scholarly journals Reliable, Real-Time Routing in Wireless Sensor and Actuator Networks

2011 ◽  
Vol 2011 ◽  
pp. 1-8 ◽  
Author(s):  
Martin Krogmann ◽  
Mike Heidrich ◽  
Daniel Bichler ◽  
Daniel Barisic ◽  
Guido Stromberg

We present a novel Reliable, Real-time Routing protocol (3R) based on multipath routing for highly time-constrained Wireless Sensor and Actuator Networks (WSANs). The protocol consists of a newly designed routing metric and a routing algorithm utilizing this metric. Our routing metric enables strong Quality-of-Service (QoS) support based on parallel transmissions which significantly reduces transmission delays in WSANs. A routing algorithm utilizing this metric is presented based on Dijkstra's shortest path. A novel Medium Access Control (MAC) layer that supports dynamical adjustments of retransmission limits, reduces traffic overhead in multipath routing protocols. Thorough simulations have been performed to evaluate the routing protocol, and the results show that real-time performance of WSANs can be vastly improved.

2013 ◽  
Vol 11 (10) ◽  
pp. 3065-3070
Author(s):  
Roopali Garg ◽  
Guneet Kaur

Mobile ad hoc network is an assembly of mobile nodes with no centralized server. Due to mobility of nodes and decentralized network it is difficult to maintain the quality of service (QoS) in routing the packets from source to destination.  QoS can be defined in terms of various metrics like delay, bandwidth, packet loss, routing overhead, jitter. Routing can be unicast, multicast or multipath.  This paper presents the description about the QoS multipath routing algorithm.


Author(s):  
Dr. N. Bhalaji

Over the years, Internet of Things has advanced greatly advanced with technological inventions, enabling the development of smart networks globally. Network edge is introduced into the architectures in order to provide better user experience and quality of service But the issue with this these systems should be able to resist the attacks from external sources. There are many existing methods which are concerned with detecting the intrusion over static wireless sensor web. Due to various transmission regions being involved when using the sensor nodes, it is challenging task to choose the right guard nodes and sensor monitoring nodes. In order to address this issue, we propose a safe monitoring and routing protocol that incorporates Artificial intelligence on the basis of Authentication and Encryption Model. Analysis of the proposed work shows that it proves to be more efficient when compared to other routing and monitoring methods.


Author(s):  
Jamila Bhar ◽  
Imen Bouazzi

The future is moving towards offering multiples services based on the same technology. Then, billions of sensors will be needed to satisfy the diversity of these services. Such considerable amount of connected devices must insure efficient data transmission for diverse applications. Wireless sensor network (WSN) represents the most preferred technology for the majority of applications. Researches in medium access control (MAC) mechanism have been of significant impact to the application growth because the MAC layer plays a major role in resource allocation in WSNs. We propose to enhance a MAC protocol of WSN to overcome traffic changes constraints. To achieve focused goal, we use elastic hybrid MAC scheme. The main interest of the developed MAC protocol is to design a medium access scheme that respect different quality of services (QoS) parameters needed by various established traffic. Simulation results show good improvement in measured parameters compared to typical protocol.


Author(s):  
Neetika Jain ◽  
Sangeeta Mittal

Background: Real Time Wireless Sensor Networks (RT-WSN) have hard real time packet delivery requirements. Due to resource constraints of sensors, these networks need to trade-off energy and latency. Objective: In this paper, a routing protocol for RT-WSN named “SPREAD” has been proposed. The underlying idea is to reserve laxity by assuming tighter packet deadline than actual. This reserved laxity is used when no deadline-meeting next hop is available. Objective: As a result, if due to repeated transmissions, energy of nodes on shortest path is drained out, then time is still left to route the packet dynamically through other path without missing the deadline. Results: Congestion scenarios have been addressed by dynamically assessing 1-hop delays and avoiding traffic on congested paths. Conclusion: Through extensive simulations in Network Simulator NS2, it has been observed that SPREAD algorithm not only significantly reduces miss ratio as compared to other similar protocols but also keeps energy consumption under control. It also shows more resilience towards high data rate and tight deadlines than existing popular protocols.


2012 ◽  
Vol 241-244 ◽  
pp. 1028-1032
Author(s):  
Li Wang ◽  
Qi Lin Zhu

In recent years, as the development of wireless sensor network, people do some deep researches on cluster-based protocol, most around the prolongation of the lifetime of WSN and decline of energy consumed by the sensors. This paper analyses of classical clustering routing protocol based on LEACH, aiming at the node energy foot presents energy improved clustering routing algorithm, the random cluster head selection algorithm of threshold to be changed, lowering the threshold, in the original threshold increases the node's remaining energy factor, reduces the communication load of cluster nodes, and simulation. The simulation results show that the LEACH-E improved algorithm, energy saving, reducing balance node energy consumption, effectively prolongs the network lifetime.


Sign in / Sign up

Export Citation Format

Share Document