Volume 3 Issue 8- August 2013

 

S.No Title Page
1. A Study on ASCENT in Wireless Sensor Networks
Tummala Sasanth, Dr Syed Umar
Abstract

The nodes will have to self-configure to establish a topology that provides communication under stringent energy constraints. ASCENT builds on the notion that, as density increases, only a subset of the nodes are necessary to establish a routing forwarding backbone. In ASCENT, each node assesses its connectivity and adapts its participation in the multi-hop network topology based on the measured operating region. This paper motivates and describes the ASCENT algorithm and presents analysis, simulation, and experimental measurements. We show that the system achieves linear increase in energy savings as a function of the density and the convergence time required in case of node failures while still providing adequate connectivity.

Keywords—Wireless sensor networks, adaptive topology, topology control, energy conservation.

267-272
Full Text PDF
2. A Review of QoS in Wireless Sensor Networks
Jaswanth Bhargav Padigala, Dr Syed Umar
Abstract

The adoption of wireless sensor networks by applications that require complex operations, ranging from health care to industrial monitoring, has brought forward a new challenge of fulfilling the quality of service (QoS) requirements of these applications. However, providing QoS support is a challenging issue due to highly resource constrained nature of sensor nodes, unreliable wireless links and harsh operation environments. In this paper, we focus on the QoS support at the MAC layer which forms the basis of communication stack and has the ability to tune key QoS-specific parameters, such as duty cycle of the sensor devices. We explore QoS challenges and perspectives for wireless sensor networks, survey the QoS mechanisms and classify the state of the art QoS-aware MAC protocols together with discussing their advantages and disadvantages.

Keywords — QoS, QoS challenges, QoS perspectives, QoS mechanisms, Priority assignment, Service differentiation mechanisms, Wireless sensor networks ,MAC layer, QoS-aware MAC protocols.

273-278
Full Text PDF
3. A Review of Power Aware Routing in Wireless Ad-hoc Networks
Varaprasad.Ummadi, Dr Syed Umar, V N Satya Sai Anil Kumar Pilaka
Abstract

This Development of the efficient power aware protocol is the need of today’s adhoc networks. Although developing battery efficient systems that have low cost and complexity, remains a crucial issue. In order to facilitate communication within a mobile adhoc network, an efficient routing protocol is required to discover routes between mobile nodes. Power is one of the most important design criteria for adhoc networks as batteries provide limited working capacity to the mobile nodes. Power failure of a mobile node not only affects the node itself but also its ability to forward packets on behalf of others and hence affects the overall network lifetime. Much research efforts have been devoted to develop energy aware routing protocols. In this paper we propose an efficient algorithm, which maximizes the network lifetime by minimizing the power consumption during the source to destination route
Establishment.

Keywords—Power, Ad hoc networks, Routing Protocols, Network Lifetime.

279-283
Full Text PDF
4. Creating an Engaged and Productive Workforce in Small Businesses using Cloud Computing: A Literature Review
David F. Dykshoorn, Dr. Rao Nemani
Abstract

Employee engagement is one way to keep small teams as productive as possible, especially when resources are tight.  Small businesses have an advantage of naturally being a highly agile and engaging workplace by taking advantage of cloud computing.  This is one way they can overcome the resource limitations they typically face.  Work and life balance, collaboration, feedback, and recognition are discussed and demonstratively enhanced through the use of cloud computing using models.  The tools exhibited in this paper are intentionally low cost and accessible to businesses with limited resources.
Keywords— Cloud Computing, Workforce Productivity, Small Business, Literature Review.

284-290
Full Text PDF
5. A Study on Secure Routing in Wireless Sensor Networks
Avinash Gundlapally,Dr Syed Umar
Abstract

We consider routing security in wireless sensor networks. Many sensor network routing protocols have been proposed, but none of them have been designed with security as a goal. We propose security goals for routing in sensor networks, show how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensor networks, introduce two classes of novel attacks against sensor networks — sinkholes and HELLO floods, and analyze the security of all the major sensor network routing protocols. We describe crippling attacks against all of them and suggest countermeasures and design considerations. This is the first such analysis of secure routing in sensor networks.
Keywords—Spoofing, filtering, defense, wireless.

291-296
Full Text PDF

 

 

 

 

IJCSET Menu

Downloads