Professional Documents
Culture Documents
12
1.1 Motivation
The design of a data transport protocol in Wireless Sensor Networks is focused
on providing End-to-End Reliability, Mitigating Congestion, and achieving fairness in
bandwidth allocation. The reliability issue in the data transport protocol usually
involves loss recovery, congestion control, or both. Most of the reliable data transport
protocols either use a retransmission-based loss recovery approach or a redundant
data transmission method (sending multiple copies of a data packet into the network).
Full reliability (100% reliable data delivery) is provided unless there are
Computing Unit
Communication Unit
Sensing Unit
Memory Unit
Power supply Unit
Power Unit
Battery
MemoryUnit
Processing
Sensor
DAC
Sensing Unit
Microcontroller
Radio
Communication Unit
Microprocessor
14
and GPS receiver. There are two types of memory units based on different needs for
storage in a sensor node.
There is also typically flash memory available where users can store their own
applications and data. The power unit provides power to other four units described
above. In the MicaZ mote, for example, it consists of two AA batteries, either
rechargeable or non-rechargeable. Although all sensing, computing and
communication operations consume energy, data communication requires more
energy than sensing and computing.
15
Interior Monitoring:
Observing the gas levels at vulnerable areas needs the usage of high-end,
sophisticated equipment, capable to satisfy industrial regulations. Wireless
internal monitoring solutions facilitate keep tabs on large areas as well as
ensure the precise gas concentration degree.
Exterior Monitoring:
External air quality monitoring needs the use of precise wireless sensors, rain
and wind resistant solutions as well as energy reaping methods to assure
extensive liberty to machine that likely to have tough access.
16
humidity and gases which are produced by fire in the trees or vegetation.
Landslide Detection:
A landslide detection system makes use of a wireless sensor network to detect
the slight movements of soil and changes in various parameters that may occur
before or during a landslide. Through the data gathered it may be possible to
Data Logging:
Wireless sensor networks are also used for the collection of data for
monitoring of environmental information, this can be as simple as the
monitoring of the temperature in a fridge to the level of water in overflow
tanks in nuclear power plants. The statistical information can then be used to
show how systems have been working. The advantage of WSNs over
conventional loggers is the "live" data feed is possible.
1.3.4 Agriculture
Using wireless sensor networks within the agricultural industry are
increasingly common using a wireless network frees the farmer from the
maintenance of wiring in a difficult environment. Gravity feed water systems
can be monitored using pressure transmitters to monitor water tank levels,
pumps can be controlled using wireless I/O devices and water use can be
measured and wirelessly transmitted back to a central control center for
billing. Irrigation automation enables more efficient water use and reduces
waste.
Passive Localization and Tracking:
The application of WSN to the passive localization and tracking of noncooperative targets (i.e., people not wearing any tag) has been proposed by
exploiting the pervasive and low-cost nature of such technology and the
properties of the wireless links which are established in a meshed WSN
infrastructure.
18
Packet loss in wireless sensor networks is usually due to the quality of the
wireless channel, sensor failure, and congestion. Most of the applications need
reliable transmission of each packet, and thus packet-level reliability is required.
Almost every transport layer protocol for wireless sensor networks offers
unidirectional reliable message delivery, but bidirectional reliability is also required in
certain applications. Reliability in wireless sensor networks can be realized as packet
reliability, event reliability, end-to-end reliability, hop-by-hop reliability, upstream
reliability and downstream reliability.
Upstream Reliability
Upstream reliability refers to the communication between the sensor nodes
and sink node, which is mostly unicast/converge cast transmission. All the protocols
except PSFQ and GARUDA offer upstream reliability.
Downstream Reliability
Downstream reliability refers to the communication between the sink node and
sensor nodes, since there is only a single sender (the sink); the data transmission
usually uses broadcasting rather than unicasting. It provides successful delivery of
control packets and queries from sink to sources. Only PSFQ and GARUDA offer
downstream reliability.
Bidirectional Reliability
Bidirectional reliability provides both sensor-to-sink and sink-to-sensor
transport mechanism for wireless sensor networks. It is much more important to use a
single bidirectional protocol, instead of using two unidirectional protocols for the
following reasons: (i) it reduces the complexity and heterogeneity of the network; (ii)
it reduces the energy consumption; (iii) it makes use of piggybacking, for example,
the sensors piggyback the ACK of query messages on their subsequent messages.
None of the protocols except ART protocol satisfies bidirectional reliability.
Loss Detection and Notification
The loss detection and notification stage of the reliability algorithm is used to
detect when a packet has been lost and is thus responsible for initiating any action to
recover the loss. In order to perform this task, Acknowledgment (ACK) is used.
1.6 Reliability
20
21
22
2 LITERATURE SURVEY
Year
Introduction
systems.
Sensor nodes collect measurements of interest over given space, making them
available to external systems and networks at special nodes designated sink
nodes.
Moving nodes and failing nodes due to battery power depletion are problems
that raise a significant number of routing problems, demanding the use of
23
Disadvantages
24
Title
Author
Year
Introduction
TCP has been successful due to its robustness and providing reliability on an
end-to-end basis
High mobility
The focus of this paper is the interaction between TCP and the MAC layer
The receiver may combine up to four ACK packets when the wireless channel
is in good condition.
25
Title
Author
Year
Introduction
sink.
An important fact about the UWSN is that, an individual node can be resource
constrained, but a collection of these nodes can cover large areas, first sensing
and then forwarding this useful data towards the surface sink with an
Advantages
26
Packet delivery ratios with different number of nodes, packet delivery ratios at
different time intervals and then user compared the effect of packet user
compared the effort of packet losses and duplications after specified time
interval.
In the beginning, here is minor difference for both approaches but as time
passes and more data packets are produced in the network then clearly, 2HACK generate better delivery ratios as compared to HbH-ACK.
Disadvantages
27
Title
Reliable Data Deliveries using Packet Optimization in Multihop Underwater Sensor networks
Author
Year
Introduction
Advantages
28
Disadvantages
Title
Author
Raghuraj Singh
Introduction
this scheme is to guarantee that the sender adjusts its transmission rate to meet
amount of packets it can send into the network before receiving an ACK.
This variable changes dynamically over time to properly limit the connections
sending rate.
The sending rate of a TCP connection is regulated by two distinct
window (cwnd).
To conform the both control schemes, the TCP sender adjusts its window to
Disadvantages
Causes of TCP performance degradation in MANETs
TCP is unable to distinguish between losses due to route failures and network
congestion.
TCP suffers from frequent route failures.
30
Title
Author
Introduction
Take one step ahead and focus on the three-hop relay routing where each
destination.
In order to characterize the complicated message delivery process under the
three-hop relay routing, a multidimensional Markov chain theoretical
framework is developed.
Based on the Markov chain framework and block matrix theory, closed-form
expressions are further derived for the important message delivery delay and
delivery cost.
Intermittently Connected Mobile Networks (ICMNs) consisting of sparsely
distributed mobile nodes, usually suffer from dramatic topology changes and
frequent network partitions
32
Advantages
33
3 PROPOSED SYSTEM
3.1 Introduction to Single Hop
In a Single Hop network, the datas are transferred to least leading hop. [1]In
this network, only one transmission can be take place from source to destination at the
time, there is no subsequent packet transmission between one hop to other. Wireless
station can be linked to Wireless Access Points (WAPs) that are connected to the
router through wired network, for instance, wireless access points like Wi-Fi,
WiMAX, cellular being connected to a bigger network, the Internet.
35
Transmission Range
Transmission Collision
Key Requirements of the Single Hop Network Environment:
Single Hop networks and thus must deal with much more complex collision
patterns than in cellular type systems. [5]Cellular type systems were based on single
hop systems. Achieving a dependable one hop transmission A
in wireless networks is
not an easy mission due to the crashes caused by a singularity known as Hidden
Terminal Problem. [6]If a broadcast is between two nodes (i.e., point-to-point
communication), then RTS CTS protocol can resolve the problematic eventually.
However, point-to-point approach will be extremely inefficient and often useless if it
is used for one-hop broadcast in MANETs.
Example: Hidden Terminals
Example: Hidden Terminals
36
Author Suggest [4] however, in single hop networks packets can be lost by a
number of different causes, such as,
Transmission error
Link Failure
Topology changes
Firstly, this definition can be used in the field and laboratory. [7]In the field
provided the sink node (end-user) knows how many cluster heads or sensors there are
and the average number of packets of sensed data per sensor per time unit, then
reliability can be estimated at any time during the lifetime of the network using the
number of time units elapsed.
Any difference between reliability measured in the field and laboratory could
be used to detect how many packets of data are lost between sensors and cluster heads
or the sink node (this would include counting sensors that have failed or have
otherwise been lost to the system).
37
intermediaries.
One-hop source routing, can achieve close to the maximum benefit
packet loss.
For long-distance transmission, single-hop communication is unable to
meet our needs due to the restriction of transmission distance and
accuracy.
38
39
Author Suggest [13] the establishment of two paths between a pair (source,
destination) for transmission can increase reliability and some approaches such as
even use the path redundancy to send two copies of the same packet on the various
paths to the Sink. Here we made a trade-off between the difficulty and to overhead to
obtain and consider very accurate information and this is the reason why we propose a
probabilistic approach that has the advantage of being very simple and requiring only
a small additional cost in terms of message exchanged compared to traditional onehop.
As per author [14] for a two-hop network, the maximum throughput can be
approximate taking into account the two Source-Relays (SR) and Destination-Relays
(DR) transmission. Two-hops are enforced and hence, the performance is better
especially at the edge of the communication range. Thus two-hop communication
comes into play, providing options for communications over larger distances.
40
41
1st Hop
2nd Hop
Node Failure
Node Success
42
Landslide detection
Pollution detection
Most of these applications require long term monitoring of the selected areas
when we are interested to collect the information. It has been shown that Transmission
Control Protocol (TCP) and other congestion control mechanisms like this are highly
problematic for wireless multi-hop networks. TCP is a connection oriented protocol,
that requires 3-way handshake between the sender and receiver before actual data
packet transmission starts.
43
Client
Server
SYN, SequenceNum = x
SYN+ACK, SequenceNum = y
Acknowledgement = x+1
ACK, Acknowledgement= y+1
On the other hand, when we talk about User Datagram Protocol (UDP), then it
does not offer any flow control and congestion control mechanisms. In the case of
congestions, UDP simply drops the packets without providing any scope for
recovering these lost packets. Besides, no ACKs are available when we choose UDP
as a transport layer protocol as it relies on the lower or some upper layers in order to
recover the lost packets. So, such UDP like approaches obviously does not work for
two-hop reliability model.
lost packets.
No ACK available in User Datagram Protocol.
Reliability is lesser than TCP
Too much of Packet Loss while using the User Datagram Protocol
45
declared as the next Hop as its Hop ID is smaller than N8. Now, N7 will repeat the
same procedure and N4 will be selected as the next hop as its Hop ID is smaller than
the N6. This process will continue, till the current data packet reaches the destination.
which can lead to failure of nodes. In order to handle this dilemma, two-hop reliability
model, where two nodes maintain the same copy of a data packet. Two-hop reliability
model not only handles these packet losses but also help to reduce the congestion
problem without creating any extra burden on the network.
47
Without extra burden on the available resource two copies of same data can be
densities.
Retransmissions help to recover the lost data packets.
Which increase the network reliability, and provide a guaranteed delivery,
two-hop acknowledgement reliability model is used.
Additional traffic and large end-to-end delays, sometime which can lead to
failure of nodes.
Congestion Control Mechanisms have addition burden in two-hop network
model.
Less Throughput Efficiency
It consumes more energy for maintaining two copies of same packet.
Availability of limited resources and continuous node movements are major
destination.
Accuracy of the data is also less in two-hop network model.
The source node does not know, how long it have to keep the save copy of
49
4.1 Three-Hop
Reliable model with the name of Three-Hop Reliability Model, in which every
sender node of each group of three layers will maintain the copy of same successful
transferred data packets without creating extra burden on the networks. Three Hops
Reliability model is used to increasing the reliability of Packets. While in Three Hop
Reliability model has many advantages such as not requiring any specialized
hardware, no dimensional location information required and easiness in handling node
movements without maintaining complex routing tables[16].
Reliability performance is better than comparing to One Hop and Two Hop
Reliability Model. It has Three nodes will take the responsibility to keep the copy of
same successful transferred data packet. The process of keep the copy of data packets
and forwarding by using the three-hop reliability model.
For getting more precise results, it furthermore still requires some reliability
mechanisms to handle the problem of node or packet loss. Following are the purposes
to design this reliable model:
In this model, three nodes will take the responsibility to keep the copy of same
successful transferred data packet. [17] User take one step ahead and focus on the
three-hop relay routing. Under such a routing scheme, besides that the source can
send a message copy to each node it meets, a relay which receives the message
directly from the source can also replicate the message to other nodes, while a relay
node which receives the message from another relay can only forward the message to
the destination [17].
50
51
52
The process to keep the copy of data packets and data packet forwarding by
using the Three-Hop Reliability Model. Here it is important to note that every node
will check the field Step value of the final message. [16]If it is less than three,
nodes will forward the data packets to next hop; otherwise node sends the final
message to the previous forwarder when send the data packets to next layer nodes.
The node N21 has data packet and it ready to send towards the destination on water
surface (Sink). Node N15 resides in the upper layer and inside the flooding zone
which is calculated by node N21.
Node N21 sends the Hello Packet inside the defined zone. Figure described
the Hello Packet format. N15 is inside the flooding zone and send Hello Reply to
node N21 along with the information as mention. After receiving the hello reply the
node N21 send data packet to node N15 with keeping the save copy of data packets
and adds 1 in the value of field Step of the final message.
53
configurations.
Moreover, this is accomplished with a level of accuracy that is acceptable.
Detection and some other like applications can be time critical and, therefore,
model.
Three-hop reliability model uses varying amounts of energy.
The maximization of throughput is the key aim of these networks rather than
performance of network.
This reliable model is used to increase the reliability for our designed routing
protocol.
Three-hop reliability model assures the delivery of the packets.
To control the congestion in three-hop network model and it also save the
energy consumed.
54
The Cygwin root directory (where Cygwin will be installed on your system)
Which of the many Cygwin mirrors you will use while downloading
compressed tar (.tar.bz2) archives. The installer downloads these from the mirror you
have chosen into a temporary directory, validates them by computing their MD5
sums, and then unpacks them into the root directory you have chosen.
55
If you have at least 30 Gb free disk space (roughly half of which can be
reclaimed after installation), you may choose to perform a full installation of Cygwin
with all of its optional packages. This choice is recommended for those who prefer to
work in a Unix or GNU/Linux environment but who are constrained to work under
MS-Windows. A full installation provides a large subset of the software provided as
standard components of a typical GNU/Linux distribution. Allow at least an hour to
perform a full installation if you have a fast Internet connection, more otherwise.
56
simulation models and (2) the suitability of a particular tool to implement the model.
A correct model based on solid assumption is mandatory to derive trustful results.
57
58
electronic devices. Fourthly, due to the continuing changing the code base, the result
may not be consistent, or contains bugs.
1.
In Cygwin Command Prompt, to open the NAM Editor by using the command
startxwin.bat
59
2.
After giving the command, the NAM Editor command prompt will opened
like this.
Then type the command cd c: in NAM Editor command prompt, the Cygwin
will enter into the drive to process the data.
60
4.
After entering into the c drive, it defines the path cd cygwin/usr/local/nsallinone-2.28/ns-2.28 to search the executing file and get the result.
5.
6.
As with the case of TCL Script, NAM Editor Window will opened like
this.
62
8.
63
9.
64
10.
65
11.
First Node will send a data to respective sink. Transmission process will be
started.
66
12.
Second Hop and Third Hop Selection process will be done and a packets are
67
13.
Now, Forward a data from source to destination with the help of Three Hop
68
69
70
71
72
5.7.3 Throughput
Most of studies only consider that wireless sensor networks are
equipped with only Omni-directional antennas, which can cause high
collisions. It is shown that the per node throughput in such networks is
decreased with the increased number of nodes. Thus, the transmission with
multiple short - range hops is preferred to reduce the interference. However,
other studies show that the transmission delay increases with the increased
number of hops. Found that using directional antennas not only can increase
the throughput capacity but also can decrease the delay by reducing the
number of hops.
73
74
6.1 Conclusion
WSNs hold the promise of many applications in the area of monitoring and
control systems. Many properties of the environment can be observed by the
monitoring system with the advent of cheap and tiny sensors. All these applications
are meant for the specific purposes, and therefore maintaining data transport
reliability is one of the major concern and the most important challenge. To address
the reliability, to survey the various existing techniques; each of them has its own
unique working to ensure the reliability. Some of the techniques use retransmission
mechanism while others use redundant information for insuring the reliability. Few of
the above objectives may be considered in the future by the researchers.
These objectives may be achieved as under:
likely to die because of energy loss which causes a tremendous number of packets to
be lost. Therefore Three Hopes Reliability Model (3H-RM) is proposed that deals
with the problem. In our model, three nodes keep a copy of the same data packet.
Data packets in environments, no matter at which place in the network they are
created, usually need at most 6 to 8 hops to get to their destination. The proposed
approach, under these conditions, can deal with the loss of packets and also aids in the
reduction of the issue of congestion with no extra toll being put on the network. The
proposed approach is supported by simulation results that were achieved using a
variety of parameters.
BIBLIOGRAPHY
76
77
12. Mamour Diop, Congduc Pham, Ousmane Thiare. Selecting source image sensor
node based on 2-hop information to improve image transmissions to mobile robot
sinks in search & rescue operations. University of Pau Pau, France, 2013.
13. Evsen Yanmaz, Samira Hayat, Jurgen Scherer, and Christian Bettsetter.
Experimental Performance Analysis of Two-Hop Aerial 802.11 Networks. IEEE,
2014.
14. Muhammad Ayaz, Azween Abdullah, Ibrahima Faye. Hop-by-Hop Reliable data
deliveries for Underwater Wireless Sensor Networks. International Conference on
Broadband, Wireless Computing, Communication and Applications, IEEE, 2010.
15. Tariq Ali, Low Tang Jung, Ibrahima Faye. Three-Hops Reliability model for
Underwater Wireless Sensor Network. International Conference on Information and
Multimedia Technology. IEEE, 2014.
<,
16. Jiajia Liu, Hiroki Nishiyama and Nei Kato, "Performance Modeling of Three-Hop
Relay Routing in Intermittently Connected Mobile Networks," IEEE Wireless
Communications and Networking Conference (WCNC 2013), Shanghai, China, Apr.
2013.
78