Vous êtes sur la page 1sur 6

International Journal of Computer Trends and Technology- volume3Issue1- 2012

Data Transferring Mechanisms for Multipath Routing Using Concentrated Dissimilate Algorithm in Wireless Networks
Venkata Sumanth Mareedu1, Sudheesha Cheepi2, Venkata Durga Kiran Kasula3
1

Student, Department of CSE, K L University, Andhra Pradesh, India, Student, Department of CSE, K L University, Andhra Pradesh, India,

2 3

Asst.Professor, Department of CSE, K L University, Andhra Pradesh, India,

Abstract
Wireless networks usually consist of sensors perceiving data and sinks gather the data. However, it is complex for such approaches about mobility to develop the offered multipath routing algorithms and also for the mobile sinks to function as gateways to join with infrastructure. To look up the shortcomings, Unreliability at the broadcast-level can result in imperfect flooding coverage or extreme re-flooding, creating path maintenance either unreliable or costly. We present Concentrated Dissimilate Algorithm, a very simple algorithm that strengthens the reliability of spreading in such networks. Our algorithm requires only limited information, and resides as a service between the MAC layer and network layer, taking information from both. We show that Concentrated Dissimilate Algorithm improves reliability at the same time balancing energy efficiency. We suggest novel mechanism to support the vigorous transmission with various sinks providing high throughput and low latency.

Index Terms Routing, Concentrated Dissimilate Algorithm, throughput, latency.


--------------------------------------------------------------------- *** ------------------------------------------------------------------------

1. INTRODUCTION
Wireless sensor networks usually consist of sensors perceiving data and sinks gathering the information. In addition, users collect necessary information from the sinks via communications networks. A mobility model in wireless sensor networks, can categorize according to each objects. That is to say, it is a mobility of sensor node, a mobility of a sink, and a mobility of a user. Hence, deciding a mobility of what type of object for sensor networks that suits sensor networks according to a variety of applications is significant. Wireless sensor networks characteristically consist of the three objects: user, sink, and sensor node. Depending on the application, wireless sensor networks can be classified by taking into consideration about the movement of the objects.

enemies from sensor nodes. Through collected data, the headquarters elaborate a plan of operations and delivery the operations to soldiers in the war zone. Then, soldiers carry out the operations and by extension, will collect directly data from sensor nodes to obtain the latest information.

1.2 Mobility of sink


Sensor nodes deployed inside sensor fields and users using information is fixed, whereas sinks collecting data can move inside sensor fields. For example, consider the example of habitat monitoring in which a team of life scientists are riding in a vehicle to track an animal. Here the vehicle has to follow the movement of the animal to track it. The vehicle can be equipped with a powerful sink (making it a mobile sink) to collect the data from the sensor nodes along the track of the animal.

1.3 Mobility of sensor node


Sinks collecting data and users using information of collected data are fixed, whereas sensor nodes can move inside sensor fields. Consider, for example, a scenario involving a hazardous materials leak in an urban environment. Metaphorically speaking, we would like to throw a bucket of sensor nodes into a building through a window or doorway. The nodes are equipped with chemical

1.1 Mobility of user


In this case, sensor nodes deployed inside sensor fields and sinks collecting data from sensor nodes is fixed, where users using information of collected data can move. For example, consider operations in the war zone. The headquarters located in the outskirts of the war zone deploy sensor nodes in the war zone and collect locations and movements of

ISSN: 2231-2803 http://www.internationaljournalssrg.org

Page 52

International Journal of Computer Trends and Technology- volume3Issue1- 2012


sensors that allocate them to sense the related dangerous material, and categorize themselves throughout the building in such a way that they maximize the area covered by these sensors. Data from the nodes are transmitted to a base position situated securely external to the building, somewhere they are assembled to form a live map showing the application of dangerous compounds inside the building. Data collection of the sink: Sensor networks with a fixed sink are a network that sensing data from sensor nodes be supposed to be transmitted to the fixed sink through multihop messaging. Routing algorithms to gather data in sensor networks with a fixed sink are used in scenario of a variety of types, for example, a scenario generating data by periods, a scenario generating an alternative result, and a scenario detecting a moving entity. Hence, a user can select and use the most suitable routing algorithm with fixed sink according to a scenario. Such research was highly developed and already abundant. So we will not point out anymore. Therefore, we use one in the existing routing algorithm as the routing algorithm to collect data. symmetric. The protocol replies with multiple routes from the source node to the sink rapidly, and prepares the paths that professionally balance the energy of the nodes. It also enables the selected nodes in the path to collect all the expected packets during a small point of time and to send out only the aggregated packet to the upstream node. Each node maintains a neighbor table for the routing protocol to function. The neighbor table contains an access of all the selected adjacent nodes through which a node can send out data.

2.2 Multipath Construction Phase


The sink node starts the multipath path structure phase to form a set of neighbors that is the address of all nodes that are capable to send out data from the source. During this process route apply for messages are exchanged among the nodes. Each sensor node transmits the route request packet once and maintains its own routing table. When sensor node disseminates a data packet, it only requests to know its adjacent node to transmit, dont need to preserve the whole path information. While the paths are produced whenever it is necessary different proactive routing protocols where it is essential to store the routing information, it reduces the transparency of sensor node. Even though the multipath routing protocol has to calculate some information to trace the routing table of sensor node, the energy cost is less than transmit and receive. Additionally, it supports multipath data forwarding, not using the fixed path. So the energy consumption will be distributed and the lifetime of network is extended. The format of route request message is shown in fig 1: The Source ID contains the node ID of the message target; SeqNumber field is a packet sequence. The Hop Count field is the number of hops from the sink node which is used to recognize nodes in dissimilar levels, nodes that can receive the radio signal of sink are definite as one-hop / level 1 nodes, Energy threshold field provides the smallest amount of required energy level for a node to be chosen for data transmission, Signal Strength threshold to indicate the minimum distance the node has to be situated in order to receive all the datas transmitted to that node and Sink ID indicates the ID of the sink which broadcasts the route request packet.

2. MULTIPATH ROUTING 2.1 Routing scheme


The sensor nodes are dispersed arbitrarily in the sensing area. A network collected of a sink node and lots of wireless sensor nodes in an exciting area is considered. Suppose that all nodes in the network are assigned with a distinctive ID and all nodes are participating in the network and forward the known data. The sensor nodes are assumed to be set for their lifetimes, and the identifier of sensor nodes is determined a priori. In addition, these sensor nodes have restricted processing authority, storage and energy, whereas the sink nodes have influential resources to execute any tasks or converse with the sensor nodes. Once the nodes are deployed, they stay at their locations for sensing tasks. The sensor nodes can accept messages from other nodes. The sink node is initialized with a hop value 0, while other sensor nodes are . The energy capable adaptive multipath routing algorithm planned is used for selecting the adjacent nodes, to which the data message has to be forwarded. A node is chosen to forward the data based on its accessible energy level and signal power. Preferably, the greater the energy in the node and farther than the node from the earlier one, is the more likely to be chosen as the next hop. The nodes which are not chosen in this process will move to the sleep state in order to save power. The communication is assumed to be bidirectional and

Figure 1: Route Request Message

3. ROUTE REQUEST 3.1 Initial route request at source node

ISSN: 2231-2803 http://www.internationaljournalssrg.org

Page 53

International Journal of Computer Trends and Technology- volume3Issue1- 2012


When the source has data to transmit but no route to target has been recognized yet, it will start the route request process. The source will initially checks its neighbor record to find out whether there are two groups of neighbors fulfilling the following three conditions: 1) All those nodes are nearer to the target; 2) Nodes in each group lay at one side of the sourcedestination line, opposite to the side of the other group; 3) Each node is distanced more than R/2 from the sourcedestination line. If such neighbors are found, the source will terminate that there are two potential routes which will at least keep away from collisions between the two nodes. From all suitable nodes, the source will desire the pair of nodes ensuing in smallest transmit power which is then used to broadcast route demand. The route request message also carries the position information of source and target nodes and the route demand type. to determine on its own energy efficient route. In all the three cases, there may exist two routes with no impact, but these routes will require many hops and thus cost more energy than a single, well-organized route would need. Therefore, we choose to find single energy efficient route in such a case.

4.

PROLIFERATION

MECHANISMS

FOR

TRANSFERRING OF DATA 4.1 Purely Random


In Purely Random (PR), shares are proliferated based on one-hop neighborhood information. More specifically, a sensor node maintains a neighbor list, which contains the ids of all nodes within its communication range. When a source node desires to send shares to the sink, it includes a Time To Live (TTL) of primary value N in each share. It then arbitrarily selects a neighbor for each share, and unicasts the share to that neighbor. After receiving the share, the neighbor first decrements the TTL. If the new TTL is greater than 0, the neighbor randomly choose a node from its neighbor register and transmit the share to it, and so on. When the TTL attain 0, the final node receiving this share stops the random proliferation of this share, and establishes routing it in the direction of the sink using standard min-hop routing. The WANDERER scheme is a special case of PRP with N= The main drawback of PR is that its proliferation effectiveness can be low, for the reason that a share may be proliferated back and forth several times between neighboring hops. Increasing the TTL value does not fully address this problem. This is because the random proliferation process reaches steady state under a large TTL, and its allocation wills no longer vary even if the TTL turn into larger.

3.2 Route request at intermediate node


If an intermediary node receives a route request message from a preceding node which is on the same side of the source-destination line as itself and which is additional to the destination than itself, it will start a back-off timer for that source-destination route request. When this control expires, the node will broadcast a local reply message for that route request with the adequate power to just reach the preceding node. After getting one local reply message for the route request just sent, the preceding node will immediately transmit a shut up message with the power used to transmit route request. In the style of computing with time, any other node receiving local reply or shut up message before its timer is over will cancel its timer. In addition, any node in receipt of a local reply or a shut up message from a node on the other side of the sourcedestination line will not take action to any future requests for this source-destination route. Consequently, only one neighbor will win the competition while the route discovery flooding is controlled. Additionally, we use transmit local reply and shut up messages to keep away from collisions without incurring any extra transparency.

4.2 Non repetitive Random


Non Repetitive Random (NRR) is based on PR, but it improves the proliferation competence by recording the nodes negotiate so far. Particularly, NRR adds a Node-InRoute (NIR) field to the heading of each share. In the beginning, this field is NULL. Opening from the source node, whenever you like a node proliferates the share to the next hop, the id of the upstream node is added to the NIR field. Nodes included in NIR are excluded from the random pick at the next hop. This no repetitive proliferation assurance that the share will be transmit to a different node in each step of random proliferation, leading to better proliferation competence.

3.3 Route requests failure


The source may not succeed to determine two collision-free routes for the following reasons: (1) There is no neighbor pair around the source that satisfies the three requirements; (2) A possible winner on one route is shut up by the node in another route; (3) There is no candidate neighbor around the winner; In case (1), the source will re-transmit a route request varying the type of request to an attempt to realize one energy competent route. In case (2) and (3), if at least one route is recognized, the source will use it. If no route is exposed after waiting for a positive time, the source will try

4.3 Directed Random


Direct Random (DR) gets better the proliferation efficiency by using two-hop neighborhood information. More particularly, DR adds a last-hop neighbor list (LHNL) field to the header of each share. Sooner than a share is

ISSN: 2231-2803 http://www.internationaljournalssrg.org

Page 54

International Journal of Computer Trends and Technology- volume3Issue1- 2012


proliferated to the next node, the relaying node first updates the LHNL field with its neighbor list. When the next node obtain the share, it compares the LHNL field next to its own neighbor list, and randomly picks one node from its neighbors that are not in the LHNL. It then decrement the TTL value, updates the LHNL field, and transmit the share to the next hop, and so on. Whenever the LHNL fully overlie with or contains the relaying nodes neighbor list, a random neighbor is chosen, just as in the case of the PR Proliferation. According to this proliferation method, DR reduces the chance of proliferate a share back and forth by eliminating this type of proliferation within any two consecutive steps. Compared with PR, DR endeavor to push a share external away from the source, and thus, leads to better proliferation competence for a given TTL value. transmit node will be randomly drawn from the enduring neighbors. In case the set of residual nodes after the first step is empty, the second step will be straightly applied to the complete set of neighbors. Node Energy Consumption (Ea) The node energy expenditure procedures the average energy degenerate by the node in order to broadcast the data packs from the source to the sink. The same metric is used in to determine the energy efficiency level of WSNs. It is designed as follows:

4.4 Multicast Tree-Assisted Random


Multicast Tree-Assisted Random aims at vigorously improving the energy efficiency of random proliferation while conserve the depressiveness of DR. Among the three different routes taken by shares, the route on the bottom right is the most energy competent because it is the shortest end-to-end path. As a result, with the purpose of get better energy efficiency, shares should be best proliferated in the direction of the sink.

Where M is the number of nodes, ei, init is the initial energy levels of node i, ei, res is the residual energy levels of node i, S is the number of sink nodes and dataNj is the number of data packets expected by sink j. Data Delivery Ratio (R) This metric represents the ratio between the number of data packets that are sending by the source and the number of data packets that are received by the sink.
Data delivery ratio =

Predictably, directional routing requires location information of both the source and the target nodes, and sometimes of transitional nodes. Examples of location based routing are the Greedy Perimeter Stateless Routing (GPSR) and Location-Aided Routing (LAR). Location information mainly relies on GPS in each node, or on some dispersed localization algorithms. The elevated cost and the low correctness of localization are the main drawbacks of these two methods, respectively.
MTR engage directionality in its proliferation process without needing position information. Particularly, it requires the sink to create a multicast tree from itself to every node in the system. Such tree creation is not unusual in existing protocols, and is normally conducted by flooding a hye message from the sink to every node. Previously the multicast tree is constructed; a node knows its distance to the sink and the id of its parent node on the tree. We guess that each entry in the neighbor list maintain by a node has a field that records the number of hops to the sink from the equivalent neighbor. Under MTR, the header of each share holds two additional fields: maxhop and minhop. The values of these consideration are set by the source to maxhop= ns+1 and minhop =ns -2, where ns is the hop count from the source to the sink, and1 and 2 are nonnegative integers with 1 < 2. The parameter 1 controls the scope of proliferation away from the sink. The parameter 2 controls the proliferation area toward the sink. A small 2 pushes the proliferation of a share away from the middle line involving the source and the link and services them to take the side path, most important to improved dispersion.

This metric point out both the loss ratio of the routing protocol and the effort required to receive data. In the ideal scenario the ratio should be equal to 1. If the ratio falls considerably below the ideal ratio, then it could be a sign of some faults in the procedural design. On the other hand, if the ratio is higher than the ideal ratio, then it is an suggestion that the sink receives a data packet more than once. It is not enviable because reaction of replacement packets consumes the networks precious resources. The relative number of copies received by the sink is also important because based on that number the sink, can probably take a suitable action to reduce the redundancy. Average Delay It is defined as the average time between the moment a data packet is sent by a data source and the moment the sink receives the data packet. This metric defines the freshness of data packets.

5. CONCENTRATED DISSIMILATE ALGORITHM (CDA)


CDA addresses the problem of poor dependability for broadcasting in low power wireless networks of nonuniform concentration. We are not trying to make a single transmit more proficient. Relatively, we wish to make a single transmit more reliable, thereby dropping the frequency with which an upper-layer protocol needs to raise

Before a node begins to select the next relaying node, it first strains out neighbors that are in the LHNL, just as in DR. subsequently, it filters out nodes whose hop count to the sink is better than maxhop or smaller than minhop. The next

ISSN: 2231-2803 http://www.internationaljournalssrg.org

Page 55

International Journal of Computer Trends and Technology- volume3Issue1- 2012


flooding. If an unreliable transmits are received 90% of the time, then a request that required 99% reliability would need to broadcast twice to reach its target. The goal of CDA is to make distribution sensibly consistent. We next describe the four steps needed to meet this goal: tracking neighbors and floods, basic retransmission to reach target reliability, adapting that target to network density, and recognize significant links that require flourishing communication. CDA requires that a node be familiar with the identity of its one-hop neighbors. We describe the one-hop neighborhood as nodes with which a node has inbound and outbound connectivity above a configurable threshold, over a poignant window of broadcasts. This description eliminates far-away and frail neighbors, as well as neighbors with strongly asymmetric relations. The threshold must be adjusted to explanation for the lowest ordinary stage of connectivity across bottleneck relations. CDA also must recognize when broadcasts by dissimilar nodes correspond to the similar flood. It therefore generates and propagates a unique identifier when a latest flood is initiated. Second, CDA uses a uncomplicated algorithm for retransmission. The initial time a node hears a broadcast it retransmits the packet absolutely, as in a usual flood. As supplementary neighbors broadcast the same packet, the node snoops and keeps track of which neighbors have proliferated the broadcast. Armed with one-hop neighbor knowledge, a node can determine the proportion of its neighbors that are definite to have seen a packet. We name a transmission by a neighbor an implicit ACK, a word that typically refers to inbound traffic that circuitously acks outbound traffic. When the numeral of implicit ACKs seen by a node falls underneath a predetermined threshold, a node will again retransmit the broadcast packet. To get well from destination nodes that fail to rebroadcast and missed implicit or explicit ACKs, receivers propel an explicit unicast ACK when they hear a frequent broadcast from the same sender. The broadcaster also switches to unicast when doing so reduces the expected figure of packets. Third, a key optimization in CDA is that both retransmission thresholds and the numeral of retries are adjusted for neighborhood density. Higher density neighborhoods need inferior thresholds with less retries, since other neighbors are probable to broadcast as part of the similar flood. If, for example, there are three or fewer neighbors, a node will make up to three attempts to propagate the message to all neighbors. For four to six neighbors the threshold is 66% and the number of retries is two. When there is a dense local neighborhood (i.e. eight or more neighbors), proliferation is measured successful when half of the neighborhood has received, and only one retry is attempted. As a final point, an additional significant improvement is directional sensitivity by detection of important links. Real networks frequently have uneven densities. When an upstream dense section meets a downstream sparse section, there can be a node at the boundary of the dense part that has a huge neighbor count, but is the only provider of traffic to the first downstream node in the sparse section. For example, the black node is the sole provider of traffic to the grey node, but it resides in a dense neighborhood. When the grey node fails to take notice of a broadcast from the black node, retries will rarely occur with our fundamental algorithm because there is a lofty probability that at least 50% of the black nodes neighbors will have acked the broadcast. The black node is unable of recognizing its special relationship with the gray node, but the gray node can effortlessly accomplish so as all of its upstream traffic will approach from the black node. Since bottleneck nodes are acknowledged by their downstream neighbors, this approach generalizes to include a number of imperceptibly associated networks, including several broadcasters on conflicting sides of a particular node. With our directional compassion optimization, nodes maintain a histogram of which neighbor was the first to broadcast a previously unheard broadcast. For the black node there would exist a moderately uniform distribution in such a histogram. The introduction of jitter for message forwarding in broadcasting protocols guarantees that no particular neighbor dominates. The gray node, however, sees the majority upstream traffic (for a time) as of a distinct node. Our solution includes a poignant window of time in which a directional histogram is maintained. If a particular neighbor has a bulk of the histogram, the node sends to upstream neighbor organize message representing that it has a particular association to this node. Some node that gets such a message will perform up to 4 retries when that downstream node does not ack. Our existing algorithm assumes infinite memory in hold of any amount of neighbors. The testbed experiments described in were run on Stargate-class nodes, and simulations be run beneath EmSim lacking any memory constraints. To organize CDA on platforms with imperfect resources (like motes), modifications are requisite to fundamental CDA. A state-limited edition of CDA might want to provide inclination to significant bottleneck neighbors. Broadening CDA to handle a restricted table size is a possible direction for future work.

6. CONCLUSION
In this paper we explored how broadcast trustworthiness interacts by flooding in wireless networks. Whereas there is an immense deal of prior work in the area of reliable broadcast, the majority of it focuses on efficient flooding, in simulated topologies, frequently with multi-hop topological information. We instead focused on the end-to-end reliability of flooding and the study of topologies with erratic density as we originate in our testbed. In addition, we proposed a very straightforward mechanism that uses only local density information, sometimes augmented by

ISSN: 2231-2803 http://www.internationaljournalssrg.org

Page 56

International Journal of Computer Trends and Technology- volume3Issue1- 2012


indications from instant neighbors of significant relations. We showed that this permutation was together efficient at obtaining near-perfect reliability, and a great deal further efficient than either frequent flooding or certain transmissions. Most prominently, we confirmed that the cost of achieving 99% reliability for broadcast proliferation in a genuine testbed is on average 48% inferior with CDA than minimally siring the flood rate.
Conf. Wireless Communications, Networking and Mobile Computing, 2006, pp. 1-5. [11] B.K. Szymanski and G. Chen, Computing with Time: from neural networks to wireless networks, Computer Journal, 2008, 51(4):511522. [12] D.-Y. Hwang, E.-H. Kwon, and J.-S. Lim, "EASR: an energy aware source routing with disjoint multipath selection for energy-efficient multihop wireless ad hoc networks," Proc. Conf. Networking 2006, LNCS 3976, 2006, pp. 41-50.

ACKNOWLEDGEMENT
We are greatly delighted to place my most profound appreciation to Er.K.Satyanarayana Chancellor of K.L.University, Dr.K.Raja Sekhara Rao Principal, Prof. S.Venkateswaralu Head of the department, and Dr.K.Subramanyam in charge for M.Tech under their guidance and encouragement and kindness in giving us the opportunity to carry out the paper. Their pleasure nature, directions, concerns towards us and their readiness to share ideas enthused us and rejuvenated our efforts towards our goal. We also thank the anonymous references of this paper for their valuable comments.

REFERENCES
[1] Tao Shu, Marwan Krunz and Sisi Liu, Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes, IEEE Transactions On Mobile Computing, Vol. 9, No. 7, July 2010. [2] Zijian Wang, Eyuphan Bulut, and Boleslaw K. Szymanski, Energy Efficient Collision Aware Multipath Routing for Wireless Sensor Networks IEEE Transactions On Mobile Computing, Vol. 9, No. 7, June 2009. [3] R Vidhyapriya , Dr P T Vanathi, Energy Efficient Adaptive Multipath Routing for Wireless Sensor Networks, International Journal of Computer Science, VOL 34, Issue 1, Aug 2007. [4] M. Murtaza, J. Heidemann, F. Stann. Studying the Spatial Correlation of Loss Patterns among Communicating Wireless Sensor Nodes. USC/ISI Directed Research Report 2005. [5] W. Lou and Y. Kwon, H-Spread: A Hybrid Multipath Scheme for Secure and Reliable Data Collection in Wireless Sensor Networks, IEEE Trans. Vehicular Technology, vol. 55, no. 4, pp. 1320- 1330, July 2006. [6] W. Lou, W. Liu, and Y. Zhang, Performance Optimization Using Multipath Routing in Mobile Ad Hoc and Wireless Sensor Networks, Proc. Combinatorial Optimization in Comm. Networks, pp. 117-146, 2006. [7] R. Mavropodi, P. Kotzanikolaou, and C. Douligeris, SecMRa Secure Multipath Routing Protocol for Ad Hoc Networks, Ad Hoc Networks, vol. 5, no. 1, pp. 87-99, Jan. 2007. [8] Abhimanyu Das and Debojyoti Dutta, Data Acquisition in Multiplesink Sensor Networks, ACM SIGMOBILE Mobile Computing and Communications Review 2005. [9] L. He, Energy-efficient multi-path routing with short latency and low overhead for wireless sensor networks, Proc. ACIS Int. Conf. Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2007, Volume 3, pp. 161 - 167. [10] M. Liu, Z. Xu, J. Yang, and J. Ye, "Collision-constrained minimum energy node-disjoint multipath routing in ad hoc networks," Proc. Int.

ISSN: 2231-2803 http://www.internationaljournalssrg.org

Page 57

Vous aimerez peut-être aussi