sensor Netw...Efficient Tree-based Aggregation and Processing Time for Wireless Sensor Netw...
Efficient Tree-based Aggregation and Processing Time for Wireless Sensor Netw...
 
Q04606103106
Q04606103106Q04606103106
Q04606103106
 
A New Energy-Efficient Routing Protocol for Wireless Body Area Sensor Networks
A New Energy-Efficient Routing Protocol for Wireless Body Area Sensor NetworksA New Energy-Efficient Routing Protocol for Wireless Body Area Sensor Networks
A New Energy-Efficient Routing Protocol for Wireless Body Area Sensor Networks
 
550 537-546
550 537-546550 537-546
550 537-546
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 
32 marycherian 336-349
32 marycherian 336-34932 marycherian 336-349
32 marycherian 336-349
 
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless TechnologiesAnalysis of Rate Based Congestion Control Algorithms in Wireless Technologies
Analysis of Rate Based Congestion Control Algorithms in Wireless Technologies
 
Ba25315321
Ba25315321Ba25315321
Ba25315321
 
Priority Based Multi Sen Car Technique in WSN
Priority Based Multi Sen Car Technique in WSNPriority Based Multi Sen Car Technique in WSN
Priority Based Multi Sen Car Technique in WSN
 
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR ...
CONSENSUS BASED DATA AGGREGATION FOR  ENERGY CONSERVATION IN WIRELESS SENSOR ...CONSENSUS BASED DATA AGGREGATION FOR  ENERGY CONSERVATION IN WIRELESS SENSOR ...
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR ...
 
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...
CONSENSUS BASED DATA AGGREGATION FOR ENERGY CONSERVATION IN WIRELESS SENSOR N...
 
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...
 
Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811
 
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
 
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANETProviding A Network Encryption Approach to reduce end-to-end Delay in MANET
Providing A Network Encryption Approach to reduce end-to-end Delay in MANET
 
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET ENERGY EFFICIENT MULTICAST ROUTING IN MANET
ENERGY EFFICIENT MULTICAST ROUTING IN MANET
 

More from ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Gridijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation Systemijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigeratorijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparatorsijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Recently uploaded

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 

Recently uploaded (20)

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 

Enchancing the Data Collection in Tree based Wireless Sensor Networks

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 2, 2013 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 353 Enchancing the Data Collection in Tree based Wireless Sensor Networks R.Yazhini1 K.Jayarajan2 1 PG-Scholar 2 Associate Professor 1, 2 Computer Engineering Department 1,2 Selvam College of Technology, Namakkal, India Abstract— Number of techniques used in Wireless Sensor Network to improve data collection from sensor nodes. It achieve by minimize the schedule length and dynamic channel assignment. Schedule length minimized by BFS algorithm without interfering links. Interfering links can be eliminated by transmission power control and multi frequency. The power can be save by using beacon signal. Collection of data can also be limited by topology of network. So the nodes are arranged in form. The capacitated minimal spanning trees and degree- constrained spanning trees give significant improvement in scheduling. Finally the data collection is enhancing in terms of security by using T- Hash Chain algorithm. Key terms: Convergecast, beacon signal, Scheduling, aggregation, Multi channels, routing trees. I. INTRODUCTION The sensor nodes sense the outside environment and transfer the sensed data to controller through number of sensor nodes. This is a basic operation in wireless sensor networks (WSN) [1]. We use the wireless sensor network from home application to industry applications. Because it plays a very important role in our life. For example in home application we use sensor in air cooler remote to sense room temperature. In industry application for example in oil industry the sensor nodes detect oil or gas leakage. Here we study two types of data collection. (i) Raw data convergecast (ii) aggregated convergecast. Many-to-one is known as convergecast. The data packets are individually relayed to the sink through a network in raw data convergecast. It is for one-shot data collection. In aggregated convergecast the summarized data is collected. For example in outside temperature calculation the sensor node aggregate different temperature by using average or maximum or minimum value. Data compression is occurred in aggregated convergecast not in raw data convergecast. TDMA (Time Division Multiple Access) are better choice to enhance data collection because it eliminates interference and retransmission. TDMA also helps to minimize schedule length. Quick access of data is limited by (i) interference in wireless network (ii) half duplex (iii) topology of network (iv) security. We implement number techniques and algorithms that provide success improvements. For enhancement we join transmission power control with scheduling, multiple frequency allow concurrent transmission of data. Topology of network form in tree based. It helps us for further enhancement. InterferenceA. Interference is a one of the factor of limiting the data collection fast. So it can be eliminated by transmission control and multi frequency. Once we eliminate the interference and we can achieve lower bound scheduling. Lower achieve by BFS-Timeslot algorithm without any interference. TopologyB. The sensor nodes must be placed within range with each other. That is sensor nodes coverage area must be interlink. Aggregation performance 10 times improved by using degree- constrained spanning trees. For raw data combination of multi-channel scheduling and capacitated minimal spanning trees minimizes the schedule length by 50%. In Fig 1 the sensor nodes placed in tree topology based. Black color node is a sink. Other nodes are child nodes of sink. The child nodes send the data to parent node and it send to sink. Parent node aggregate data which is collected from its children node. Parent node does not send data to sink before it collects data from its entire children node. This problem is found by Chen et al. [8]. Fig 1. Topology of sensor network. Channel AssignmentC. We evaluate three channel assignment performance (i) Joint Frequency and Time Slot Scheduling (JFTSS), (ii) Receiver-Based Assignment(RBCA) [4] and (iii) Tree- Based Channel Assignment (TMCP) [5].This method concentrate channel assignment problem at different methods link level, node level or cluster level. We analysis that TMCP perform better in aggregated convergecast compared to JFTSS and RBCA on minimum-hop routing trees. But TMCP performs worse on degree constrained trees. RBCA and JFTSS perform better than TMCP for raw- data convergecast.
  • 2. Enhancing the Data Collection in Tree Based Wireless Sensor Networks (IJSRD/Vol. 1/Issue 2/2013/0073) All rights reserved by www.ijsrd.com 354 II. RELATED WORKS The goal of enhance data collection is minimize the schedule length for aggregated has been studied by us in [4] [6] [3] [7] [8].Raw data also studied in [2] [9]- [11].Evolution of different channel assignments methods and tree topology has been studied in [1].To enhance data collection we use above mentioned channel techniques and algorithms. In previous work we studied data collection is limited by interference, topology, schedule length. We did not consider and study out security [1]. What is the usage of enhancement with attackers? Attacker may change our data or they deviate data from correct path. So security also very important factor to enhance the data collection. In our work we provide security by using T-Hash chain algorithm. III. TDMA SCHEDULING First we focus on periodic aggregation convergecast. It is to calculate the minimum achievable schedule length using an interference aware TDMA protocol. Periodic AggregationA. Data aggregation is a common technique in wireless sensor network it removes redundancy and reduces the transmission power control. This aggregation leads to reduce power consumption for data transmission and improve the life of sensor node. Aggregation performed in many ways 1) Data compression 2) Data correlation. By using encryption and decryption concept the sensed data can be aggregated. Data correlation is performed by readings. For example in continuous monitoring application all the nodes have capability to aggregate the data which is received from its children node and finally itself it generate single packet before send to other node. In temperature aggregation process the node collect all values from its children node and finally it take AVG or MIN or MAX value of temperature is send to other nodes. BFS-Timeslot Assignment Algorithm1) Lower bound is achieved by using BFS algorithm without interfering link. Present timeslot is combine with BFS algorithm is called BFS-Timeslot Assignment [1]. BFS algorithm search from root node to child node. This also used for connectivity maintenance. In edge each of graphs the minimum different timeslot is assigned. BFS-Time Slot Assignment Algorithm 1. Input T = (V,ET) 2. while ET≠ ø do 3. e← next edge from ET in BFS order 4. Assign minimum time slot t to edge e respecting adjacency and Interfering constraints 5. ET ← ET {e} 6. end while Local-Timeslot Assignment2) We combine the timeslot with local algorithm is called Local-Timeslot Assignment; it runs locally by each every node at every time slot. Sensed data is transfer sink from top sub-tree. Sink cannot receive all data from more nodes at a time. So sink collect data from top sub-tree which one has large number packets. Sink buffer must be kept busy when sink receives data. If top sub tree buffer is empty then sink collect data from child of top sub tree likewise sink receive data from top to bottom. Local-Time Slot Assignment Algorithm 1. Node. Buffer = full 2. if{node is sink} then 3. Among the eligible top-subtree, choose the one with the largest number of total(remaining) packets, say top-subtree i 4. Schedule int(root(i),s)respecting interfering constraint 5. Else 6. If{node.buffer==empty} then 7. Choose a random child c of ode whose buffer is full 8. Schedule link(c,node) respecting interfering constraint 9. C.buffer = empty 10. Node.buffer = full 11. end if 12. end if IV. MULTICHANNEL SCHEDULING Multi-channel is a method to eliminate interference by enabling concurrent transmission over different frequency. We explain three channel assignment methods and it consider the channel assignment problem at different level: link level (JFTSS) node l level (RBCA), or cluster level (TMCP). Joint Frequency Time Slot Scheduling (JFTSS)A. JFTSS provide greedy joint solution for constructing maximum schedule. A schedule is said to be maximal if it meets adjacency and interfering constraints. JFTSS for single-channel systems and multi – channel systems are discussed in [12] and [13] respectively. JFTSS schedules a network. The schedule is starting from the link which has the highest number of packets to be transmitted. Suppose if the link loads are equal such as in aggregation, the most constrained link is to be schedule first. JFTSS first it sort the link according to the loads and constraints. If the time slot is filled by loads then the next time slot is assign for arriving loads. Likewise JFTSS schedule network. Advantage of JFTSS is easy to incorporate the physical interference model, but it is hard to have a distributed solution. Tree-Based Multi-Channel Protocol (TMCP)B. TMCP is a greedy, tree –based, multi-channel protocol for data collection application [5]. TMCP partition the network into subtree then it minimize the intratree interference by assigning different channels to nodes that residing on different branches starting from top to bottom. The time slots are assigned to nodes by using BFS Time Slot Assignment algorithm [1].
  • 3. Enhancing the Data Collection in Tree Based Wireless Sensor Networks (IJSRD/Vol. 1/Issue 2/2013/0073) All rights reserved by www.ijsrd.com 355 Advantage of TMCP is it is designed to support convergecast traffic and does not require channel switching. Contention inside the branch not resolved since all nodes on same branch communicate on the same channel. Receiver-Based Channel Assignment (RBCA)C. In RBCA we statically assigned the channels to the receivers to remove many possible interfering links. The children of a common parent transmit on the same channel. The algorithm assigns the same channel to the entire receiver. After that it create set of interfering parents based on SINR threshold [1] and iteratively assigns the next available channel starting from most interfered parent. To avoid overlaps over adjacent channel SINR value at receiver may not always high. Since all interfering parents are assigned different frequencies sink can receive on static frequency. Routing TreesD. The network topology and degree of connectivity also affect the scheduling performance. In this section we describe algorithm to construct topologies with specific properties to minimize schedule length. Aggregated Data CollectionE. Aggregation means the sink node collect information from their children node and finally the collected data are compressed as a single packet and it sends to nearby nodes. First we construct trees then we compare their performance with unbalanced trees. In both case bottleneck problems occurred often. To overcome this we use heuristic it is described in Degree-Constrained Trees [1]. The algorithm starts with the sink node, and adds a node at every iteration to the tree. When it reaches maximum degree it stops to add nodes with in tree. If we limit the number of children per node and by enough frequencies then we will reduce schedule length. The Degree –Constrained Tree algorithm had detailed and each steps gives brief explanation. Degree-Constrained Trees Algorithm 1. Input: G(V,E),s,max_degree 2. T {s} 3. For all i є V do 4. C(i) 0; HC(i) ∞ 5. end for 6. HC(s) 0 7. While |T| ≠ |V| do 8. Choose i` € T such that: a. (i,i`)є E, for some i є T with C(i) < max_degree-1 b. HC(i`) is minimized T T U {i`} 9. HC(i`) = HC(i)+1 10. C(i)← C(i)+1 11. If iє V, C(i)=max_degree then 12. Break 13. end if 14. end while T-Hash Chain AlgorithmF. The sensor nodes are arranged in tree based by using above algorithms. The sink nodes are placed between the nodes. Some of the nodes only sense data and remaining nodes transfer the gathered information. Sensor nodes Sink nodes , Are different two data types Fig. 2. Aggregation Process In fig 2 the sensor nodes sense the information and it forward to the nearby sink nodes. The sink node had collected the data from many sensor nodes and finally sink aggregate the data and forward that aggregated or compressed packet to the its nearby children nodes. Likewise up to controller this process will be continued. If any sensor had lost or didn’t receive the data packet, that sensor can collect the packet from the neighbour sink node. Aggregation process avoids (i) Duplication copy of data, (ii) Reduce schedule length (iii) Reduce the loss of data. (iv) Reduce congestion B A Hacker C Sensor node Sink Hacker Fig 3. Data sent Using T-Hash chain
  • 4. Enhancing the Data Collection in Tree Based Wireless Sensor Networks (IJSRD/Vol. 1/Issue 2/2013/0073) All rights reserved by www.ijsrd.com 356 In Fig 3 node A send security question to the nearby children nodes. If node the nodes send the correct answer then node A sends the sensed data to that near nodes. Else it will not send the data to the node which one sent the wrong answer. Each and every time the security questions changed. In here red color node is a hacker node. So node A did not send a packet to hacker node. Likewise each and every data transaction the security questions throw between nodes and sink. By this algorithm we can enhance the data collection from tree based wireless sensor networks. Efficient Usage of PowerG. The node will go to ideal mode when it does not send the packets. If the near node wants to send the packet to ideal node means the near node send beacon signal to that ideal node. After that the ideal node comes and it gets ready to receive the data. In that time the node act as a busy node, when it is transmitting. After the transaction completion the again goes to ideal mode. By this way we can consume the power. V. CONCLUSION In this paper we studied enhanced convergecast in WSN. The sensor nodes are arranged in tree topology by using three algorithms. In here node communicate using TDMA to reduce the schedule length. A power is saved by sending bacon signal. We observed that RBCA and JFTSS channel assignment schemes are more efficient method compared to TMCP to eliminate interference. By using T-Hash chain the hackers identified and will not send the data to that node. REFERENCES [1] Ozlem Durmaz incel, Amitabha Ghosh, Bhaskar Krishnamachari, and Krishnakant Chintalapudi” Fast Data Collection in Tree-Based Wireless Sensor Networks” mobile computing,vol. 11, issue : 1,pp.86- 99. [2] S. Gandham, Y. Zhang, and Q. Huang, “Distributed time-optimal scheduling for convergecast in wireless sensor networks,” Computer Networks, vol. 52, no. 3, pp. 610–629, 2008. [3] T. Moscibroda, “The worst-case capacity of wireless sensor networks,”in IPSN ’07, Cambridge, MA, USA, pp. 1–10. [4] O.D.Incel and B.Krishnamachari, “Enhancing the data collection rate of tree-based aggregation in wireless sensor networks,” in SECON ’08, San Francisco, CA, USA, pp. 569–577. [5] Y. Wu, J. Stankovic, T. He, and S. Lin, “Realistic and efficient multi-channel communications in wireless sensor networks,” in INFOCOM ’08, pp. 1193–1201. [6] A. Ghosh, O. D. Incel, V. A. Kumar, and B. Krishnamachari, “Multi-channel scheduling algorithms for fast aggregated convergecast in sensor networks,” in MASS ’09, Macau, China. [7] V. Annamalai, S. Gupta, and L. Schwiebert,“Ontree- based convergecasting in wireless networks,” in WCNC ’03, vol. 3, pp. 1942–1947. [8] X. Chen, X. Hu, and J. Zhu, “Minimum data aggregation time problem in wireless sensor networks,” in MSN ’05, pp. 133–142. [9] W. Song, F. Yuan, and R. LaHusen, “Time-optimum packet scheduling for many-to-one routing in wireless sensor networks,” in MASS ’06, pp. 81–90. [10]H. Choi, J. Wang, and E. Hughes, “Scheduling for information gathering on sensor network,” Wireless Networks (Online), 2007. [11] N. Lai, C.King, and C. Lin, “On maximizing the throughput of convergecast in wireless sensor networks,” in GPC ’08, pp. 396– 408. [12] G. Sharma, R. Mazumdar, and N. Shroff, “On the complexity of scheduling in wireless networks,” in MobiCom ’06, Los Angeles, CA, USA, pp. 227–238. [13] X. Lin and S. Rasool, “A distributed joint channel- assignment, scheduling and routing algorithm for multi- channel ad-hoc wireless networks,” in INFOCOM ’07, pp. 1118–1126