java

Attribution Non-Commercial (BY-NC)

36 vues

java

Attribution Non-Commercial (BY-NC)

- DS
- Avl
- Foundations Of Computer Science - Index
- 2010
- MONTE-CARLO TREE SEARCH FOR THE “MR JACK” BOARD GAME
- Branch_and_Bound.doc
- Mobile Relay Configuration in Data Intensive Wireless Sensor Networfsadasdasks
- Interval Tree Clocks: A Logical Clock for Dynamic Systems
- Delay Efficient Data Aggregation Scheduling in Duty-cycled Wireless Sensor Networks
- Computer Notes - Data Structures - 26
- Sol 10
- Decision Trees in Python
- Binary Tree Print Sequence
- Stacks & Queses
- phani
- Art AlgoritmoRedEnergizada English
- ugc2102p3
- chapter8.pdf
- 40review(JTableJTree)
- lec16

Vous êtes sur la page 1sur 10

The project investigates the following fundamental question - how fast can information be collected from a wireless sensor network organized as tree? To address this, a number of different techniques using realistic simulation models under the manyto-one communication paradigm known as converge cast are evaluated. Time scheduling on a single frequency channel with the aim of minimizing the number of time slots required (schedule length) to complete a convergecast is considered. Next, scheduling with transmission power control is combined to mitigate the effects of interference, and show that while power control helps in reducing the schedule length under a single frequency, scheduling transmissions using multiple frequencies is more efcient. Lower bounds on the schedule length are given when interference is completely eliminated, and propose algorithms that achieve these bounds. Then, the data collection rate no longer remains limited by interference but by the topology of the routing tree. The two convergecast mechanism named Aggregate converge cast and One-Shot Raw-Data converge cast algorithms are implemented. The minimum slot length is calculated and shown the edges in the tree that are communicated in the respective time slots. The project is designed using Net Beans 6.8 IDE. The coding language used is Java 1.6. The back end used is MS SQL Server 2000.

HARDWARE SPECIFICATION

This section gives the details and specification of the hardware on which the system is expected to work. Processor Hard Disk Capacity RAM Monitor Keyboard Mouse : Pentium IV 1.7 GHz : 80 GB : 1 GB SD : 15inch Color : 102 keys : 3 buttons

SOFTWARE SPECIFICATION

This section gives the details of the software that are used for the development.

: Net Beans 6.8 IDE. : Java 1.6. : MS-SQL Server 2000. : Windows XP SP2

EXISTING SYSTEM The problem of minimizing the schedule length for raw-data convergecast on single channel is shown to be NP (Non-Deterministic Polynomial Time)-complete on general. Maximizing the throughput of convergecast by nding a shortest-length, conict-free schedule; in w Rich a greedy graph coloring strategy assigns time slots to the senders and prevent interference. The impact of routing trees on the schedule length are studied and proposed a routing scheme called disjoint strips to transmit data over different shortest paths. However, since the sink remains as the bottleneck, sending data over different paths does not reduce the schedule length. DRAWBACKS Since the sink remains as the bottleneck, sending data over different paths does not reduce the schedule length. Number of time slots required to collect data is more. Schedule length calculation when interference is completely eliminated is not calculated efficiently.

PROPOSED SYSTEM The proposed system introduces polynomial-time heuristics for TDMA scheduling for both types of data collection, i.e., Algorithms 1 (BFS-Time Slot Assignment) and 2 (LocalTime Slot Assignment), prove that they do achieve the lower bound of data collection time once interference is eliminated. Bounds on Convergecast Scheduling: The proposed system shows that if all interfering links are eliminated, the schedule length for aggregated convergecast is lower bounded by the maximum node degree in the routing tree, and for raw-data convergecast by max(2nk 1,N), where nk is the maximum number of nodes on any branch in the tree, and N is the number of source nodes. It then introduces optimal time slot assignment schemes under this scenario which achieve these lower bounds. The proposed system shows the improvement due to the routing structure comes from using capacitated minimal spanning trees for raw-data convergecast, where the number of nodes in a subtree is no more than half the total number of nodes in the remaining subtrees. ADVANTAGES The sink node i.e., the root node, collects data over different paths in reduced schedule length. Number of time slots required to collect data is less. Schedule length calculation when interference is completely eliminated is calculated efficiently. Half duplex transmission in taken into account during all data transmissions between any two nodes. Keep the sink node always busy and so data collection is fast enough.

MODULES DESCRIPTION The project contains the following modules 1. AGGREGATED CONVERGE CAST 2. ONE-SHOT RAW-DATA CONVERGECAST 3. VIEWS AND REPORTS 1. AGGREGATED CONVERGE CAST In this module, the scheduling problem is considered where packets are aggregated. Data aggregation is a commonly used technique in WSN that can eliminate redundancy and minimize the number of transmissions, thus saving energy and improving network lifetime. Aggregation can be performed in many ways, such as by suppressing duplicate messages; using data compression and packet merging techniques; or taking advantage of the correlation in the sensor readings. The continuous monitoring applications are considered where perfect aggregation is possible, i.e., each node is capable of aggregating all the packets received from its children as well as that generated by itself into a single packet before transmitting to its parent. The size of aggregated data transmitted by each node is constant and does not depend on the size of the raw sensor readings. Typical examples of such aggregation functions are MIN, MAX, MEDIAN, COUNT, AVERAGE, etc. In Fig. 1(a) and 1(b), we illustrate the notion of pipelining in aggregated convergecast and that of a schedule length on a network of 6 source nodes. The solid lines represent tree edges, and the dotted lines represent interfering links. The numbers beside the links represent the time slots at which the links are scheduled to transmit, and the numbers inside the circles denote node ids. The entries in the table list the nodes from which packets are received by their corresponding receivers in each time slot. We note that at the end of frame 1, the sink does not have packets from nodes 5 and 6; however, as the schedule is repeated, it receives aggregated packets from 2, 5, and 6 in slot 2 of the next frame.

Similarly, the sink also receives aggregated packets from nodes 1 and 4 starting from slot 1 of frame 2. The entries {1, 4} and {2, 5, 6} in the table represent single packets comprising aggregated data from nodes 1 and 4, and from nodes 2, 5, and 6, respectively. Thus, a pipeline is established from frame 2, and the sink continues to receive aggregated packets from all the nodes once every 6 time slots. Thus, the minimum schedule length is 6. In this module, a time slot assignment scheme in Algorithm 1, called BFSTIMESLOTASSIGNMENT is proposed, that achieves this bound. In each iteration of BFS-TIMESLOTASSIGNMENT (lines 2-6), an edge e is chosen in the Breadth First Search (BFS) order starting from any node, and is assigned the minimum time slot that is different from all its adjacent edges respecting interfering constraints. Note that, if the interfering links are present, the corresponding constraint in line 4 is checked; however, when interference is eliminated this check is redundant. The algorithm minimizes the schedule length when there are no interfering links, as proved in Theorem 1. To illustrate, the same network of Fig. 1(a) in 1(c) is shown with all the interfering links removed, and so the network is scheduled in 3 time slots. Although BFS-TIMESLOTASSIGNMENT may not be an approximation to ideal scheduling under the physical interference model, it is a heuristic that can achieve the lower bound if all the interfering links are eliminated. Therefore, together with a method to eliminate interference the algorithm can optimally schedule the network.

Fig 1a

Fig 1b

Fig 1c Algorithm 1: 1. Input: T =(V, ET ) 2. while ET = do 3. e next edge from ET in BFS order 4. Assign minimum time slot t to edge e respecting adjacency and interfering constraints 5. ET ET \{e} 6. end while

In the form, a button Start creating nodes is provided which is used to create the tree structures of node as. A button Frame 1 is provided to find the frame 1 schedule lengths. A button Frame 2 is provided to find the frame 2 schedule lengths. A button BFS-TIMESLOTASSIGNMENT is provided to implement the algorithm and calculate the Minimum Time Slot value.

2. ONE-SHOT RAW-DATA CONVERGECAST In this module, one-shot data collection is considered where every sensor reading is equally important, and so aggregation may not be desirable or even possible. Thus each of the packets has to be individually scheduled at each hop en route to the sink. Unlike in the case of periodic aggregated convergecast where a pipelining takes place and each of the tree edges is scheduled only once within each frame, here the edges could be scheduled multiple times and there is no pipelining. A time slot assignment scheme in Algorithm 2, called LOCAL-

TIMESLOTASSIGNMENT is described, which is run locally by each node at every time slot. The key idea is to: (i) schedule transmissions in parallel along multiple branches of the tree, and (ii) keep the sink busy in receiving packets for as many time slots as possible. Because the sink can receive from the root of at most one top-subtree in any time slot, which top-subtree should be made active is need to be decided. Assuming that the sink is aware of the number of nodes in each top-subtree, each source node maintains a buffer and its associated state, which can be either full or empty depending on whether it contains a packet or not. The algorithm does not require any of the nodes to store more than one packet in their buffer at any time. All the buffers is initialized as full, and assume that the sinks buffer is always full for the ease of explanation. Algorithm 2 LOCAL-TIMESLOTASSIGNMENT 1. node.buffer = full 2. if {node is sink} then 3. Among the eligible top-subtrees, choose the one with the largest number of total (remaining) packets, say top-subtree i 4. Schedule link (root(i),s) respecting interfering constraint 5. else 6. if {node.buffer == empty} then 7. Choose a random child c of node whose buffer is full

8. Schedule link (c, node) respecting interfering constraint 9. c.buffer = empty 10. node.buffer = full 11. end if 12. end if The rst block of the algorithm in lines 2-4 gives the scheduling rules between the sink and the roots of the top-subtrees. A top-subtree is defined to be eligible if its root has at least one packet to transmit. For a given time slot, the root of an eligible top-subtree is scheduled which has the largest number of total (remaining) packets. If none of the topsubtrees are eligible, the sink does not receive any packet during that time slot. Inside each top-subtree, nodes are scheduled according to the rules in lines 5-12. A subtree is defined to be active if there are still packets left in the subtree (excluding its root) to be relayed. If a nodes buffer is empty and the subtree rooted at this node is active, one of its children is scheduled at random whose buffer is not empty. The algorithm guarantees (as proved in Lemma 3) that in an active subtree there will always be at least one child whose buffer is not empty, and so whenever a node empties its buffer, it will receive a packet in the next time slot, thus emptying buffers from the bottom of the subtree to the top. An example shown in Fig. 2(a) is ran to explain the algorithm. In the rst time slot, since the eligible top-subtree containing the largest number of remaining packets is {2, 5, 6}, we schedule the link (2,s), and the sink receives a packet from node 2 in slot 1. In the second time slot, the eligible top-subtrees are {1, 4} and {3, 7}, both of which have 2 remaining packets. Choose one of them at random, say {1, 4}, and schedule the link (1,s). Also, in the same time slot since node 2s buffer is empty, it chooses one of its children at random, say node 5, and schedule the link (5, 2).In the third time slot, the eligible top-subtrees are {2, 5, 6} and {3, 7}, both of which have 2 remaining packets. Choose the rst one at random and schedule the link (2,s), and so the sink receives node 5s packet (relayed by node 2). We also schedule the link (4, 1) in the third time slot

because node 1s buffer is empty at this point. This process continues until all the packets are delivered to the sink, yielding an assignment that requires 7 time slots. Note that, in this example, 2nk 1=5, and so max(2nk1,N)=7.

Figure:Raw-data convergecast using algorithm LOCAL-TIMESLOTASSIGNMENT: Fig 2 (a) Schedule length of 7 when all the interfering links are removed. In the form, a button Start creating nodes is provided which is used to create the tree structures of node as. A button LOCAL-TIMESLOTASSIGNMENT is provided to implement the algorithm and calculate the Time slot values to all the nodes. 3. VIEWS AND REPORTS In this module, the records details such as nodes list, edges list, aggregated converge cast nodes list, one shot raw data converge cast nodes list and schedule length details. All these records are viewed using data grid view control as well as crystal reports.

- DSTransféré parImran
- AvlTransféré parapi-3844034
- Foundations Of Computer Science - IndexTransféré parIan
- 2010Transféré parIndhumathi Mohan
- MONTE-CARLO TREE SEARCH FOR THE “MR JACK” BOARD GAMETransféré parijscai
- Mobile Relay Configuration in Data Intensive Wireless Sensor NetworfsadasdasksTransféré parSankula Siva Sankar
- Interval Tree Clocks: A Logical Clock for Dynamic SystemsTransféré parterminatory808
- Sol 10Transféré parNarbeh Mirzaei
- Computer Notes - Data Structures - 26Transféré parecomputernotes
- Delay Efficient Data Aggregation Scheduling in Duty-cycled Wireless Sensor NetworksTransféré parHa
- Decision Trees in PythonTransféré pareokyere
- phaniTransféré parVamshi Krishna Singirikonda
- Branch_and_Bound.docTransféré parmansha99
- Binary Tree Print SequenceTransféré parsapaaa01
- Art AlgoritmoRedEnergizada EnglishTransféré parHelena Gomez
- ugc2102p3Transféré parRiky Sri
- Stacks & QuesesTransféré parTabish Hamid
- chapter8.pdfTransféré parAnthony Griffith
- 40review(JTableJTree)Transféré parAbdelhamid El El Mejdoubi
- lec16Transféré parKamesh Singh Jadoun
- 20160829_Divide_and_Conquer.pdfTransféré parFyyrree
- Stick Figures Pg 2012Transféré parJohn Doe
- Tree Preorder 2Transféré parakg299
- Energy-Aware Robust Key Management Technique for Dynamic Wireless Sensor NetworksTransféré parAnonymous vQrJlEN
- An Decentralized File Shareing & Data Transmission in Peer to Peer Communication Using Edonkey ProtocolTransféré parTechnos_Inc
- ABSTRACT1.docxTransféré parAnkith Hegde
- d-samanta data structre.pdfTransféré parAkash Bhagat
- Energy Efficient Routing Protocols for Node Distribution in Wireless Sensor NetworksTransféré parEditor IJTSRD
- Abdullah Et Al. - 2018 - Intrusion Detection of DoS Attacks in WSNsTransféré parIshmael Okine
- Huffman Revis iTransféré parYogie Anugrah

- Food Habits and Nutrient Intake of Bankers in Lagos StateTransféré parIOSRjournal
- Evaluation of Automatic Code Generation ToolsTransféré parTrung Kiên
- James K. Galbraith - Inequality_ What Everyone Needs to Know (2016, Oxford University Press)Transféré parXiomySosa
- Annotating TextbooksTransféré par0pt618
- Master Thesis Natural Oil AbsorbtionTransféré parFaris Mat
- Teradata Normalized TransformationTransféré parAmit Sharma
- ix_phy.pdfTransféré parAdt
- MUET Q1. What is Quetion 1Transféré parizam70
- Tracing Pastoralist MigrationsTransféré parFábio Vieira
- Cell and Molecular Biology _ What We Know & How We Found It (SecoTransféré parphyaravi
- 1-s2.0-S002250960700169X-mainTransféré parMario Misael Machado Lòpez
- vol2-no5-7 dwdadwdwaTransféré parFelix Santoso
- Manual de Programador ASiTransféré partoques75
- In Terms of Market GeographyTransféré parAnu Mathews
- 245319_WHO_MEC-wheel.pdfTransféré parBillyNicolas
- YagnopavitaTransféré parAvinash
- Thermodynamics of ProteinTransféré parEmmanuel Diaz Martinez
- hopayian2017Transféré parasfwegere
- Corticosteroid in Copd ExacerbationTransféré parhimono_ona
- 08gqg108Transféré parquimica 2117
- Copper Alloy C14200Transféré parStandley Laia
- Report Drawing ProjectTransféré parAbdul Haziq
- Federal Resume TemplateTransféré parCarissa Lee
- Ethics 3Transféré parXu Nadeem
- RAW SWOTTransféré parRyuzanna Jubaidi
- Chapter 1Transféré parbaruaole
- Holocaust Monuments And Counter-Monuments.pdfTransféré parARternativni POgledi
- BS-en-12101-5Transféré parHsaam Hsaam
- Carbon Footprint of Electricity Generation_ghgTransféré parJohn Obidi
- Sun.angle.calculatorTransféré parbudscri

## Bien plus que des documents.

Découvrez tout ce que Scribd a à offrir, dont les livres et les livres audio des principaux éditeurs.

Annulez à tout moment.