(IJCSIS) International Journal of Computer Science and Information Security,Vol. 11, No. 8, 2013
Multidimensional Analysis applied to WSNCase study: routing Protocol
Ziyati Elhoussaine, Rachid Haboub, Mohammed Ouzzif, and Khadija Bami
RITM laboratory, Computer science and Networks teamENSEM - ESTC - UH2C,Casablanca, Morocco
—Mobile Ad-hoc Network is a kind of wireless ad-hoc network where nodes are connected wirelessly and thenetwork is self configuring . This paper shows the use of datawarehouse as an alternative for managing data collected byWireless Sensor Networks. In general Wireless Sensor Network isused to produce a large amount of data that need to be analyzedand normalized, so as to help researchers and other peopleinterested in the information. These data managed and comparedwith information from other sources and systems couldcontribute in technical decision processes. This paper proposes amodel to extract, transform and normalize data collected byWireless Sensor Networks by implementing a multidimensionalwarehouse for comparing many aspects in WSN such as (routingprotocol, sensor, sensor mobility, cluster ….). Hence, datawarehouse applied to the context above is detached as a usefulalternative that helps specialists to obtain information fordecision processes and navigate from one aspect to another.
Keywords-WSN, Data Warehouse, multidimentional design,OLAP, Routing Protocol
MANET is autonomous collection of mobile nodes thatcommunicate over limited bandwidth and energy constraints. These mobile nodes are in motion so the topology of theentire network changes rapidly and unpredictably over time.All network is managed by the network nodes themselves, asthere is no special device or router involved, every nodes itself work as a router to forward the traffic.Energy conservation in ad-hoc networks is veryimportant due to the limited energy availability in eachwireless node . Since the communication between twowireless nodes consumes more energy, it is pertinent tominimize the cost of energy required for communication byexercising an energy aware routing strategy. Such routingprocedures/policies potentially increase the lifetime of thenetwork. In this paper, the energy metrics of AODV andDSDV  are compared by simulating with increasing thedensity of nodes and using DW technologies to depicts andcontrol some WSN’s behavior over time.
Routing protocols  is a standard that controls hownodes decide to route the packets between the source andthe destination node. Each node learns about nodes nearby andhow to reach them.Each node is maintaining one or more tables thatcontaining routing information about every other node inthe network. Examples for table driven protocols are:1)
: This protocol performs Route Discoveryusing control messages route request (RREQ) and routereply(RREP) whenever a node wishes to send packets todestination. To control network wide broadcasts of RREQs, thesource node uses an expanding ring search technique. Theforward path sets up an intermediate node in its route table witha lifetime association RREP.2)
Destination Sequenced Distance Vectorprotocol belongs to the class of proactive routing protocols.Based on the classical Bellman-Ford routing algorithm .DSDV also has the feature of the distance-vector protocol in that each node will maintain a routing table in whichall of the possible destinations within the network and thenumber of hops to each destination are recorded . Eachentry in the routing table is marked with a sequence numberthat is assigned by the destination node; the sequencenumbering system will avoid the formation of loops.II.
Energy consumption, since nodes are powered by batteries,depending on the use, energy can last from days to weeks .With the help of WSN, it is possible to monitor variouscharacteristics of the environments, but these data alone orsimply collected over time are difficult to be interpreted byusers. In this section, we outline the context of our work onWSN. In  The energy metrics of AODV and DSDV arecompared by simulating with increasing the density of nodesusing trace file generated NS2 simulator.For the monitored data to be recovered in a productive way bythe parties, it must be organized in a repository or database, and