Minimizing End-To-End Delay with Anycast and Controlled Mobility in Sensor Networks

Author(s):  
Mehdi Achour
2016 ◽  
Vol 1 (2) ◽  
pp. 1-7
Author(s):  
Karamjeet Kaur ◽  
Gianetan Singh Sekhon

Underwater sensor networks are envisioned to enable a broad category of underwater applications such as pollution tracking, offshore exploration, and oil spilling. Such applications require precise location information as otherwise the sensed data might be meaningless. On the other hand, security critical issue as underwater sensor networks are typically deployed in harsh environments. Localization is one of the latest research subjects in UWSNs since many useful applying UWSNs, e.g., event detecting. Now day’s large number of localization methods arrived for UWSNs. However, few of them take place stability or security criteria. In purposed work taking up localization in underwater such that various wireless sensor nodes get localize to each other. RSS based localization technique used remove malicious nodes from the communication intermediate node list based on RSS threshold value. Purposed algorithm improves more throughput and less end to end delay without degrading energy dissipation at each node. The simulation is conducted in MATLAB and it suggests optimal result as comparison of end to end delay with and without malicious node.


2020 ◽  
Vol 2020 ◽  
pp. 1-11 ◽  
Author(s):  
Jun Wang ◽  
Zhuangzhuang Du ◽  
Zhitao He

This paper presents an artificial spider-web topology model inspired by the structure and invulnerability of a spider web. A hierarchical clustering routing rule is accordingly established using the vibration transmission features of the natural spider web as a reference. Furthermore, the end-to-end delay is applied as the quantitative indicator of invulnerability for analyzing the communication performance and characteristics of the artificial spider-web topology. The simulation tests of a one-layer and 3-layer artificial spider-web model are implemented to obtain the importance and destructive tolerance of network components based on OPNET, with the change of communication conditions and fault types. This paper can provide a practical analysis method for the invulnerability of the artificial spider-web topology and offer important implications for the construction and maintenance of wireless sensor networks based on the topology.


2014 ◽  
Vol 2014 ◽  
pp. 1-10 ◽  
Author(s):  
R. Velmani ◽  
B. Kaarthick

Amidst of the growing impact of wireless sensor networks (WSNs) on real world applications, numerous schemes have been proposed for collecting data on multipath routing, tree, clustering, and cluster tree. Effectiveness of WSNs only depends on the data collection schemes. Existing methods cannot provide a guaranteed reliable network about mobility, traffic, and end-to-end connection, respectively. To mitigate such kind of problems, a simple and effective scheme is proposed, which is named as cluster independent data collection tree (CIDT). After the cluster head election and cluster formation, CIDT constructs a data collection tree (DCT) based on the cluster head location. In DCT, data collection node (DCN) does not participate in sensing, which is simply collecting the data packet from the cluster head and delivering it into sink. CIDT minimizes the energy exploitation, end-to-end delay and traffic of cluster head due to transfer of data with DCT. CIDT provides less complexity involved in creating a tree structure, which maintains the energy consumption of cluster head that helps to reduce the frequent cluster formation and maintain a cluster for considerable amount of time. The simulation results show that CIDT provides better QoS in terms of energy consumption, throughput, end-to-end delay, and network lifetime for mobility-based WSNs.


Sign in / Sign up

Export Citation Format

Share Document