• No results found

FCFS Strategy for Heterogeneous SWSN

N/A
N/A
Protected

Academic year: 2020

Share "FCFS Strategy for Heterogeneous SWSN"

Copied!
6
0
0

Loading.... (view fulltext now)

Full text

(1)

Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories

Aryabhatta Journal of Mathematics and Informatics

http://www.ijmr.net.in email id- irjmss@gmail.com

Page 185 FCFS Strategy for Heterogeneous SWSN

Chandrakant Naikodi Visiting Professor, Dept. of CSE, Cambridge Institute of Technology

Bangalore, India

Abstract— Scheduled Wireless Sensor Network (SWSN) is a sort of WSN where organize has an impromptu framework with problematic topology. The First-Come-First-Served (FCFS) calculation is the easiest planning calculation where solicitations are dispatched by their entry time on the prepared line. The FCFS booking is reasonable in the formal sense or human feeling of reasonableness yet it is uncalled for as in long demands which makes short demands to hold up and insignificant solicitations make critical employments hold up. However FCFS is more customary than the greater part of different plans since it offers time premise. The FCFS plan is not useful in planning intuitive hubs since it can't ensure great reaction time. The code for FCFS scheduling is easy to compose and get it. One of the significant downsides of this plan is that the normal time is frequently very long. All sensor hubs with various usefulness are known as heterogeneous SWSN. In this paper we are attempting to assess SWSN with FCFS methodology so future system would welcome this approach.

Index Terms—FCFS, SWSN, WSN, Scheduled, Topology

Introduction

Scheduled Wireless Sensor Network (SWSN) is a sort of WSN where organize has a specially appointed framework with changing topology. Typically WSN contains gathering of sensor hubs, every hubs is fit for detecting natural changes over a period. There are assortments of sensor hubs/gadgets are accessible in the market. In any case, the proverb of all sensor hubs is to recognize the progressions of nature as far as message/bundle and pass onto close-by/focal/pioneer hub. Normally gathering of such sensor hubs is called as WSN. The utilization of this system is expanding step by step because of radical changes in the earth/nature and to foresee the up and coming debacle/occasion/errand/message and so forth. The use of such system is constrained to ecological changes as well as connected to clinic (understanding/wellbeing observing), farming (product checking framework), vehicles (developments), city observing, swarm checking, ATMs/Banks/VIP places observing, and so forth.

(2)

Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories

Aryabhatta Journal of Mathematics and Informatics

http://www.ijmr.net.in email id- irjmss@gmail.com

Page 186

upkeep, very secured, solid, adaptable, dynamic nature, auto controlled, and so on.

Figure 1: Structure of SWSN.

Figure 1. shows the basic architecture on the WSN, a heterogeneous network is a computer network comprised of computers using alike configurations and protocols. A good instance of a heterogeneous network is a one using Microsoft Windows over TCP/IP.

As per the way the information are gotten from the sensor hubs, SWSNs are characterized into three general classes in particular (i) heterogeneous sensor systems, (ii) heterogeneous sensor system and (iii) half and half sensor organize. In the heterogeneous sensor organizes, all the sensor hubs and base stations are indistinguishable as far as equipment capacity and beginning battery vitality. As proposed in LEACH calculation, the part of group heads is haphazardly and occasionally turned over every one of the hubs to guarantee a similar rate of scattering of battery vitality for all the sensor hubs. Heterogeneous sensor systems, has at least two unique sorts of sensor hubs with various equipment abilities and battery power are utilized. The sensor hubs with higher equipment capabilities and more battery power contrasted with other sensor hubs go about as bunch heads and execute as an ordinary sensor hub. In half and half sensor arranges a few portable base stations work agreeably to give quick information gathering in an ongoing way.

II. RELATED Work

Book [1], briefs nuts and bolts of remote sensor organize, highlights examine ranges of WSN; it records prevalent test systems for WSN lastly briefs applications and difficulties of WSN. Sensors are turning out to be a piece of the life henceforth its uses are likewise spreading crosswise over machine/human medicinal services, movement control, home control, military operations, stock control, range/woodland/industry observing, air/water testing, and so on, consequently this field gives a magnificent chance to analysts, understudies and others to investigate more.

(3)

Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories

Aryabhatta Journal of Mathematics and Informatics

http://www.ijmr.net.in email id- irjmss@gmail.com

Page 187

malevolent hub would not be a piece of correspondence in the system. Attempted to demonstrate it is one of the powerful strategies for security issues in heterogeneous hubs in MANETs.

In [3], paper offers to share the information stack among sensor hubs in view of the legitimate gathering of WSN hubs. Stack adjusting can be expert to improve asset use, amplifying throughput, limiting reaction time, and keep away from over-burden by appropriating work between alike sorts of sensor hubs. This will use numerous sensor hubs with load adjusting as an option of single sensor hubs which may expand consistency through excess.

In [4][5][6], since vitality effective load adjusting is an extremely important in WSN which upgrades asset utilization, expand throughput, boost arrange lifetime, limit reaction time, and evade over-burden by sharing out work among alike kind of sensor hubs with vitality proficient routes[8[10][11][12][14]. At last proposes a vitality proficient load adjusting among sensor hubs tied down in the legitimate or potentially physical gathering of WSN.

In [7], as we probably am aware WSN have wide assortment of use, for example, natural checking, movement investigation, mechanical process observing, and arranged frameworks. Extensive scale WSNs are probably going to play increasingly vital part in forthcoming non-military personnel and military application. Outlining of MAC layer convention for WSN is a testing errand because of constrained battery power and restricted transfer speed. Time Division Multiple Access Protocol takes care of both issues at the level of MAC layer. An assortment of booking strategy for TDMA convention with various target has been proposed for WSNs. In this paper, they initially sketched out the sensor organize properties that are urgent for the plan of TDMA conventions and afterward, they have portrayed many TDMA conventions which are proposed for sensor systems.

In [9], the creator has considered the issue of adjusting resolute unit measure tokens on dynamic and heterogeneous frameworks. By modifying a randomized technique imagined for heterogeneous frameworks, we can achieve an asymptotically ostensible expected over-burden in l 1, l 2 and l  ∞  standard while just marginally expanding the run-time by a logarithmic component.

The LEACH[15,16] is a well-known vitality effective versatile grouping calculation that structures hub groups in light of the got flag quality and utilizations these nearby group heads as switches to the focal station. Filter is application-particular information spread convention that utilizations groups to expand the life of the SWSN. Drain uses randomized pivot of nearby bunch heads to equally circulate the vitality stack among the sensors in the system. Drain utilizes three strategies particularly (i) randomized unrest of the group heads and relating bunches, (ii) restricted coordination and control for bunch set-up and operation, and (iii) nearby pressure to lessen worldwide correspondence. Drain bunching ends in a limited number of Iteration, yet does not confirmation great group head circulation and accept uniform vitality utilization for bunch heads.

Design and Implementation

This work has been done in Java dialect with help of Oracle Database, the outcomes demonstrates the consistency of information handling in the SWSN sorts.

The recreation has focused to enhance the execution of SWSN sorts. The reenactment trial is accepted 500 hubs as system size, where the bundle End-to-End defer is the standard time that parcels get the chance to cross the SWSN arrange.

(4)

Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories

Aryabhatta Journal of Mathematics and Informatics

http://www.ijmr.net.in email id- irjmss@gmail.com

Page 188

support lines, time for transmission and defers prompted by the directing exercises and MAC control trades.

Consequently, End-to-End postpone is relies on how better a directing convention picks the assortment of limitations in the system and demonstrates the consistency of the steering convention. Thus, considering proposed calculation procedure or more review on SWSN sorts, the calculation has any desires for high development later on. The sample algorithm is as follows,

Begin

t ← totalTime; i← 0; //current node N ← number of nodes; j← 0;

numberOfRequests← All requests are counted; Begin loop (numberOfRequests-- !=0)

Hetro[i] = getFCFSRequests(); end loop

Begin loop (Hetro[j] != null) t = dataProcess(Hetro[j]) end loop

end

Experimental results

Above algorithm has been simulated and extracted a result shown in Fig.2. All request has been received based on FCFS strategy but from heterogeneous nodes. The graph shows the consistent performance

improvement when a network size grown up.

Figure 2. Time T of DSR, AODV and proposed algorithm V/S number of nodes.

(5)

Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories

Aryabhatta Journal of Mathematics and Informatics

http://www.ijmr.net.in email id- irjmss@gmail.com

Page 189 Conclusion

IN THIS PAPER, WE PROPOSE ANOTHER SYSTEM ON NEW SORT OF SYSTEM WHICH IS SWSN, SINCE AS OF NOW EXISTED SYSTEM IS GETTING TO BE DISTINCTLY DISCREDITED OR LESS PROMINENT, SO IT REGARDS HAVE ANOTHER INNOVATION. THE PROPOSED CALCULATION ON THIS SWSN WILL EXPAND THE SYSTEM LIFETIME, BATTERY SPARING, DATA TRANSMISSION SPARING, AND EXECUTION CHANGE BY FIGURING THE FCFS SOLICITATIONS OF EVERY HUB IN LIGHT OF THE LANDING DATA GAVE BY EVERY SENSOR HUB IN THE SYSTEM.

References

*1+ Chandrakant Naikodi, “Wireless Sensor Network for Beginners,” Mudranik Technologies Pvt Ltd, 2014. ISBN: 9789351747277, Edition: 1 - Pub Date: 30-07-14,Book Link:

http://pothi.com/pothi/book/chandrakant-n-wireless-sensor-network-beginners

[2] Chandrakant N, et al., “Middleware Services for Security in Scalable and Non-Scalable Heterogeneous Nodes of MANETs”, International Journal of Future Generation Communication and Networking(IJFGCN), ISSN: 1738-995x, June 2011, Issue Vol.4 No.2, Page No 1-12.

[3] Chandrakant N, "Logical Grouping of Heterogeneous Nodes in Wireless Sensor Network to Achieve Load Distribution and Balancing", International Journal of Advanced Engineering and global Technology (IJAEGT), ISSN:2309-4893, Volume-2 Issue-5, MAY 2014, Pages 705-708.

[4]Chandrakant N, "Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network", International Journal of Advanced Engineering and global Technology (IJAEGT),ISSN:2309-4893, Volume-2 Issue-5, MAY 2014, Pages 700-704.

[5] Chandrakant N, "Energy Aware Load Balancing in Secure Heterogeneous Wireless Sensor Network", International Journal of Advanced Engineering and global Technology (IJAEGT), ISSN:2309-4893, Volume-2 Issue-5, MAY Volume-2014, Pages 694-699.

[6] N. B. Fatma Bouabdallah and R. Boutaba. On balancing energy consumption in wireless sensor networks. Pages 1–16, march 2008.

[7]Sumit Kumar, Siddhartha Chauhan,"A Survey on Scheduling Algorithms for Wireless Sensor Networks", International Journal of Computer Applications (0975-8887), Volume 20 – No.5, April 2011.

[8] Y. Liao, H. Qi, and W. Li. Load-balanced clustering algorithm with distributed self-organization for wireless sensor networks. Sensors Journal, IEEE, 13(5):1498–1506, 2013.

[9] Robert Elssser and Burkhard Monien and Stefan Schamberger. In Load Balancing in Dynamic Networks.

[10] A. Tarachand, V. Kumar, A. Raj, A. Kumar, and P. Jana. An energy efficient load balancing algorithm for clusterbased

wireless sensor networks. In India Conference (INDICON), 2012 Annual IEEE, pages 1250–1254, 2012. [11] U. Wijetunge, A. Pollok, and S. Perreau. Load balancing

effect of stochastic routing in wireless sensor networks. In Telecommunication Networks and Applications Conference (ATNAC), 2012 Australasian, pages 1–6, 2012.

[12] F. Xia, X. Zhao, H. Liu, J. Li, and X. Kong. An energy efficient and load-balanced dynamic clustering protocol

(6)

Double-Blind Peer Reviewed Refereed Open Access International e-Journal - Included in the International Serial Directories

Aryabhatta Journal of Mathematics and Informatics

http://www.ijmr.net.in email id- irjmss@gmail.com

Page 190

[13] S. zdemir. Secure load balancing for wireless sensor networks via inter cluster relaying. In Kithab Proceedings, pages 249–253, 2007.

[14] R. Zhang, Z. Jia, and L. Wang. A maximum-votes and load-balance clustering algorithm for wireless sensor networks. In Wireless Communications, Networking and Mobile Computing, 2008. WiCOM ’08. 4th International Conference on, pages 1–4, 2008.

*15+ W.R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “An Application-Specific Protocol Architecture for Wireless Microsensor Networks” in IEEE Tmnsactions on Wireless Communications (October 2002), vol. 1(4), pp. 660-670.

[16] W.R. Heinzelman, A. Chandrakasan, and H. Balakr

Figure

Figure 1: Structure of SWSN.  Figure 1. shows the basic architecture on the WSN, a heterogeneous network is a computer network comprised of computers using alike configurations and protocols
Figure 2. Time T of DSR, AODV and proposed algorithm V/S number of nodes. Also proposed a theoretical model for energy efficient routing in heterogeneous SWSN network but did not implement and evaluate the performance of the protocol in current simulator e

References

Related documents

IAPM and the related mode OCB are single-pass highly parallelizable authenticated-encryption modes, and while they were originally proven secure in the private random permutation

49 Brookhaven National Laboratory, Upton, New York 11973 50 Langston University, Langston, Oklahoma 73050 51 University of Oklahoma, Norman, Oklahoma 73019.. 52 Brown

per capita utility from aggregate hhld expend., in region r Equivalent Variation, $ US million Equivalent variation for the world Change in trade balance ∆X – M, $ US million Change

Furthermore, we cannot assume that the data acquisition is started early enough to allow for the reconstruction of the first energy deposition in the case of undetected

Untreated ovariectomy (group B) caused about 48% decrease of cancellous bone mass in the femoral neck as compared to sham-operated rats (p 0.01, Figure 2C) while this

Next, we consider the security of a tweakalbe block cipher under chosen ciphertext attack (ab- breviate as tcca)... Then, the XEX2 tweakable block cipher is security under

In order to determine the role of chromosomal heterozygosity in the restriction of gene flow between the races, we examined chromosome pairing and recombination

The investment subsidy is more effective for three broad reasons: firstly because it induces a greater investment response, and consequently a greater response in GDP, wages