0% found this document useful (0 votes)
63 views8 pages

2018 - Cross Layer Approach Formobile WSN

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views8 pages

2018 - Cross Layer Approach Formobile WSN

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

© 2018 IJSRST | Volume 4 | Issue 8 | Print ISSN: 2395-6011 | Online ISSN: 2395-602X

Themed Section: Science and Technology

A Cross Layer Approach Network Evaluation of IEEE 802.15.4


for Mobile WSN
Sheetal Kadu1, Dr. Pankaj Agrawal2
1Student , Department of Electronics and Comm. Engg., G. H. R.A.E.T., Nagpur, India

2 H.O.D., Department of Electronics and Comm. Engg., G. H. R.A.E.T., Nagpur, India

ABSTRACT

Mobility in wireless sensor networks (WSNs), can have profound effect on the network operation.This effect is
diverse according to several parameters that include: application diversity, network topography (topology),
network connectivity and deployed node(s) or sensed event(s) location estimation. One major finding is that
these networks suffer from control packet overhead anddelivery ratio degradation. This increases the network‟s
energy consumption. This work introduces a cross-layer operation model that can improve the energy
consumption and system throughput of IEEE 802.15.4 MWSNs. The proposed model integrates four layers in
the network operation: 1) application (node location); 2) network (routing); 3) medium access control (MAC);
and 4) physical layers. The model employs a mechanism tominimize the neighbor discovery broadcasts to the
active routesonly. Reducing control packet broadcasts between the nodesreduces the network‟s consumed
energy. It also decreases theoccupation period of the wireless channel. The model operationleads the network
to consume less energy while maintaining thenetwork packet delivery ratio. Simulations have been carried out
to check the efficacy of the proposed operation model .

I. INTRODUCTION activity monitoring, cattle monitoring, swarm


bot actuated networks and more.
A mobile wireless sensor network (MWSN) can 2. Topography and network connectivity: Since
simply be defined as a wireless sensor network (WSN) WSNs transfer their data in a multi-hop fashion,
in which the sensor nodes are mobile. Sensor node mobility can enhance the network operation by
mobility can be divided into two categories: limited changing the location of the nodes leading to
mobility where there are specific nodes that roam create different links to the destination required.
around the network to perform an exclusive task (e.g., 3. If mobility is limited to special nodes, e.g., sink
mobile sink nodes) and random mobility where the node(s), the stationary nodes then can be
nodes (sensor nodes) roam around the area of relieved in terms of links generated to the
deployment to collect the data needed for the destination node. The sink node(s) can roam
application. Mobility as a problem has either around through stationary nodes and gather the
advantageous effects or disadvantageous ones. information sensed by sensor nodes. Mobile sink
Advantages of introducing mobility to the network nodes can also enhance the network
can belisted as below: connectivity by minimizing the congestion that
1. Applications: Introducing mobility to the can happen during network traffic flow.
network can enlarge the scope of applications to
implement WSNs.Applications such as social

IJSRST184861 | Received : 10 May 2018| Accepted : 25 May 2018 | May-June-2018 [ 4 (8) : 232-239]
232
et al. Int J S Res Sci. Tech. 2018 May-June;4(8) : 232-239

Mobility can introduce a critical challenge to the minimize the neighbor discovery broadcasts to the
operation of the deployed network: active routes only. The model operation leads the
network to consume less energy while maintaining
1. If mobility is limited to special node(s), then those the network packet delivery ratio
nodes can suffer from a bottleneck problem. A
considerable plan and calculations are required to II. LITERATURE SURVEY
estimate the optimum number and paths for the
special node(s) to cover the deployed network. DD Chaudhary in his work “A new dynamic energy
2. If mobility is random. i.e., sensor nodes are also efficient latency improving protocol for wireless
mobile in the network, the effect is greater as the sensor networks” has explored the concept of distance
network topology changes become rapid and that metric based routing protocol approach for „high
affects the connectivity of the nodes. Topology energy efficiency‟ and „shortest path selection‟ for
changes have an effect on the routing operation as the latency improvement. The proposed new protocol is
links need to be rebuilt frequently; therefore, there is „Dynamic Energy Efficient Latency Improving
an increase energy consumption of the nodes. Protocol (DEELIP). The simulation results are
Mobility affects the MAC protocol operation because compared with „AODV‟ routing protocol. It is
the connectivity can suffer from broken connections observed that in proposed protocol; the overhead of
due to the transmission range of the wireless interface. the network traffic is reduced, resulting in
The location of the sensor node(s) in random mobility improvement of energy efficiency and latency than
is of importance because the sensed event is attached existing routing protocols.
to the location of the sensor node. In a mobile
scenario, a localization mechanism becomes a G Anastasi et al in their work “A comprehensive
frequent operation leading to an increment in node(s) analysis of the MAC unreliability problem in IEEE
energy consumption. 802.15.4 wireless sensor networks “has focused on
IEEE 802.15.4 WSNs and show that they can suffer
The focus of this paper is the random mobility of the from a serious unreliability problem. They have
deployed sensor nodes and how it has effects on the carried out an extensive analysis based on both
networks operation in terms of the connectivity and simulation and experiments on a real WSN to
location estimation of the nodes. The connectivity investigate the fundamental reasons of this problem,
issue is dealt with by using routing protocols and and have found that it is caused by the contention-
MAC protocols as both layers are responsible of based MAC protocol used for channel access and its
insuring an available connection between one hop and default parameter values. They also concluded that,
another. The location information is an application with a more appropriate MAC parameters setting, it is
layer attachment; however, it requires a specific possible to mitigate the problem and achieve a
mechanism to estimate the location of the mobile delivery ratio up to 100%, at least in the scenarios
node(s). This paper introduces a cross-layer operation considered in this paper. However, this improvement
model that can improve the energy consumption and in communication reliability is achieved at the cost of
system throughput of IEEE 802.15.4 MWSNs. The an increased latency, which may not be acceptable for
proposed model integrates four layers in the network industrial applications with stringent timing
operation: 1) application (node location); 2) network requirements.
(routing); 3) medium access control (MAC); and 4)
physical layers. The model employs a mechanism to

International Journal of Scientific Research in Science and Technology (www.ijsrst.com) 233


et al. Int J S Res Sci. Tech. 2018 May-June;4(8) : 232-239

L Karim et al in their work “ Reliable location-aware In the existing systems a self-adaptive sleep/wake-up
routing protocol for mobile wireless sensor network” scheduling approach used , which takes both energy
have proposed a location-aware and fault tolerant saving and packet delivery delay into account. This
clustering protocol for mobile WSN (LFCP-MWSN) approach is an asynchronous one and it does not use
that is not only energy efficient but also reliable. the technique of duty cycling. Thus, the trade-off
LFCP-MWSN also incorporates a simple range free between energy saving and packet delivery delay can
approach to localize sensor nodes during cluster be avoided. In most existing duty cycling based
formation and every time a sensor moves into another sleep/wake-up scheduling approaches, the time axis is
cluster. Simulation results show that LFCP-MWSN divided into periods, each of which consists of several
protocol has about 25-30% less energy consumptions time slots. In each period, nodes adjust their sleep and
and slightly less end-to-end data transmission delay wake up time, i.e., adjusting the duty cycle, where
than the existing LEACH-Mobile and LEACH- each node keeps awake in some time slots while sleeps
Mobile-Enhanced protocols. in other time slots.

On the basis of literature survey carried out we The existing systems suffer from Data loss , reduced
observe that these networks suffer from control network life time, premature node failure
packet overhead and delivery ratio degradation. This
increases the network‟s energy consumption. Mobility Thus the objective of our work is to improve the
can introduce a critical challenge to the operation of energy consumption and system throughput of IEEE
the deployed network. If mobility is limited to special 802.15.4 mobile wireless sensor network while
node(s), then those nodes can suffer from a bottleneck minimizing the power utilized by the network. The
problem. A considerable plan and calculations are focus is to reduce control packet broadcasts between
required to estimate the optimum number and paths the nodes for reducing the network‟s consumed
for the special node(s) to cover the deployed network. energy and simultaneously decreasing the data
If mobility is random. i.e., sensor nodes are also transmission time resulting in high speed
mobile in the network, the effect is greater as the communication
network topology changes become rapid and that
affects the connectivity of the nodes. Topology III. PROPOSED SYSTEM AND ITS METHODOLOGY
changes have an effect on the routing operation as the
links need to be rebuilt frequently; therefore, there is In the proposed algorithm, nodes instead of
an increase energy consumption of the nodes. forwarding the packets to all the encountered
Mobility affects the MAC protocol operation because neighboring nodes, select only the appropriate node
the connectivity can suffer from broken connections and the selection of appropriate node is based on the
due to the transmission range of the wireless interface. distance and energy level. Firstly, only the
The location of the sensor node(s) in random mobility neighboring nodes having distance less than neighbor
is of importance because the sensed event is attached discovery range are considered as neighboring nodes
to the location of the sensor node. In a mobile and the neighboring nodes are filtered by calculating
scenario, a localization mechanism becomes a the distance to destination. Nodes which have
frequent operation leading to an increment in node(s) distance less than average distance are selected as
energy consumption. neighboring nodes. Thus this method presents a
routing mechanism which aims at reducing energy
consumption in the network which is accomplished

International Journal of Scientific Research in Science and Technology (www.ijsrst.com) 234


et al. Int J S Res Sci. Tech. 2018 May-June;4(8) : 232-239

by avoiding broadcasting of messages to all the establish a route to the destination node. The routing
neighboring nodes thus reducing the number of protocol utilized in the operation model utilizes a
transmissions in the network. For proposed system periodic neighbor maintenance message which is a
Network life time will be high when compare with hello packet. Hello packets are broadcast packets;
existing system with reduced energy consumption therefore, it was possible to utilize the neighbor list
and low packet loss. At the same time the throughput from the network layer in the data-link layer. This
is high with high packet delivery ratio and low delay eliminated the need for neighbor discovery messages
.The overall system gets more secured and avoids to be sent by the MAC protocol.
dummy traffic.
After the destination node received the RREQ packets,
it replied by sending a unicast route reply (RREP)
packet. The destination node embedded its own
location information in the RREP message and sent it
back to the next hop node in the reverse route. The
next hop node in the reverse route calculated the
distance between it and the destination node and
exported this information to the data-link layer. The
MAC protocol utilized the transmission power
control-based on the distance information and
Figure 1. The flow diagram of the proposed system calculated the required power to use when sending
data packets back to the destination node. The
transmission power and range is calculated by
implementing the radio propagation model according
to the distance calculated by the nodes. The distance
between two nodes is calculated as the Euclidian
distance between two points. This operation was
repeated through all nodes until the source node.

Figure 2. Operation model detailed process diagram

At network initialization, the mobile node started to


broadcast a neighbor discovery message to initiate
neighbor(s) information collection and store it in a Figure 3. Network activity state at time stamp ts
neighbors‟ list (NB-List). After the initialization
process, if a node in the network had data of interest IV. RESULT AND DISCUSSION
to send, attached with this data was the location
 The simulation work has been done with the
information of the mobile node. This node then
Network Simulator ns-2, Version 2.34.
started sending route request (RREQ) packets to

International Journal of Scientific Research in Science and Technology (www.ijsrst.com) 235


et al. Int J S Res Sci. Tech. 2018 May-June;4(8) : 232-239

 Network formation is an aspect of creating (RREP) packet originated either by the


nodes of network and transmit data. destination itself or any other intermediate
 Network of 100 nodes is created using node that has a current route to the
network simulator for wireless sensor network. destination.

Figure 4. Method of Node formation


Figure 6. showing created nodes the distances
between them.

Figure 5. showing the created nodes


Figure 7. showing the neighbour discovery

NEIGHBOR DISCOVERY
 On-demand reactive routing protocol that
uses routing tables with one entry per
destination.
 When a source node needs to find a route to a
destination, it starts a route discovery process,
based on flooding, to locate the destination
node.
 Upon receiving a route request (RREQ) packet,
intermediate nodes update their routing tables
for a reverse route to the source.
 Similarly, the forward route to the destination
is updated upon reception of a route reply Figure 8. showing the fitness function

International Journal of Scientific Research in Science and Technology (www.ijsrst.com) 236


et al. Int J S Res Sci. Tech. 2018 May-June;4(8) : 232-239

OPTIMAL PATH FINDING


 Optimal Path Finder Algorithm is an
optimization algorithm used in the proposed
method for constructing an optimal path for
transmitting the sensed data to the Destination.
 The node which has the data to transmit is
called source node.
 Such node checks for the next best hop to
transmit the sensed data towards the destination.
Figure 11. showing Delay by the nodes
 For finding the next best hop, a route_request
message is sent to all the neighbors.
 Route request send to all intermediate nodes
between source S and destination D.

SCREENSHOT FOR OPTIMAL PATH FINDING

Figure 12. showing the Throughput carried in the


network out by the nodes in network.

From figure 12 we can make an observation that the


delay exhibited by the proposed system is around 0.62
ns as compared to the delay exhibited by the existing
Figure 9. showing the optimal path finder in system which is around 7 ns .Thus the proposed
FFAOMDV Protocol in MANET. system scores over the existing system. Similarly for
figure 4.8 we observe that the throughput of the
proposed system is around 4600 bps as compared to
the throughput of the existing system which is around
4300.

Figure 10. showing the communication in the Figure 13. showing the ratio of Packet Delivery
FFAOMDV Protocol in MANET between nodes in the network.

International Journal of Scientific Research in Science and Technology (www.ijsrst.com) 237


et al. Int J S Res Sci. Tech. 2018 May-June;4(8) : 232-239

performance metrics (Packet delivery ratio,


Throughput, End-to-end-delay, Energy consumption
and Network lifetime) and the Simulation results
shows that the proposed FF-AOMDV algorithm has
performed much better than both AOMR-LM and
AOMDV in throughput, packet delivery ratio and
end-to-end delay and It also performed well against
AOMDV for conserving more energy and better
Figure 14. indicating Network Lifetime in the network lifetime.
FFAOMDV protocol
VI. REFERENCES
From figure 4.9 we can make an observation that the
packet delivery ratio for 100 nodes of the proposed [1]. M. Cattani, S. Guna, and G. P. Picco, "Group
system is around 95 % as compared to the packet monitoring in mobile wireless sensor networks,"
delivery ratio for 100 nodes of the existing system in Proc. Int. Conf. Distrib. Comput. SensorSyst.
which is around 87 %. Similarly for figure 4.10 we Workshops (DCOSS), Jun. 2011, pp. 1–8.
observe that the network lifetime at different node [2]. K. Zen, D. Habibi, A. Rassau, and I. Ahmad,
level for the proposed system is around 58 which is "Performance evaluation of IEEE 802.15.4 for
comparatively higher to the network lifetime at mobile sensor networks," in Proc. 5th IFIP
different node level of the existing system which is Int.Conf. Wireless Opt. Commun. Netw.
around 43. (WOCN), 2008, pp. 1–5.
[3]. X. Wang, X. Lin, Q. Wang, and W. Luan,
"Mobility increases the connectivity of wireless
networks," IEEE/ACM Trans. Netw., vol. 21,no.
2, pp. 440–454, Apr. 2013.
[4]. S. A. B. Awwad, C. K. Ng, N. K. Noordin, and M.
F. A. Rasid, "Cluster based routing protocol for
mobile nodes in wireless sensor network," in
Proc. Int. Symp. Collaborative Technol. Syst.
Figure 15. showing Energy consumption in the (CTS), 2009, pp. 233–241.
FFAOMDV protocol [5]. T. Yang, T. Oda, L. Barolli, J. Iwashige, A.
From figure 15 we observe that the energy consumed Durresi, and F. Xhafa, "Investigation of packet
by the existing system is higher as compared to the loss in mobile WSNs for AODV protocol
energy consumed by the proposed system. anddifferent radio models," in Proc. IEEE 26th
Int. Conf. Adv. Inf. Netw. Appl. (AINA), Mar.
V. CONCLUSION 2012, pp. 709–715.
[6]. T. Melodia, D. Pompili, and I. F. Akyldiz,
Thus we conclude that in this work we have been able "Handling mobility in wireless sensor and actor
to present a new energy efficient multipath routing networks," IEEE Trans. Mobile Comput., vol. 9,
algorithm called FF-AOMDV simulated using NS-2 no. 2, pp. 160–173, Feb. 2010.
under three different scenarios, varying node speed, [7]. Y.-Y. Shih, W.-H. Chung, P.-C. Hsiu, and A.-C.
and packet size and simulation time.These Pang, "A mobility-aware node deployment and

International Journal of Scientific Research in Science and Technology (www.ijsrst.com) 238


et al. Int J S Res Sci. Tech. 2018 May-June;4(8) : 232-239

tree construction framework for ZigBee wireless


networks," IEEE Trans. Veh. Technol., vol. 62,
no. 6, pp. 2763–2779, Jul. 2013.
[8]. S. Deng, J. Li, and L. Shen, "Mobility-based
clustering protocol for wireless sensor networks
with mobile nodes," IET Wireless Sensor
Syst.,vol. 1, no. 1, pp. 39–47, Mar. 2011.
[9]. L. Karim and N. Nasser, "Reliable location-
aware routing protocol for mobile wireless
sensor network," IET Commun., vol. 6, no. 14,
pp. 2149–2158, Sep. 2012.
[10]. D. D. Chaudhary and L. M. Waghmare, "A new
dynamic energy efficient latency improving
protocol for wireless sensor networks," Wireless
Pers.Commun., vol. 76, no. 3, pp. 351–362, 2014.
[11]. G. Anastasi, M. Conti, and M. Di Francesco, "A
comprehensive analysis of the MAC
unreliability problem in IEEE 802.15.4 wireless
sensor networks, IEEE Trans. Ind. Informat.,
vol. 7, no. 1, pp. 52–65, Feb. 2011.

International Journal of Scientific Research in Science and Technology (www.ijsrst.com) 239

You might also like