SlideShare a Scribd company logo
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. VI (Jan – Feb. 2015), PP 44-48
www.iosrjournals.org
DOI: 10.9790/0661-17164448 www.iosrjournals.org 44 | Page
Wireless Sensor Grids Energy Efficiency Enrichment Using
Quorum Techniques
Manas Srivastava1
, C.Jawahar Sandeep2
1
(Computer Science and Engineering, SRM University, India)
2
(Computer Science and Engineering, SRM University, India)
Abstract: Wireless sensor networks are mainly considered for atmosphere reconnaissance, wherein wireless
sensor nodes collaborate to get their work done. Generally, wireless sensors are battery powered; therefore, it
is crucial for them to efficiently use their battery resources. Most of the existing power-saving protocols
achieve power savings by periodically putting sensor nodes to sleep. Such a regular sleep/awake
mechanism f a i l s to adjust a sensor node’s snooze period based on its traffic congestion, thus causing
either inferior power efficacy or higher latency. Furthermore, sensors may be positioned in antagonistic
atmospheres and may thus surprisingly fail. Most power-saving protocols do not promptly react to such
link breakage, resulting in long transmission delays. This paper, proposes a quorum-based medium access
control (QMAC) protocol that enables sensor nodes to snooze longer under light loads. As the flow is towards
the sink node i.e., the next-hop group, is also proposed to reduce transmission latency. Results authenticate
that the planned QMAC hoards more energy and keeps the communication potential low.
Keywords: QMAC, Quorums, Latency
I. Introduction
WIRELESS sensor networks have lately attracted plenty of attention. A lot of potential
applications for WSNs are bein g discussed. Such a grid normally consists of a huge number of
scattered nodes that unify themselves into a multi-hop wireless system. Each node has one or more sensors,
implanted processors and low- power receivers, and is normally battery functioned. Typically, it is the coor
dination to perform a common task. Efficacy of MAC protocol can be achieved in many ways. The first
is the energy efficiency. As stated above, feeler nodes are likely to be battery-operated, and it is often very
tough to modify or revive batteries for the l i n k a g e s. In fact, someday we expect some nodes to be
discarded rather than recharged. Protracting network lifetime for these nodes is a precarious concern. Another
vital characteristic is the scalability to the modification in network scope, node thickness and topology. These
nodes, which are normally installed in an ad hoc routine, function in a distributed way and coordinate with
each other to fulfill a common task. In wireless sensor applications where all sensor nodes constantly report
data to a single sink node sensor nodes that are nearer to the sink drain their power faster. This is referred
to as the energy-hole problem. To solve this, node deployment protocols try to distribute more nodes
around the sink. However, due to environment limits, sometimes, only uniform (random) node distribution is
possible. In such situations, node-deployment conventions are unable to elongate the network period. One way
of elongating the network period is by designing energy- efficient MAC protocols. Since idle listening has
been identified as a vital cause for energy depletion, numerous suggestions were made to reduce the time a
sensor node spends in idle listening. Some required time synchronization among sensor nodes. Since time
management is crucial for numerous sensor applications, it is natural for a synchronous MAC protocol to be
used to conserve energy. Generally, synchronous proprieties preserve a plan that specifies when a
sensor should be conscious to check communication bustle.
II. Related Work
S-MAC is a cluster-based protocol, basically it works in as for the intermittently sending nodal devices
to snooze if They are not involved in any type of to and fro communication. In that scenario we can say that
the particular perception is quite similar to the methodology used in the IEEE 802.11 power-saving mode,
where each node awakens up at the commencement of each ideal interval to check if it needs to persist
vigorous state. In S-MAC, nodes exchange synchronization and schedule information with their nodes that
are in between to each other and thus with the corresponding trailing nodes that are connected. Nodes that
follow to the similar agenda form a virtual cluster. A node that receives two different schedules tails
together. Now such a case, this node belongs to two different virtual clusters. The authors also introduce
adaptive listening to reduce latency if a clear to send (CTS) is Overheard, sensor nodes can briefly wake up at
the demise of the communication signal to the next hop by keeping the duty cycle low, S-MAC reduces each
sensor node’s power consumption. DMAC is another run-through that practices an adaptive liability phase.
Wireless Sensor Grids Energy Efficiency Enrichment Using Quorum Techniques
DOI: 10.9790/0661-17164448 www.iosrjournals.org 45 | Page
Thus in that concept we can say that each and every module length has been able to identify the
various other segmentations. However, similar to S-MAC and T-MAC, the only disadvantage of DMAC is that
the nodal grids needs to waken up at every cycle. Energy Efficiency is decreased since light loaded node may
continue to be in idle state in most cycles. PMAC provides another way to schedule the listening period. Each
sensor node individually determines it’s sleep/awake pattern according to its own traffic condition. Thus
pattern generation of the nodal device with more data generates a pattern having high awake periods. This
pattern indicates the node’s intention, i.e., whether it will sleep or not at each time slot. The actual sleep and
awake schedule for each sensor node is developed based on its own pattern and those of its neighbors.
PMAC familiarizes a method depending on the traffic conditions that uniquely build schedules centered on
the grids. The hitch of this procedure is that the mechanism relies totally on the pattern interactions of the
nodal devices with in term to the grids. The interactions of the two nodes are only possible if one of the node
receives the schedule correctly. Thus, it gives idlee listening but transmissions are wasted, same is in PMAC it
also suffers transmission delay.
B-MAC is an asynchronous mechanism that uses inferior control snooping and to achieve low-power
operation. To dependably communicate data, a sender sends a preamble that is long enough to notify the
receiver. For example, if the receiver checks the channel every 20 mms, the preamble must be at least 20 mms
long. Once the preface is recognized, the receiver will stay conscious to receive the packet. Compared with
synchronous solutions, the extended preamble in B-MAC produces excess energy consumption. Aside from
this, after sensing a preface, substantial energy waste is also found in non-target nodes since they have to stay
conscious until the end of the prelude to check the ones being targeted. X-MAC is an enhancement over B-
MAC. B-MAC is replaced by a series of short prologue packets in X-MAC, which are illustrious by small
breaks. The intermissions enable the goal host to end the preface earlier by transporting an early key value.
Each short preface contains a target address, which alleviates the energy-wastage lieu of the particular target
area that has been specified in reference to column group but still preamble packets reduce delay and energy
wastage when compared with as in for B-MAC more packets are sent for the particular data shift.
2.1 Problem Statement
Existing solutions for the energy-hole problem are dependent on proper node distribution strategies.
However, these protocols function in vain in environments where planned node deployment is non executable.
Thus in such terminologies, since network lifetime extension is still necessary, other power-saving protocols
(such as S-MAC, T- MAC, DMAC, or PMAC) should be applied. One of the problems of sensor nodes running
S-MAC, T-MAC, or DMAC is that they have to wake up at every time frame to check if there is pending
traffic. Nodes dependent and thus closer to the sink is thereby established with the priority of that which are
closer to the sink can be said as to heavily loaded and thus the next one are not prioritize to it with the possible
sink space and the which are not nearer to sink is thus can be described as weak ones .
2.2 Quorum Concept And Wake-Up Schedule
A quorum is a demand set functioning with the controls that are measurable if the assigned by the user.
By Default non empty set bisections are present in it, the arrangement can be done as the majority-based
quorum, the tree-based quorum, the grid-based quorum, and others. As in for this a set of quorum must awake at
the time frames set for the sensor nodes. In case of non-quorum time frames, linkage units remain in the snooze
node to save energy. Efficacy is that any two quorums can set up at any time. Energy efficacy method i.e.
quorum .Now in that, one row and one column are picked in a k × k grid as a quorum set. This concept is shown
in Fig. 3. Host I picks row IA and column Ja as its quorum, while host J picks row Ib and column Jb. There
are two intersections between hosts I and J: one for Ia and Jb and the other for Ia and Jb. As mentioned earlier,
sensor nodes must wake up at their chosen quorums. Thus at the intersection points both the node will wake
up. The main aim of the QMAC protocol is to reduce the Energy consumption and fix the snooze frequency
of the nodal device. Nodal device automatically selects one row and one columns dependent on the particular
set. Considering for energy saving awakening frames can be reduced, before that we use the set to distinguish
time frames with the nodal device node must wake up. Nevertheless, through these wake-up time mounts, a
sensor node does not always stay conscious for the entire time frame. A sensor node can go to snooze
whenever it identifies that another communication that it is not involved in is galvanized. Moreover, a sensor
node will go to snooze if the channel is idle for period of Td. In this paper, the value of Td is set to one fifth of
the length of a time mount. Nodes using an n × n grid will rouse up 2n – 1 out of n2 time frames. Because they
have heftier traffic, sensor nodes located in the inner haloes can use a smaller grid. As in for the nodal devices
located particularly in the outer corner can thus made available in the context to that they are having superior
grid , thus selecting the various grid sizes based on each nodal sensor and the particular traffic load, QMAC
resolves the snooze problem. Important is that the nodal sensor actually uses different sizes of the quorums ad
thus success is definite. Thereby the level of viability is higher in WSN, which tends that QMAC will be
Wireless Sensor Grids Energy Efficiency Enrichment Using Quorum Techniques
DOI: 10.9790/0661-17164448 www.iosrjournals.org 46 | Page
favorable. It won’t go in to the snooze mode until and unless there is an unresolved traffic whether the quorum
is existing or not.
III. Indentatons And Equations
A sensor node that is in an inner corona has more traffic because, aside from its own traffic, it has to
relay traffic from nodes in outer coronas. Thus calculative approach to determine the traffic load outer curve s
thereby processed which contains an inner node in it. Thus QMAC using a four-corona network, as shown in
Fig. 1. In that he fraction value can thus be made as in for C1: C2: C3: C4 is 1: 3: 5: 7.1 this means that, on the
average, a node in C3 is responsible for relaying traffic for the particular time. 7/5 nodes in C4, a node in C2 is
responsible for 5/3 nodes in C3, and a node in C1 will take care of three nodes in C2. Assuming that each node
generates one unit of traffic for each reporting, the sensor nodes in C4 only have their own traffic to deliver;
thus, their traffic load is one Aside from their own traffic, sensor nodes in C3 have to forward traffic from C4.
Each node in C3 is responsible for 7/5 nodes in C4; thus, the traffic load in C3 is 1 + (7/5) × 1 = 2.4. Similarly,
nodes in C2 and C1 have traffic loads of 1
+ (5/3) × 2.4 = 5 and 1 + 3 × 5=16 respectively. On a sensor node’s traffic load. If sensor nodes in C1 use a 2
×2 grid, then their ratio of wake-up time frames is 0.75. According to the ratio of traffic loads for different
coronas (C1: C2: C3: C4 = 16: 5: 2.4: 1), the ratio of wake-up time frames for the sensor nodes in C2,
C3, and C4 should be0.234, 0.112, and 0.047, respectively. This indicates that the quorum sizes used by C2,
C3, and C4 should be 8 ×
8, 17 ×17, and 42 × 42, respectively. In general, in a network where
Sensor nodes generate the same amount of traffic, the traffic load for sensor nodes in Ci can be denoted by Tick
and calculated by:-
C1:C2:C3:C4 = 1:3:5:7 (1)
Tick = 1+|Ci+1| (2)
|Ci|× TCi+1 (3)
1) Time is divided into a series of time frames.
2) All linkage units are time synchronized.
3) Each node has a unique ID.
4) Let us suppose that all the nodal devices are arranged in such a manner that the curve node is visible. It is
thus partitioned into same width coronas with reference to the jump count in to the sink node as shown in Fig. 1.
To create the coronas, a control packet .entwine with a field jump count = 1 is sent to the network
initialization
Phase through the sink node. At receivable of the packet each nodal edge increases the jump count
field by one and then rebroadcasts the packet. A node belongs to corona Ci if it receives a .net_INIT with
jumpcount = i.
If multiple net_INIT packets are received, only the one with the lowest jumpcount value is handled. Sensor
nodes in corona Ci are I jumps away from the region of interest. It is then communicated with the devices.
6) All sensor nodes have the same transmission range.
7) Nodes are stationary after deployment.
IV. Figures And Tables
Wireless Sensor Grids Energy Efficiency Enrichment Using Quorum Techniques
DOI: 10.9790/0661-17164448 www.iosrjournals.org 47 | Page
V. Conclusion
Energy conservation is crucial in WSNs. Typically, sensor nodes closer to the sink run out of energy
faster. Most previous solutions have tried to deploy more nodes around the sink. This paper focused on an
environment where planned deployment is difficult and also proposed a new energy- conserving MAC protocol.
Realizing that sensor nodes have different loads due to their different distances to the sink, applied the concept of
quorum to enable sensor nodes to adjust their sleep durations based on their traffic loads. To reduce delays
induced by longer sleep durations, have increased each node’s transmission opportunity by enabling a group of
next-hop nodes to accomplish the packet-relaying job. The downside of this method is the additional hop
information transmissions. Another way is to allow the sink to estimate the total number of coronas and then
broadcast it to all sensor nodes (through the NET_INIT packet). This method reduces the number of control
packets, although at the expense of accuracy. However, if the network size is known and each node’s
transmission range is stable, we can consider the estimation to be quite accurate.
References
Journal Papers:
[1]. Geetha V, K.Chandrasekaran, A Distributed Trust Based Secure Communication Framework for Wireless Sensor Networks,
Scientific Research An Academic Publisher/Wireless Sensors Network.
[2]. Mekkaoui Kheireddine, Rahmoun Abdellatif, Analysis Of Hops Length in Wireless Sensor Networks, Scientific Research An
Academic Publisher/Wireless Sensors Network.
Books:
[3]. Waltenegus Dargie, Christian Poellabauer, Fundamentals of Wireless Sensor Networks (Wiley Publications ISBN-13 978-
0470997659, ISBN-10 04070997656
[4]. Robert Faludi, Building Wireless Sensors Networks (O’Reilly Media Print ISBN 978-0-596-80773-3)
[5]. Massimo Vecchio, Wireless Sensor Networks: Novel approaches to distributed data aggregation and compression (Vdm Verlag
Publishers ISBN – 10 3639039998
[6]. Holger Karl, Andreas Willig, Protocols and Architectures for Wireless Sensor Networks (Wiley Publications ISBN – 10:
0470095105 ISBN –13: 978-0470095102
[7]. Suraiya Tarannum, Wireless Sensors Networks (IN-TECH Publishers, ISBN-13 978-953-307-325-5)
[8]. I. Stojmenovic, "Location updates for efficient routing in wireless networks," in: Handbook on Wireless Networks and Mobile
Computing, Wiley, 2002, 451-47
Proceeding Papers:
[9]. Proceedings of the Distributed Sensor Nets Workshop, 1978:Dept. Computer. Science, Carnegie Mellon University. [8] R. F. Sproull
and D. Cohen,”High-level protocols", Proc. IEEE, vol. 66, pp.1371 -1386 1978
[10]. Dai, S, Jing, X, and Li, L, "Research and analysis on routing protocols for wireless sensor networks", Proc. International Conference
on Communications, Circuits and Systems, Volume 1, 27-30 May, 2005, pp. 407-411
[11]. Jolly, G., Kuscu, M.C., Kokate, P., and Younis, M., "A Low-Energy Key Management Protocol for Wireless Sensor Networks",
Proc. Eighth IEEE International Symposium on Computers and Communication, 2003. (ISCC 2003). vol.1, pp. 335 - 340.
[12]. L. Doherty, K. S. Pister, and L. E. Ghaoui. Convex optimization methods for sensor node position estimation. In Proceedings of
INFOCOM'01, 2001.
[13]. J. Heidemann, F. Silva, C. Intanagonwiwat, R. Govindan, D. Estrin and D. Ganesan "Building efficient wireless sensor networks
with low- level naming", Proceedings of the Symposium on Operating Systems Principles, Lake Louise, Banff, Canada, Oct. 2001
[14]. W.R. Heinzelman, A. Chandrakasan and H. Balakrishnan”Energy-efficient communication protocols for wireless microsensor
networks", Proceedings of the Hawaii International Conference on Systems Science, Jan. 2000
[15]. L. Hu and D. Evans. Secure aggregation for wireless networks. In Workshop on Security and Assurance in Ad Hoc Networks,
January 2003.
Wireless Sensor Grids Energy Efficiency Enrichment Using Quorum Techniques
DOI: 10.9790/0661-17164448 www.iosrjournals.org 48 | Page
[16]. Y. Hu, A. Perrig, and D. Johnson. Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In Proceedings
of INFOCOM 2003, April 2003
[17]. C. Karlof and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. In Proceedings of 1st IEEE
International Workshop on Sensor Network Protocols and Applications, May 2003.
[18]. D. Niculescu and B. Nath. Ad hoc positioning system (APS). In Proceedings of IEEE GLOBECOM '01, 2001.
[19]. I. Stojmenovic, M. Russell, and B. Vukojevic, "Depth first search and location based localized routing and QoS routing in wireless
networks," IEEE Int. Conf. Parallel Proc., Aug. 2000, 173-180.
[20]. J. B. Tchakarov and N.H. Vaidya, "Efficient content location in mobile ad hoc networks," IEEE Int. Conf. on Mobile Data
Management MDM, 2004.
[21]. S. Desilva and S.R. Das, "Experimental Evaluation of a Wireless Ad Hoc Network," Proc. Ninth Int', l Conf. Computer Comm. And
Networks (IC3N), Oct. 2000.
About Author
Manas Srivastava is currently pursuing his B.Tech degree in Computer Science and Engineering from SRM
University, Chennai Tamil Nadu, India, and completed the AISSCE Certification in
PCMCs group from Kendriya Vidyalaya R.D.S.O Lucknow in the year 2010.He is a
dignified member of IAEng (International Association of Engineers, Hong Kong). He is
a Life Time Member and one of the STUDENT AMBASSADORS of International
Association of Engineering and Technology for Skill Development (IAETSD) India, his
paper has already been published in IJMER 2014. His research interests includes Web
Security, Big Data, Cloud Virtualization, Networking, Data Mining, Ad-hoc Networks and
Applied Computing.
C.Jawahar Sandeep is currently pursuing his B.Tech degree in Computer Science and Engineering from SRM
University, Chennai Tamil Nadu, India, and completed the AISSCE Certification from
PSBB Senior Secondary School. His research interests includes Artificial Intelligence,
Database Management, Network Security, Information Systems, Wireless Networks and
Cloud Computing.

More Related Content

PDF
Power Optimization Technique for Sensor Network
PDF
Energy efficient protocol with static clustering (eepsc) comparing with low e...
PDF
G010214954
PDF
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
PPTX
Energy efficient node deployment for target coverage in wireless sensor network
PDF
De31486489
PDF
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
Power Optimization Technique for Sensor Network
Energy efficient protocol with static clustering (eepsc) comparing with low e...
G010214954
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
Energy efficient node deployment for target coverage in wireless sensor network
De31486489
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...

What's hot (18)

PDF
Energy aware clustering protocol (eacp)
PDF
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
PDF
O4102103111
PDF
Iisrt divya nagaraj (networks)
PDF
A Novel Routing Algorithm for Wireless Sensor Network Using Particle Swarm O...
PPTX
Wireless sensor network lifetime constraints
PDF
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
PDF
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
PDF
Secured Data Aggregation using SRL Protocol for Wireless Sensor Networks
PDF
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
PDF
Wireless sensor network lifetime constraints
PDF
Application of Weighted Centroid Approach in Base Station Localization for Mi...
PPT
Kianoosh&sajjad
PDF
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
PDF
Ca mwsn clustering algorithm for mobile wireless senor network [
PDF
Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...
PDF
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
Energy aware clustering protocol (eacp)
Energy Efficient Data Transmission through Relay Nodes in Wireless Sensor Net...
O4102103111
Iisrt divya nagaraj (networks)
A Novel Routing Algorithm for Wireless Sensor Network Using Particle Swarm O...
Wireless sensor network lifetime constraints
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
Secured Data Aggregation using SRL Protocol for Wireless Sensor Networks
PERFORMANCE ANALYSIS OF CHANNEL ACCESS MODEL FOR MAC IN RANDOMLY DISTRIBUTED ...
Wireless sensor network lifetime constraints
Application of Weighted Centroid Approach in Base Station Localization for Mi...
Kianoosh&sajjad
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Ca mwsn clustering algorithm for mobile wireless senor network [
Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
Ad

Viewers also liked (20)

PDF
L018118083.new ramya publication (1)
PDF
C0121216
PDF
L011117884
PDF
B012640917
PDF
G012645256.iosr jmce p1
PDF
H012526874
PDF
H012656672
PDF
Weyl's Theorem for Algebraically Totally K - Quasi – Paranormal Operators
PDF
Studies On The Effectiveness of Mixed Diet of Garden Egg, Groundnut And Garli...
PDF
G012624347
PDF
G012114753
PDF
N1803017478
PDF
G1802044855
PDF
K012327284
PDF
A018210109
PDF
B010521318
PDF
L0947075
PDF
Advancing Statistical Education using Technology and Mobile Devices
PDF
Chained Commutative Ternary Semigroups
PDF
Survey on Restful Web Services Using Open Authorization (Oauth)I01545356
L018118083.new ramya publication (1)
C0121216
L011117884
B012640917
G012645256.iosr jmce p1
H012526874
H012656672
Weyl's Theorem for Algebraically Totally K - Quasi – Paranormal Operators
Studies On The Effectiveness of Mixed Diet of Garden Egg, Groundnut And Garli...
G012624347
G012114753
N1803017478
G1802044855
K012327284
A018210109
B010521318
L0947075
Advancing Statistical Education using Technology and Mobile Devices
Chained Commutative Ternary Semigroups
Survey on Restful Web Services Using Open Authorization (Oauth)I01545356
Ad

Similar to Wireless Sensor Grids Energy Efficiency Enrichment Using Quorum Techniques (20)

PDF
PDF
Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...
PPTX
Wsn ppt original
PDF
International Journal of Engineering Inventions (IJEI)
PDF
E044033136
PDF
A Literature Survey on Energy Efficient MAC Protocols For WSN
PDF
01306496
PDF
[IJET-V1I3P13] Authors :Aishwarya Manjunath, Shreenath K N, Dr. Srinivasa K G.
DOC
Synchronous mac protocol study
PDF
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
PDF
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
PDF
ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEY
PPT
PROGRESS 1& 2.ppt
PDF
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
PDF
Energy efficient mac protocols for wireless sensor network
PDF
T tmac energy aware sensor mac protocol for
PDF
Ijcnc050207
DOCX
Secure And Efficient Defense Strategy Against Energy Exhausting Attacks In Wsn
PPTX
1-4_Kwak-WBAN MAC Issues1.pptx
PDF
Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...
Wsn ppt original
International Journal of Engineering Inventions (IJEI)
E044033136
A Literature Survey on Energy Efficient MAC Protocols For WSN
01306496
[IJET-V1I3P13] Authors :Aishwarya Manjunath, Shreenath K N, Dr. Srinivasa K G.
Synchronous mac protocol study
Ijaems apr-2016-22TDMA- MAC Protocol based Energy- Potency for Periodic Sensi...
Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Ne...
ENERGY EFFICIENT MAC PROTOCOLS FOR WIRELESS SENSOR NETWORK: A SURVEY
PROGRESS 1& 2.ppt
Comparison of Csma Based MAC Protocols of Wireless Sensor Networks
Energy efficient mac protocols for wireless sensor network
T tmac energy aware sensor mac protocol for
Ijcnc050207
Secure And Efficient Defense Strategy Against Energy Exhausting Attacks In Wsn
1-4_Kwak-WBAN MAC Issues1.pptx

More from IOSR Journals (20)

PDF
A011140104
PDF
M0111397100
PDF
L011138596
PDF
K011138084
PDF
J011137479
PDF
I011136673
PDF
G011134454
PDF
H011135565
PDF
F011134043
PDF
E011133639
PDF
D011132635
PDF
C011131925
PDF
B011130918
PDF
A011130108
PDF
I011125160
PDF
H011124050
PDF
G011123539
PDF
F011123134
PDF
E011122530
PDF
D011121524
A011140104
M0111397100
L011138596
K011138084
J011137479
I011136673
G011134454
H011135565
F011134043
E011133639
D011132635
C011131925
B011130918
A011130108
I011125160
H011124050
G011123539
F011123134
E011122530
D011121524

Recently uploaded (20)

PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
additive manufacturing of ss316l using mig welding
PDF
Digital Logic Computer Design lecture notes
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Lecture Notes Electrical Wiring System Components
DOCX
573137875-Attendance-Management-System-original
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
web development for engineering and engineering
PPT
Project quality management in manufacturing
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
CH1 Production IntroductoryConcepts.pptx
UNIT-1 - COAL BASED THERMAL POWER PLANTS
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
additive manufacturing of ss316l using mig welding
Digital Logic Computer Design lecture notes
Model Code of Practice - Construction Work - 21102022 .pdf
CYBER-CRIMES AND SECURITY A guide to understanding
Foundation to blockchain - A guide to Blockchain Tech
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Lecture Notes Electrical Wiring System Components
573137875-Attendance-Management-System-original
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Strings in CPP - Strings in C++ are sequences of characters used to store and...
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
web development for engineering and engineering
Project quality management in manufacturing
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...

Wireless Sensor Grids Energy Efficiency Enrichment Using Quorum Techniques

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. VI (Jan – Feb. 2015), PP 44-48 www.iosrjournals.org DOI: 10.9790/0661-17164448 www.iosrjournals.org 44 | Page Wireless Sensor Grids Energy Efficiency Enrichment Using Quorum Techniques Manas Srivastava1 , C.Jawahar Sandeep2 1 (Computer Science and Engineering, SRM University, India) 2 (Computer Science and Engineering, SRM University, India) Abstract: Wireless sensor networks are mainly considered for atmosphere reconnaissance, wherein wireless sensor nodes collaborate to get their work done. Generally, wireless sensors are battery powered; therefore, it is crucial for them to efficiently use their battery resources. Most of the existing power-saving protocols achieve power savings by periodically putting sensor nodes to sleep. Such a regular sleep/awake mechanism f a i l s to adjust a sensor node’s snooze period based on its traffic congestion, thus causing either inferior power efficacy or higher latency. Furthermore, sensors may be positioned in antagonistic atmospheres and may thus surprisingly fail. Most power-saving protocols do not promptly react to such link breakage, resulting in long transmission delays. This paper, proposes a quorum-based medium access control (QMAC) protocol that enables sensor nodes to snooze longer under light loads. As the flow is towards the sink node i.e., the next-hop group, is also proposed to reduce transmission latency. Results authenticate that the planned QMAC hoards more energy and keeps the communication potential low. Keywords: QMAC, Quorums, Latency I. Introduction WIRELESS sensor networks have lately attracted plenty of attention. A lot of potential applications for WSNs are bein g discussed. Such a grid normally consists of a huge number of scattered nodes that unify themselves into a multi-hop wireless system. Each node has one or more sensors, implanted processors and low- power receivers, and is normally battery functioned. Typically, it is the coor dination to perform a common task. Efficacy of MAC protocol can be achieved in many ways. The first is the energy efficiency. As stated above, feeler nodes are likely to be battery-operated, and it is often very tough to modify or revive batteries for the l i n k a g e s. In fact, someday we expect some nodes to be discarded rather than recharged. Protracting network lifetime for these nodes is a precarious concern. Another vital characteristic is the scalability to the modification in network scope, node thickness and topology. These nodes, which are normally installed in an ad hoc routine, function in a distributed way and coordinate with each other to fulfill a common task. In wireless sensor applications where all sensor nodes constantly report data to a single sink node sensor nodes that are nearer to the sink drain their power faster. This is referred to as the energy-hole problem. To solve this, node deployment protocols try to distribute more nodes around the sink. However, due to environment limits, sometimes, only uniform (random) node distribution is possible. In such situations, node-deployment conventions are unable to elongate the network period. One way of elongating the network period is by designing energy- efficient MAC protocols. Since idle listening has been identified as a vital cause for energy depletion, numerous suggestions were made to reduce the time a sensor node spends in idle listening. Some required time synchronization among sensor nodes. Since time management is crucial for numerous sensor applications, it is natural for a synchronous MAC protocol to be used to conserve energy. Generally, synchronous proprieties preserve a plan that specifies when a sensor should be conscious to check communication bustle. II. Related Work S-MAC is a cluster-based protocol, basically it works in as for the intermittently sending nodal devices to snooze if They are not involved in any type of to and fro communication. In that scenario we can say that the particular perception is quite similar to the methodology used in the IEEE 802.11 power-saving mode, where each node awakens up at the commencement of each ideal interval to check if it needs to persist vigorous state. In S-MAC, nodes exchange synchronization and schedule information with their nodes that are in between to each other and thus with the corresponding trailing nodes that are connected. Nodes that follow to the similar agenda form a virtual cluster. A node that receives two different schedules tails together. Now such a case, this node belongs to two different virtual clusters. The authors also introduce adaptive listening to reduce latency if a clear to send (CTS) is Overheard, sensor nodes can briefly wake up at the demise of the communication signal to the next hop by keeping the duty cycle low, S-MAC reduces each sensor node’s power consumption. DMAC is another run-through that practices an adaptive liability phase.
  • 2. Wireless Sensor Grids Energy Efficiency Enrichment Using Quorum Techniques DOI: 10.9790/0661-17164448 www.iosrjournals.org 45 | Page Thus in that concept we can say that each and every module length has been able to identify the various other segmentations. However, similar to S-MAC and T-MAC, the only disadvantage of DMAC is that the nodal grids needs to waken up at every cycle. Energy Efficiency is decreased since light loaded node may continue to be in idle state in most cycles. PMAC provides another way to schedule the listening period. Each sensor node individually determines it’s sleep/awake pattern according to its own traffic condition. Thus pattern generation of the nodal device with more data generates a pattern having high awake periods. This pattern indicates the node’s intention, i.e., whether it will sleep or not at each time slot. The actual sleep and awake schedule for each sensor node is developed based on its own pattern and those of its neighbors. PMAC familiarizes a method depending on the traffic conditions that uniquely build schedules centered on the grids. The hitch of this procedure is that the mechanism relies totally on the pattern interactions of the nodal devices with in term to the grids. The interactions of the two nodes are only possible if one of the node receives the schedule correctly. Thus, it gives idlee listening but transmissions are wasted, same is in PMAC it also suffers transmission delay. B-MAC is an asynchronous mechanism that uses inferior control snooping and to achieve low-power operation. To dependably communicate data, a sender sends a preamble that is long enough to notify the receiver. For example, if the receiver checks the channel every 20 mms, the preamble must be at least 20 mms long. Once the preface is recognized, the receiver will stay conscious to receive the packet. Compared with synchronous solutions, the extended preamble in B-MAC produces excess energy consumption. Aside from this, after sensing a preface, substantial energy waste is also found in non-target nodes since they have to stay conscious until the end of the prelude to check the ones being targeted. X-MAC is an enhancement over B- MAC. B-MAC is replaced by a series of short prologue packets in X-MAC, which are illustrious by small breaks. The intermissions enable the goal host to end the preface earlier by transporting an early key value. Each short preface contains a target address, which alleviates the energy-wastage lieu of the particular target area that has been specified in reference to column group but still preamble packets reduce delay and energy wastage when compared with as in for B-MAC more packets are sent for the particular data shift. 2.1 Problem Statement Existing solutions for the energy-hole problem are dependent on proper node distribution strategies. However, these protocols function in vain in environments where planned node deployment is non executable. Thus in such terminologies, since network lifetime extension is still necessary, other power-saving protocols (such as S-MAC, T- MAC, DMAC, or PMAC) should be applied. One of the problems of sensor nodes running S-MAC, T-MAC, or DMAC is that they have to wake up at every time frame to check if there is pending traffic. Nodes dependent and thus closer to the sink is thereby established with the priority of that which are closer to the sink can be said as to heavily loaded and thus the next one are not prioritize to it with the possible sink space and the which are not nearer to sink is thus can be described as weak ones . 2.2 Quorum Concept And Wake-Up Schedule A quorum is a demand set functioning with the controls that are measurable if the assigned by the user. By Default non empty set bisections are present in it, the arrangement can be done as the majority-based quorum, the tree-based quorum, the grid-based quorum, and others. As in for this a set of quorum must awake at the time frames set for the sensor nodes. In case of non-quorum time frames, linkage units remain in the snooze node to save energy. Efficacy is that any two quorums can set up at any time. Energy efficacy method i.e. quorum .Now in that, one row and one column are picked in a k × k grid as a quorum set. This concept is shown in Fig. 3. Host I picks row IA and column Ja as its quorum, while host J picks row Ib and column Jb. There are two intersections between hosts I and J: one for Ia and Jb and the other for Ia and Jb. As mentioned earlier, sensor nodes must wake up at their chosen quorums. Thus at the intersection points both the node will wake up. The main aim of the QMAC protocol is to reduce the Energy consumption and fix the snooze frequency of the nodal device. Nodal device automatically selects one row and one columns dependent on the particular set. Considering for energy saving awakening frames can be reduced, before that we use the set to distinguish time frames with the nodal device node must wake up. Nevertheless, through these wake-up time mounts, a sensor node does not always stay conscious for the entire time frame. A sensor node can go to snooze whenever it identifies that another communication that it is not involved in is galvanized. Moreover, a sensor node will go to snooze if the channel is idle for period of Td. In this paper, the value of Td is set to one fifth of the length of a time mount. Nodes using an n × n grid will rouse up 2n – 1 out of n2 time frames. Because they have heftier traffic, sensor nodes located in the inner haloes can use a smaller grid. As in for the nodal devices located particularly in the outer corner can thus made available in the context to that they are having superior grid , thus selecting the various grid sizes based on each nodal sensor and the particular traffic load, QMAC resolves the snooze problem. Important is that the nodal sensor actually uses different sizes of the quorums ad thus success is definite. Thereby the level of viability is higher in WSN, which tends that QMAC will be
  • 3. Wireless Sensor Grids Energy Efficiency Enrichment Using Quorum Techniques DOI: 10.9790/0661-17164448 www.iosrjournals.org 46 | Page favorable. It won’t go in to the snooze mode until and unless there is an unresolved traffic whether the quorum is existing or not. III. Indentatons And Equations A sensor node that is in an inner corona has more traffic because, aside from its own traffic, it has to relay traffic from nodes in outer coronas. Thus calculative approach to determine the traffic load outer curve s thereby processed which contains an inner node in it. Thus QMAC using a four-corona network, as shown in Fig. 1. In that he fraction value can thus be made as in for C1: C2: C3: C4 is 1: 3: 5: 7.1 this means that, on the average, a node in C3 is responsible for relaying traffic for the particular time. 7/5 nodes in C4, a node in C2 is responsible for 5/3 nodes in C3, and a node in C1 will take care of three nodes in C2. Assuming that each node generates one unit of traffic for each reporting, the sensor nodes in C4 only have their own traffic to deliver; thus, their traffic load is one Aside from their own traffic, sensor nodes in C3 have to forward traffic from C4. Each node in C3 is responsible for 7/5 nodes in C4; thus, the traffic load in C3 is 1 + (7/5) × 1 = 2.4. Similarly, nodes in C2 and C1 have traffic loads of 1 + (5/3) × 2.4 = 5 and 1 + 3 × 5=16 respectively. On a sensor node’s traffic load. If sensor nodes in C1 use a 2 ×2 grid, then their ratio of wake-up time frames is 0.75. According to the ratio of traffic loads for different coronas (C1: C2: C3: C4 = 16: 5: 2.4: 1), the ratio of wake-up time frames for the sensor nodes in C2, C3, and C4 should be0.234, 0.112, and 0.047, respectively. This indicates that the quorum sizes used by C2, C3, and C4 should be 8 × 8, 17 ×17, and 42 × 42, respectively. In general, in a network where Sensor nodes generate the same amount of traffic, the traffic load for sensor nodes in Ci can be denoted by Tick and calculated by:- C1:C2:C3:C4 = 1:3:5:7 (1) Tick = 1+|Ci+1| (2) |Ci|× TCi+1 (3) 1) Time is divided into a series of time frames. 2) All linkage units are time synchronized. 3) Each node has a unique ID. 4) Let us suppose that all the nodal devices are arranged in such a manner that the curve node is visible. It is thus partitioned into same width coronas with reference to the jump count in to the sink node as shown in Fig. 1. To create the coronas, a control packet .entwine with a field jump count = 1 is sent to the network initialization Phase through the sink node. At receivable of the packet each nodal edge increases the jump count field by one and then rebroadcasts the packet. A node belongs to corona Ci if it receives a .net_INIT with jumpcount = i. If multiple net_INIT packets are received, only the one with the lowest jumpcount value is handled. Sensor nodes in corona Ci are I jumps away from the region of interest. It is then communicated with the devices. 6) All sensor nodes have the same transmission range. 7) Nodes are stationary after deployment. IV. Figures And Tables
  • 4. Wireless Sensor Grids Energy Efficiency Enrichment Using Quorum Techniques DOI: 10.9790/0661-17164448 www.iosrjournals.org 47 | Page V. Conclusion Energy conservation is crucial in WSNs. Typically, sensor nodes closer to the sink run out of energy faster. Most previous solutions have tried to deploy more nodes around the sink. This paper focused on an environment where planned deployment is difficult and also proposed a new energy- conserving MAC protocol. Realizing that sensor nodes have different loads due to their different distances to the sink, applied the concept of quorum to enable sensor nodes to adjust their sleep durations based on their traffic loads. To reduce delays induced by longer sleep durations, have increased each node’s transmission opportunity by enabling a group of next-hop nodes to accomplish the packet-relaying job. The downside of this method is the additional hop information transmissions. Another way is to allow the sink to estimate the total number of coronas and then broadcast it to all sensor nodes (through the NET_INIT packet). This method reduces the number of control packets, although at the expense of accuracy. However, if the network size is known and each node’s transmission range is stable, we can consider the estimation to be quite accurate. References Journal Papers: [1]. Geetha V, K.Chandrasekaran, A Distributed Trust Based Secure Communication Framework for Wireless Sensor Networks, Scientific Research An Academic Publisher/Wireless Sensors Network. [2]. Mekkaoui Kheireddine, Rahmoun Abdellatif, Analysis Of Hops Length in Wireless Sensor Networks, Scientific Research An Academic Publisher/Wireless Sensors Network. Books: [3]. Waltenegus Dargie, Christian Poellabauer, Fundamentals of Wireless Sensor Networks (Wiley Publications ISBN-13 978- 0470997659, ISBN-10 04070997656 [4]. Robert Faludi, Building Wireless Sensors Networks (O’Reilly Media Print ISBN 978-0-596-80773-3) [5]. Massimo Vecchio, Wireless Sensor Networks: Novel approaches to distributed data aggregation and compression (Vdm Verlag Publishers ISBN – 10 3639039998 [6]. Holger Karl, Andreas Willig, Protocols and Architectures for Wireless Sensor Networks (Wiley Publications ISBN – 10: 0470095105 ISBN –13: 978-0470095102 [7]. Suraiya Tarannum, Wireless Sensors Networks (IN-TECH Publishers, ISBN-13 978-953-307-325-5) [8]. I. Stojmenovic, "Location updates for efficient routing in wireless networks," in: Handbook on Wireless Networks and Mobile Computing, Wiley, 2002, 451-47 Proceeding Papers: [9]. Proceedings of the Distributed Sensor Nets Workshop, 1978:Dept. Computer. Science, Carnegie Mellon University. [8] R. F. Sproull and D. Cohen,”High-level protocols", Proc. IEEE, vol. 66, pp.1371 -1386 1978 [10]. Dai, S, Jing, X, and Li, L, "Research and analysis on routing protocols for wireless sensor networks", Proc. International Conference on Communications, Circuits and Systems, Volume 1, 27-30 May, 2005, pp. 407-411 [11]. Jolly, G., Kuscu, M.C., Kokate, P., and Younis, M., "A Low-Energy Key Management Protocol for Wireless Sensor Networks", Proc. Eighth IEEE International Symposium on Computers and Communication, 2003. (ISCC 2003). vol.1, pp. 335 - 340. [12]. L. Doherty, K. S. Pister, and L. E. Ghaoui. Convex optimization methods for sensor node position estimation. In Proceedings of INFOCOM'01, 2001. [13]. J. Heidemann, F. Silva, C. Intanagonwiwat, R. Govindan, D. Estrin and D. Ganesan "Building efficient wireless sensor networks with low- level naming", Proceedings of the Symposium on Operating Systems Principles, Lake Louise, Banff, Canada, Oct. 2001 [14]. W.R. Heinzelman, A. Chandrakasan and H. Balakrishnan”Energy-efficient communication protocols for wireless microsensor networks", Proceedings of the Hawaii International Conference on Systems Science, Jan. 2000 [15]. L. Hu and D. Evans. Secure aggregation for wireless networks. In Workshop on Security and Assurance in Ad Hoc Networks, January 2003.
  • 5. Wireless Sensor Grids Energy Efficiency Enrichment Using Quorum Techniques DOI: 10.9790/0661-17164448 www.iosrjournals.org 48 | Page [16]. Y. Hu, A. Perrig, and D. Johnson. Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In Proceedings of INFOCOM 2003, April 2003 [17]. C. Karlof and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. In Proceedings of 1st IEEE International Workshop on Sensor Network Protocols and Applications, May 2003. [18]. D. Niculescu and B. Nath. Ad hoc positioning system (APS). In Proceedings of IEEE GLOBECOM '01, 2001. [19]. I. Stojmenovic, M. Russell, and B. Vukojevic, "Depth first search and location based localized routing and QoS routing in wireless networks," IEEE Int. Conf. Parallel Proc., Aug. 2000, 173-180. [20]. J. B. Tchakarov and N.H. Vaidya, "Efficient content location in mobile ad hoc networks," IEEE Int. Conf. on Mobile Data Management MDM, 2004. [21]. S. Desilva and S.R. Das, "Experimental Evaluation of a Wireless Ad Hoc Network," Proc. Ninth Int', l Conf. Computer Comm. And Networks (IC3N), Oct. 2000. About Author Manas Srivastava is currently pursuing his B.Tech degree in Computer Science and Engineering from SRM University, Chennai Tamil Nadu, India, and completed the AISSCE Certification in PCMCs group from Kendriya Vidyalaya R.D.S.O Lucknow in the year 2010.He is a dignified member of IAEng (International Association of Engineers, Hong Kong). He is a Life Time Member and one of the STUDENT AMBASSADORS of International Association of Engineering and Technology for Skill Development (IAETSD) India, his paper has already been published in IJMER 2014. His research interests includes Web Security, Big Data, Cloud Virtualization, Networking, Data Mining, Ad-hoc Networks and Applied Computing. C.Jawahar Sandeep is currently pursuing his B.Tech degree in Computer Science and Engineering from SRM University, Chennai Tamil Nadu, India, and completed the AISSCE Certification from PSBB Senior Secondary School. His research interests includes Artificial Intelligence, Database Management, Network Security, Information Systems, Wireless Networks and Cloud Computing.