Professional Documents
Culture Documents
ISSN:2320-0790
ABSTRACT: Applications running on the same Wireless Sensor Network (WSN) platform usually have different Quality of
Service (qos) requirements. Two basic requirements are low delay and high data integrity. However, in most situations, these two
requirements cannot be satisfied simultaneously. In this research paper, based on the concept of potential in physics, we propose
IDDR, a multi-path dynamic routing algorithm, to resolve this conflict. By constructing a virtual hybrid potential field, IDDR
separates packets of applications with different qos requirements according to the weight assigned to each packet and routes them
towards the sink through different paths to improve the data fidelity for integrity-sensitive applications as well as reduce the end-
to-end delay for delay-sensitive ones. Using the Lyapunov drift technique, we prove that IDDR is stable. Simulation results
demonstrate that IDDR provides data integrity and delay differentiated services.
Keywords:Wireless Sensor Network (WSN), Multi-Path Dynamic Routing Algorithm, Digital Audio Broadcasting (DAB), Quality
of Service (qos), Low-Interference Energy-efficient Multipath Routing protocol (LIEMRO), MCMP (Multi-Constraint Multi-Path)
routing protocol, CODA (Congestion Detection and Avoidance), Signal-to-Noise Ratio (SNR), Energy Efficient and qos aware
multipath routing protocol (EQSR), Adaptive Forwarding Scheme (AFS), Implicit Hop-by-Hop Rate Control
INTRODUCTION
2278
COMPUSOFT, An international journal of advanced computer technology, 6 (2), February-2017 (Volume-VI, Issue-II)
2279
COMPUSOFT, An international journal of advanced computer technology, 6 (2), February-2017 (Volume-VI, Issue-II)
wherever they without making unnecessary trip to the wireless channel and may be even inferior to the
and from the office to the field. performance of single-path approaches. Specifically,
when multiple adjacent paths are being used
5. Entertainment: concurrently, the broadcast nature of wireless
channels results in inter path interference which
Video and audio recordings can now be streamed on significantly degrades end-to-end throughput. In this
the go using mobile computing. It's easy to access a paper, we propose a Low-Interference Energy-
wide variety of movies, educational and informative efficient Multipath Routing protocol (LIEMRO) to
material. With the improvement and availability of improve the QoS requirements of event-driven
high speed data connections at considerable costs, applications. In addition, in order to optimize
one is able to get all the entertainment they want as resource utilization over the established paths,
they browser the internet for streamed data.[7] One LIEMRO employs a quality-based load balancing
can be able to watch news, movies, and algorithm to regulate the amount of traffic injected
documentaries among other entertainment offers over into the paths. The performance gain of LIEMRO
the internet. This was not such before mobile compared to the ETX-based single-path routing
computing dawned on the computing world. protocol is 85%, 80%, and 25% in terms of data
delivery ratio, end-to-end throughput, and network
6. Streamlining of Business Processes: lifetime, respectively. Furthermore, the end-to-end
latency is improved more than 60%.
Business processes are now easily available through
secured connections. Basing on the factor of security, The increasing demand for real-time applications in
adequate measures have been put in place to ensure Wireless Sensor Networks (WSNs) has made the
authentication and authorization of the user accessing Quality of Service (QoS) based communication
those services. protocols an interesting and hot research topic.
Satisfying Quality of Service (QoS) requirements
Some business functions can be run over secure links (e.g. bandwidth and delay constraints) for the
and also the sharing of information between business different QoS based applications of WSNs raises
partners. Also it's worth noting that lengthy travelling significant challenges. More precisely, the
has been reduced, since there is the use of voice and networking protocols need to cope up with energy
video conferencing. constraints, while providing precise QoS
guarantee.[9] Therefore, enabling QoS applications in
Meetings, seminars and other informative services sensor networks requires energy and QoS awareness
can be conducted using the video and voice in different layers of the protocol stack. In many of
conferencing. This cuts down on travel time and these applications (such as multimedia applications,
expenditure. or real-time and mission critical applications), the
network traffic is mixed of delay sensitive and delay
LITERATURE SURVEY tolerant traffic. Hence, QoS routing becomes an
This research paper proposes gradient routing with important issue. In this paper, we propose an Energy
two-hop information for industrial wireless sensor Efficient and QoS aware multipath routing protocol
networks to enhance real-time performance with (abbreviated shortly as EQSR) that maximizes the
energy efficiency. Two-hop information routing is network lifetime through balancing energy
adopted from the two-hop velocity-based routing, and consumption across multiple nodes, uses the concept
the proposed routing algorithm is based on the of service differentiation to allow delay sensitive
number of hops to the sink instead of distance. traffic to reach the sink node within an acceptable
Additionally, an acknowledgment control scheme delay, reduces the end to end delay through spreading
reduces energy consumption and computational out the traffic across multiple paths, and increases the
complexity. The simulation results show a reduction throughput through introducing data redundancy.
in end-to-end delay and enhanced energy EQSR uses the residual energy, node available buffer
efficiency.[8] size, and Signal-to-Noise Ratio (SNR) to predict the
best next hop through the paths construction phase.
The existing multipath routing protocols for wireless Based on the concept of service differentiation,
sensor networks demonstrate the efficacy of traffic EQSR protocol employs a queuing model to handle
distribution over multiple paths to fulfill the Quality both real-time and non-real-time traffic.
of Service (QoS) requirements of different By means of simulations, we evaluate and compare
applications. However, the performance of these the performance of our routing protocol with the
protocols is highly affected by the characteristics of MCMP (Multi-Constraint Multi-Path) routing
2280
COMPUSOFT, An international journal of advanced computer technology, 6 (2), February-2017 (Volume-VI, Issue-II)
protocol. Simulation results have shown that our the performance of sensing applications. We discuss
protocol achieves lower average delay, more energy the performance benefits and practical engineering
savings, and higher packet delivery ratio than the challenges of implementing CODA in an
MCMP protocol. experimental sensor network test bed based on
Berkeley motes using CSMA.[11] Simulation results
A new localized quality of service (QoS) routing indicate that CODA significantly improves the
protocol for wireless sensor networks (WSN) is performance of data dissemination applications such
proposed in this paper. The proposed protocol targets as directed diffusion by mitigating hotspots, and
WSN's applications having different types of data reducing the energy tax with low fidelity penalty on
traffic. It is based on differentiating QoS sensing applications. We also demonstrate that
requirements according to the data type, which CODA is capable of responding to a number of
enables to provide several and customized QoS congestion scenarios that we believe will be prevalent
metrics for each traffic category. With each packet, as the deployment of these networks accelerates.
the protocol attempts to fulfill the required data- SYSTEM ANALYSIS
related QoS metric(s) while considering power
efficiency. It is modular and uses geographical EXISTING SYSTEM:
information, which eliminates the need of
propagating routing information. For link quality Most QoS provisioning protocols proposed
estimation, the protocol employs distributed, memory for traditional ad hoc networks have large
and computation efficient mechanisms. It uses a overhead caused by end-to-end path
multi-sink single-path approach to increase discovery and resource reservation. Thus,
reliability. To our knowledge, this protocol is the first they are not suitable for resource-
that makes use of the diversity in data traffic while constrained WSNs. Some mechanisms have
considering latency, reliability, residual energy in been designed to provide QoS services
sensor nodes, and transmission power between nodes specifically for WSNs.
to cast QoS metrics as a multi-objective problem. The Adaptive Forwarding Scheme (AFS)
proposed protocol can operate with any medium employs the packet priority to determine the
access control (MAC) protocol, provided that it forwarding behavior to control the reliability
employs an acknowledgment (ACK) mechanism. LIEMRO utilizes a dynamic path
Extensive simulation study with scenarios of 900 maintenance mechanism to monitor the
nodes shows the proposed protocol outperforms all quality of the active paths during network
comparable state-of-the-art QoS and localized routing operation and regulates the injected traffic
protocols. Moreover, the protocol has been rate of the paths according to the latest
implemented on sensor motes and tested in a sensor perceived paths quality.
network test bed.[10]
DISADVANTAGES OF EXISTING SYSTEM:
Event-driven sensor networks operate under an idle
It does not consider the effects of buffer
or light load and then suddenly become active in
capacity and service rate of the active nodes
response to a detected or monitored event. The
to estimate and adjust the traffic rate of the
transport of event impulses is likely to lead to varying
active paths.
degrees of congestion in the network depending on
This will cause congestion and thus lead to
the sensing application. It is during these periods of
many high integrity packets loss and large
event impulses that the likelihood of congestion is
end-to-end delay for delay sensitive packets.
greatest and the information in transit of most
Delay-sensitive packets occupy the limited
importance to users. To address this challenge we
bandwidth and buffers, worsening drops of
propose an energy efficient congestion control
high-integrity ones.
scheme for sensor networks called CODA
High-integrity packets block the shortest
(Congestion Detection and Avoidance) that
paths, compelling the delay-sensitive
comprises three mechanisms: (i) receiver-based
packets to travel more hops before reaching
congestion detection; (ii) open-loop hop-by-hop
the sink, which increases the delay.
backpressure; and (iii) closed-loop multi-source
High-integrity packets occupy the buffers,
regulation. We present the detailed design,
which also increases the queuing delay of
implementation, and evaluation of CODA using
delay-sensitive packets.
simulation and experimentation. We define two
important performance metrics (i.e., energy tax and PROPOSED SYSTEM:
fidelity penalty) to evaluate the impact of CODA on
2281
COMPUSOFT, An international journal of advanced computer technology, 6 (2), February-2017 (Volume-VI, Issue-II)
2282
COMPUSOFT, An international journal of advanced computer technology, 6 (2), February-2017 (Volume-VI, Issue-II)
2283
COMPUSOFT, An international journal of advanced computer technology, 6 (2), February-2017 (Volume-VI, Issue-II)
OBJECTIVES
1.Input Design is the process of converting a user-
oriented description of the input into a computer-
based system. This design is important to avoid errors
in the data input process and show the correct
direction to the management for getting correct
information from the computerized system.
ACTIVITY DIAGRAM:
2. It is achieved by creating user-friendly screens for
the data entry to handle large volume of data. The
Activity diagrams are graphical representations of
goal of designing input is to make data entry easier
workflows of stepwise activities and actions with
and to be free from errors. The data entry screen is
support for choice, iteration and concurrency.[17] In
designed in such a way that all the data manipulates
the Unified Modeling Language, activity diagrams
can be performed. It also provides record viewing
can be used to describe the business and operational
facilities.
step-by-step workflows of components in a system.
3.When the data is entered it will check for its
An activity diagram shows the overall flow of
validity. Data can be entered with the help of screens.
control.
Appropriate messages are provided as when needed
so that the user will not be in maize of instant. Thus
the objective of input design is to create an input
layout that is easy to follow.
OUTPUT DESIGN
A quality output is one, which meets the
requirements of the end user and presents the
information clearly. In any system results of
processing are communicated to the users and to
other system through outputs. In output design it is
determined how the information is to be displaced for
immediate need and also the hard copy output. It is
the most important and direct source information to
Figure 7: Activity Diagram the user. Efficient and intelligent output design
improves the system’s relationship to help user
decision-making.
INPUT DESIGN
1. Designing computer output should proceed in an
The input design is the link between the information
organized, well thought out manner; the right output
system and the user. It comprises the developing
must be developed while ensuring that each output
specification and procedures for data preparation and
element is designed so that people will find the
those steps are necessary to put transaction data in to
system can use easily and effectively. When analysis
a usable form for processing can be achieved by
design computer output, they should Identify the
inspecting the computer to read data from a written or
specific output that is needed to meet the
printed document or it can occur by having people
requirements.
keying the data directly into the system. The design
2.Select methods for presenting information.
of input focuses on controlling the amount of input
3.Create document, report, or other formats that
required, controlling the errors, avoiding delay,
contain information produced by the system.[18]
avoiding extra steps and keeping the process simple.
The output form of an information system should
The input is designed in such a way so that it
accomplish one or more of the following objectives.
provides security and ease of use with retaining the
2284
COMPUSOFT, An international journal of advanced computer technology, 6 (2), February-2017 (Volume-VI, Issue-II)
Convey information about past activities, of confidence must be raised so that he is also able to
current status or projections of the make some constructive criticism, which is
Future. welcomed, as he is the final user of the system.
Signal important events, opportunities, SYSTEM TESTING
problems, or warnings. The purpose of testing is to discover errors.
Trigger an action. Testing is the process of trying to discover every
Confirm an action. conceivable fault or weakness in a work product. It
provides a way to check the functionality of
SYSTEM STUDY components, sub assemblies, assemblies and/or a
FEASIBILITY STUDY finished product It is the process of exercising
The feasibility of the project is software with the intent of ensuring that the software
analyzed in this phase and business proposal is put system meets its requirements and user expectations
forth with a very general plan for the project and and does not fail in an unacceptable manner. There
some cost estimates. During system analysis the are various types of test. Each test type addresses a
feasibility study of the proposed system is to be specific testing requirement.
carried out. This is to ensure that the proposed system TYPES OF TESTS
is not a burden to the company. For feasibility Unit testing
analysis, some understanding of the major Unit testing involves the design of test cases
requirements for the system is essential. that validate that the internal program logic is
Three key considerations involved in the feasibility functioning properly, and that program inputs
analysis are produce valid outputs. All decision branches and
internal code flow should be validated. It is the
ECONOMICAL FEASIBILITY testing of individual software units of the application
TECHNICAL FEASIBILITY .it is done after the completion of an individual unit
SOCIAL FEASIBILITY before integration. This is a structural testing, that
relies on knowledge of its construction and is
ECONOMICAL FEASIBILITY invasive. Unit tests perform basic tests at component
This study is carried out to check the level and test a specific business process, application,
economic impact that the system will have on the and/or system configuration. Unit tests ensure that
organization. The amount of fund that the company each unique path of a business process performs
can pour into the research and development of the accurately to the documented specifications and
system is limited. The expenditures must be justified. contains clearly defined inputs and expected results.
Thus the developed system as well within the budget Integration testing
and this was achieved because most of the Integration tests are designed to test
technologies used are freely available. Only the integrated software components to determine if they
customized products had to be purchased. [19] actually run as one program. Testing is event driven
TECHNICAL FEASIBILITY and is more concerned with the basic outcome of
This study is carried out to check the screens or fields. Integration tests demonstrate that
technical feasibility, that is, the technical although the components were individually
requirements of the system. Any system developed satisfaction, as shown by successfully unit testing, the
must not have a high demand on the available combination of components is correct and consistent.
technical resources. This will lead to high demands Integration testing is specifically aimed at exposing
on the available technical resources. This will lead to the problems that arise from the combination of
high demands being placed on the client. The components.
developed system must have a modest requirement, Functional test
as only minimal or null changes are required for Functional tests provide systematic
implementing this system. demonstrations that functions tested are available as
SOCIAL FEASIBILITY specified by the business and technical requirements,
The aspect of study is to check the level of system documentation, and user manuals.
acceptance of the system by the user. This includes Functional testing is centered on the following items:
the process of training the user to use the system Valid Input : identified classes of valid
efficiently. The user must not feel threatened by the input must be accepted.
system, instead must accept it as a necessity. [20] The Invalid Input : identified classes of invalid
level of acceptance by the users solely depends on the input must be rejected.
methods that are employed to educate the user about Functions : identified functions must be
the system and to make him familiar with it. His level exercised.
2285
COMPUSOFT, An international journal of advanced computer technology, 6 (2), February-2017 (Volume-VI, Issue-II)
Output : identified classes of application Verify that the entries are of the correct
outputs must be exercised. format
Systems/Procedures: interfacing systems or No duplicate entries should be allowed
procedures must be invoked. All links should take the user to the correct
Organization and preparation of functional tests is page.
focused on requirements, key functions, or special
test cases. In addition, systematic coverage pertaining Integration Testing
to identify Business process flows; data fields, Software integration testing is the
predefined processes, and successive processes must incremental integration testing of two or more
be considered for testing. Before functional testing is integrated software components on a single platform
complete, additional tests are identified and the to produce failures caused by interface defects.
effective value of current tests is determined. The task of the integration test is to check
System Test that components or software applications, e.g.
System testing ensures that the entire integrated components in a software system or – one step up –
software system meets requirements. It tests a software applications at the company level – interact
configuration to ensure known and predictable without error.
results. An example of system testing is the Test Results: All the test cases mentioned above
configuration oriented system integration test. passed successfully. No defects encountered.
System testing is based on process descriptions and Acceptance Testing
flows, emphasizing pre-driven process links and User Acceptance Testing is a critical phase
integration points. of any project and requires significant participation
White Box Testing by the end user. It also ensures that the system meets
White Box Testing is a testing in which in which the functional requirements.
the software tester has knowledge of the inner Test Results: All the test cases mentioned above
workings, structure and language of the software, or passed successfully. No defects encountered.
at least its purpose. It is purpose. It is used to test
areas that cannot be reached from a black box level. CONCLUSION
Black Box Testing In this research paper, a dynamic multipath routing
Black Box Testing is testing the software algorithm IDDR is proposed based on the concept of
without any knowledge of the inner workings, potential in physics to satisfy the two different QoS
structure or language of the module being tested. requirements, high data fidelity and low end-to-end
Black box tests, as most other kinds of tests, must be delay, over the same WSN simultaneously. The
written from a definitive source document, such as IDDR algorithm is proved stable using the Lyapunov
specification or requirements document, such as drift theory. Moreover, the experiment results on a
specification or requirements document. It is a testing small test bed and the simulation results on TOSSIM
in which the software under test is treated, as a black demonstrate that IDDR can significantly improve the
box .you cannot “see” into it. The test provides inputs throughput of the high-integrity applications and
and responds to outputs without considering how the decrease the end-to-end delay of delay sensitive
software works. applications through scattering different packets
Unit Testing: from different applications spatially and temporally.
Unit testing is usually conducted as part of a IDDR can also provide good scalability because only
combined code and unit test phase of the software local information is required, which simplifies the
lifecycle, although it is not uncommon for coding and implementation. In addition, IDDR has acceptable
unit testing to be conducted as two distinct phases. communication overhead.
Test strategy and approach REFERENCES
Field testing will be performed manually
and functional tests will be written in detail. [1] P. Levis, N. Lee, M. Welsh, and D. Culler,
“TOSSIM: Accurate and scalable simulation of entire
Test objectives TinyOS applications,” in Proc. 1st Int. Conf.
All field entries must work properly. Embedded Networked Sensor Syst., 2003, pp. 126–
Pages must be activated from the identified 137.
link.
The entry screen, messages and responses [2] T. Chen, J. Tsai, and M. Gerla, “QoS routing
must not be delayed. performance in multihop multimedia wireless
networks,” in Proc. IEEE Int. Conf. Universal
Features to be tested Personal Commun., 1997, pp. 557–561.
2286
COMPUSOFT, An international journal of advanced computer technology, 6 (2), February-2017 (Volume-VI, Issue-II)
[7] C. Lu, B. Blum, T. Abdelzaher, J. Stankovic, and [16] D. Djenouri and I. Balasingham, “Traffic-
T. He, “RAP: A real-time communication differentiation-based modular qos localized routing
architecture for large-scale wireless sensor for wireless sensor networks,” IEEE Trans. Mobile
networks,” in Proc. IEEE 8th Real-Time Embedded Comput., vol. 10, no. 6, pp. 797–809, Jun. 2010.
Technol. Appl. Symp., 2002, pp. 55–66.
[17] A. Basu, A. Lin, and S. Ramanathan, “Routing
[8] M. Caccamo, L. Zhang, L. Sha, and G. Buttazzo, using potentials: A dynamic traffic-aware routing
“An implicit prioritized access protocol for wireless algorithm,” in Proc. Conf. Appl., Technol.,
sensor networks,” in Proc. IEEE Real-Time Syst. Architectures, Protocols Comput. Commun., 2003,
Symp., 2002, pp. 39–48. pp. 37–48.
[9] T. He, J. Stankovic, C. Lu, and T. Abdelzaher, [18] C.-Y. Wan, S. B. Eisenman, and A. T.
“SPEED: A stateless protocol for real-time Campbell, “CODA: Congestion detection and
communication in sensor networks,” in Proc. IEEE avoidance in sensor networks,” in Proc. 1st Int. Conf.
23rd Int. Conf. Distrib. Comput. Syst., 2003, pp. 46– Embedded Netw. Sensor Syst., 2003, pp. 266–279.
55.
[19] L. Georgiadis, M. J. Neely and L. Tassiulas,
[10] P. T. A. Quang and D.-S. Kim, “Enhancing real- “Resource allocation and cross-layer control in
time delivery of gradient routing for industrial wireless networks,” Found. Trends Netw., vol. 1, no.
wireless sensor networks,” IEEE Trans. Ind. Inform., 1, pp. 1–144, 2006.
vol. 8, no. 1, pp. 61–68, Feb. 2012.
[20] A. Papadoulos and J. A. Mccann, “Towards the
[11] S. Bhatnagar, B. Deb, and B. Nath, “Service design of an energy-efficient, location-aware routing
differentiation in sensor networks,” in Proc. Int. protocol for mobile, adhoc sensor networkFs,” in
Symp. Wireless Pers. Multimedia Commun., 2001. Proc. Int. Workshop Database Expert Syst. Appl.,
2004, pp. 705–709.
[12] B. Deb, S. Bhatnagar, and B. Nath, “ReInForM:
Reliable information forwarding using multiple paths
2287