Pub Date : 2015-08-31DOI: 10.4172/2090-4886.1000E105
A. Bashir
Internet-of-Things (IoT) is considered one of the next technological revolutions. It enables communication among objects of various kinds. Wireless Sensor Networks (WSNs), being the basic elements of IoT, can help users (humans or machines) to interact and react to realworld events. WSN nodes are capable of sensing, communications, and computations; and are getting more powerful. Though various advantages, but one obvious drawback WSNs have is that they are domain-specific and task-oriented, which means they are designed to serve one particular application without the possibility of being reused for another application. This leads us to redundant deployment of WSN infrastructure in a particular are for multiple similar applications. For example, in a military environment the temperature monitoring WSN infrastructure would probably be different from the infrastructure to monitor the enemy movement. Such redundancy increase infrastructure cost. With the philosophy of IoT, in the future, WSN deployment should support multiple applications simultaneously.
{"title":"Virtualization of Wireless Sensor Networks","authors":"A. Bashir","doi":"10.4172/2090-4886.1000E105","DOIUrl":"https://doi.org/10.4172/2090-4886.1000E105","url":null,"abstract":"Internet-of-Things (IoT) is considered one of the next technological revolutions. It enables communication among objects of various kinds. Wireless Sensor Networks (WSNs), being the basic elements of IoT, can help users (humans or machines) to interact and react to realworld events. WSN nodes are capable of sensing, communications, and computations; and are getting more powerful. Though various advantages, but one obvious drawback WSNs have is that they are domain-specific and task-oriented, which means they are designed to serve one particular application without the possibility of being reused for another application. This leads us to redundant deployment of WSN infrastructure in a particular are for multiple similar applications. For example, in a military environment the temperature monitoring WSN infrastructure would probably be different from the infrastructure to monitor the enemy movement. Such redundancy increase infrastructure cost. With the philosophy of IoT, in the future, WSN deployment should support multiple applications simultaneously.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":"4 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2015-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2090-4886.1000E105","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70966066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-08-20DOI: 10.4172/2090-4886.1000122
Ambassa Joel Yves, Peng Hao
For the scenarios of indoors localization and tracking, the solutions generally need complex infrastructure because they would require either a grid of antennas, each having a well-known position (proximity based approach), or a sophisticated algorithm that uses scene fingerprint to estimate the location or the zone of an object by matching the online measurement with the closest offline measurement. Those techniques may not be available in unknown zones, which will make it difficult to locate a lost node. In this paper, with no additional hardware costs, we propose a new RSSIbased approach in order to find a lost node using a known node. By rotating the known node at the same spot we can collect different RSSI for different polar angles. Two pairs of angles with the strongest RSSI will indicate the main lobes of the radiation pattern, namely, zone of the unknown node. Experimental results illustrate a very close estimation of the unknown node zone, reducing up to 84% of the zone uncertainty.
{"title":"RSSI-based Indoor Localization Using RSSI-with-Angle-based Localization Estimation Algorithm","authors":"Ambassa Joel Yves, Peng Hao","doi":"10.4172/2090-4886.1000122","DOIUrl":"https://doi.org/10.4172/2090-4886.1000122","url":null,"abstract":"For the scenarios of indoors localization and tracking, the solutions generally need complex infrastructure because they would require either a grid of antennas, each having a well-known position (proximity based approach), or a sophisticated algorithm that uses scene fingerprint to estimate the location or the zone of an object by matching the online measurement with the closest offline measurement. Those techniques may not be available in unknown zones, which will make it difficult to locate a lost node. In this paper, with no additional hardware costs, we propose a new RSSIbased approach in order to find a lost node using a known node. By rotating the known node at the same spot we can collect different RSSI for different polar angles. Two pairs of angles with the strongest RSSI will indicate the main lobes of the radiation pattern, namely, zone of the unknown node. Experimental results illustrate a very close estimation of the unknown node zone, reducing up to 84% of the zone uncertainty.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":"149 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2090-4886.1000122","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70964232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-06-11DOI: 10.4172/2090-4886.1000121
Farhana Mustafa, P. Lohiya
OFDM is technique that is chosen for high data rate communication and is important for 4th generation communication system. Resources such as power, bandwidth are limited, thus intelligent allocation of these resources to users are crucial for delivering the best possible quality of services. Fuzzy Rule Based System (FRBS) and Particle Swarm Optimization (PSO) algorithm are used for optimization of code rate, modulation and power. FRBS is used for adapting code rate and modulation size while PSO is used for power allocation.
{"title":"Optimization of Resource Allocation in OFDM Communication System forDifferent Modulation Technique using FRBS and PSO","authors":"Farhana Mustafa, P. Lohiya","doi":"10.4172/2090-4886.1000121","DOIUrl":"https://doi.org/10.4172/2090-4886.1000121","url":null,"abstract":"OFDM is technique that is chosen for high data rate communication and is important for 4th generation communication system. Resources such as power, bandwidth are limited, thus intelligent allocation of these resources to users are crucial for delivering the best possible quality of services. Fuzzy Rule Based System (FRBS) and Particle Swarm Optimization (PSO) algorithm are used for optimization of code rate, modulation and power. FRBS is used for adapting code rate and modulation size while PSO is used for power allocation.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":"2015 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2015-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70964114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-02-18DOI: 10.4172/2090-4886.1000E104
Daniel Choi
The Journal of Sensor Networks and Data Communications is a peer-reviewed, open access journal, which means that all published articles are made freely available online without a subscription, and authors retain the copyright of their work. The journal is supported by an experienced international editorial board team invites you to an opportunity of publishing your research experience to the professional societies.
{"title":"Editorial for the Topics of Micro Sensors for Communications and Wireless Sensor Networks","authors":"Daniel Choi","doi":"10.4172/2090-4886.1000E104","DOIUrl":"https://doi.org/10.4172/2090-4886.1000E104","url":null,"abstract":"The Journal of Sensor Networks and Data Communications is a peer-reviewed, open access journal, which means that all published articles are made freely available online without a subscription, and authors retain the copyright of their work. The journal is supported by an experienced international editorial board team invites you to an opportunity of publishing your research experience to the professional societies.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":"4 1","pages":"1-1"},"PeriodicalIF":0.0,"publicationDate":"2015-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70965838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-02-18DOI: 10.4172/2090-4886.1000120
Sameer Kumar Meher, P. Manjusha, ey
Over the past few years, the concern of security is increasing day by day. Without proper protection, any part of any network can be susceptible to attacks or unauthorized activity. Ring Signature is a type of digital signature that enable a user to sign a message so that ring of possible signers is identified without revealing exactly which member of that ring actually generated the signature. Ring signatures are completely ad-hoc in nature there is no requirement of any central authority or coordination among different users. In this paper, we review summarize the study of ring signature schemes and scrutinize their relationships with other existing cryptographic schemes and discuss the uses and the mechanism used by ring signature.
{"title":"A Survey on Security and Privacy in Wireless Sensor Network","authors":"Sameer Kumar Meher, P. Manjusha, ey","doi":"10.4172/2090-4886.1000120","DOIUrl":"https://doi.org/10.4172/2090-4886.1000120","url":null,"abstract":"Over the past few years, the concern of security is increasing day by day. Without proper protection, any part of any network can be susceptible to attacks or unauthorized activity. Ring Signature is a type of digital signature that enable a user to sign a message so that ring of possible signers is identified without revealing exactly which member of that ring actually generated the signature. Ring signatures are completely ad-hoc in nature there is no requirement of any central authority or coordination among different users. In this paper, we review summarize the study of ring signature schemes and scrutinize their relationships with other existing cryptographic schemes and discuss the uses and the mechanism used by ring signature.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":"4 1","pages":"1-3"},"PeriodicalIF":0.0,"publicationDate":"2015-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70964363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-01-09DOI: 10.4172/2090-4886.1000119
D. Rajagopal, K. Thilakavalli
New Approach to observe web Access beside Usage of information measure victimization Intrusion Detection System could be a comprehensive web use observation and news utility for company networks. It takes advantage of the very fact that the majority companies give web access through proxy servers, like MS ISA Server, MS Forefront TMG, WinGate, WinRoute, MS Proxy, WinProxy, EServ, Squid, Proxy Plus, and others. Whenever the user accesses several websites, transfer files or pictures, these actions were logged. The system processes these log files to supply system directors a good vary of report-building choices. It might build reports for individual users, showing the list of internet sites visited, beside elaborate classification of web activity (downloading, reading text, viewing footage, observation movies, paying attention to music, and working). This technique might produce comprehensive reports with analysis of overall information measure consumption, building easy-to-comprehend visual charts that show the areas wherever wasteful information measure consumption has eliminated. This new approach is employed to observation the web information measure employed by the user. victimization this technique will simply decide that user fill the information measure most heavily, when, and what specifically they transfer, what proportion time they pay on-line, and what knowledge transfer traffic they produce.
入侵检测系统可以为企业网络提供一种全面的网络使用情况观察和新闻工具。它利用了大多数公司通过代理服务器提供网络访问的事实,如MS ISA Server, MS Forefront TMG, WinGate, WinRoute, MS proxy, WinProxy, EServ, Squid, proxy Plus等。每当用户访问多个网站,传输文件或图片时,这些操作都会被记录下来。系统处理这些日志文件,为系统管理员提供多种报表构建选择。它可以为个人用户构建报告,显示访问过的网站列表,以及详细的网络活动分类(下载、阅读文本、观看录像、观察电影、关注音乐和工作)。该技术可以生成综合报告,分析总体信息度量消耗,构建易于理解的可视化图表,显示已经消除了浪费信息度量消耗的区域。这种新方法被用来观察用户使用的网络信息度量。受害这种技术将简单地决定用户填写信息量最多,何时,以及他们具体转移了什么,他们在线支付的时间比例,以及他们产生的知识转移流量。
{"title":"Monitoring Internet Access along with Usage of Bandwidth Using Intrusion Detection System","authors":"D. Rajagopal, K. Thilakavalli","doi":"10.4172/2090-4886.1000119","DOIUrl":"https://doi.org/10.4172/2090-4886.1000119","url":null,"abstract":"New Approach to observe web Access beside Usage of information measure victimization Intrusion Detection System could be a comprehensive web use observation and news utility for company networks. It takes advantage of the very fact that the majority companies give web access through proxy servers, like MS ISA Server, MS Forefront TMG, WinGate, WinRoute, MS Proxy, WinProxy, EServ, Squid, Proxy Plus, and others. Whenever the user accesses several websites, transfer files or pictures, these actions were logged. The system processes these log files to supply system directors a good vary of report-building choices. It might build reports for individual users, showing the list of internet sites visited, beside elaborate classification of web activity (downloading, reading text, viewing footage, observation movies, paying attention to music, and working). This technique might produce comprehensive reports with analysis of overall information measure consumption, building easy-to-comprehend visual charts that show the areas wherever wasteful information measure consumption has eliminated. This new approach is employed to observation the web information measure employed by the user. victimization this technique will simply decide that user fill the information measure most heavily, when, and what specifically they transfer, what proportion time they pay on-line, and what knowledge transfer traffic they produce.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":"4 1","pages":"1-22"},"PeriodicalIF":0.0,"publicationDate":"2015-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2090-4886.1000119","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70964191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-01-01DOI: 10.4172/2090-4886.1000135
D. Basu, G. S. Gupta, G. Moretti, X. Gui
In this paper, experiments are conducted to evaluate the efficacy of a novel adaptive power control algorithm in terms of energy efficiency in heart rate monitoring scenario of a mobile adult in a typical home environment. As part of health care, persons with heart related problems are required to be monitored by logging for example, their heart rate on a regular basis to check for any anomaly. At the same time, it is expected that the person in question should be able to move freely within the given facility. The wireless sensors that are attached to the person send periodic data to the central base station. Since the person is mobile, the distance between the transmitting sensor and the base station changes with time. Since the signal path-loss is primarily dependent on distance and the number and type of obstructions between the transmitter and the receiver, it may be wise to use transmission power control to modulate the transmit power. Using power control, the sensor can adjust the level that is sufficient to send the data through the wireless channel without wasting energy. Conservation of energy is critical in wireless sensor network scenarios because they are powered by batteries which have limited lifetime. A critical application like the heart rate monitoring sensor is expected to operate for a reasonable amount of time before the battery dies. The novel adaptive power control algorithm uses intelligent modulation methods to ramp up or ramp down the transmission power level as and when required. By this method, the operational lifetime of the wireless sensor can be extended. As part of the experimental methodology for this paper, two subjects of different age groups have been used. Experimental results show that there is at least a 12% increase in the energy savings using the proposed algorithm.
{"title":"Effectiveness of a Novel Power Control Algorithm in Heart RateMonitoring of a Mobile Adult: Energy Efficiency Comparison with FixedPower Transmission","authors":"D. Basu, G. S. Gupta, G. Moretti, X. Gui","doi":"10.4172/2090-4886.1000135","DOIUrl":"https://doi.org/10.4172/2090-4886.1000135","url":null,"abstract":"In this paper, experiments are conducted to evaluate the efficacy of a novel adaptive power control algorithm in terms of energy efficiency in heart rate monitoring scenario of a mobile adult in a typical home environment. As part of health care, persons with heart related problems are required to be monitored by logging for example, their heart rate on a regular basis to check for any anomaly. At the same time, it is expected that the person in question should be able to move freely within the given facility. The wireless sensors that are attached to the person send periodic data to the central base station. Since the person is mobile, the distance between the transmitting sensor and the base station changes with time. Since the signal path-loss is primarily dependent on distance and the number and type of obstructions between the transmitter and the receiver, it may be wise to use transmission power control to modulate the transmit power. Using power control, the sensor can adjust the level that is sufficient to send the data through the wireless channel without wasting energy. Conservation of energy is critical in wireless sensor network scenarios because they are powered by batteries which have limited lifetime. A critical application like the heart rate monitoring sensor is expected to operate for a reasonable amount of time before the battery dies. The novel adaptive power control algorithm uses intelligent modulation methods to ramp up or ramp down the transmission power level as and when required. By this method, the operational lifetime of the wireless sensor can be extended. As part of the experimental methodology for this paper, two subjects of different age groups have been used. Experimental results show that there is at least a 12% increase in the energy savings using the proposed algorithm.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":"2016 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2015-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70964717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-01-01DOI: 10.4172/2090-4886.1000137
A. Richardson, J. Rendall, Yong-Hsun Lai
Wireless sensor networks are comprised of low power devices with fixed energy stores. They often require long term operation for successful deployment so it is important to efficiently manage and track their energy usage. To effectively accomplish this across distributed networks requires methods which have low energy cost with minimal error. In this paper we present a straightforward model for energy consumption in wireless sensor networks which is light-weight and accurate. The model has been applied to a wireless sensor network developed by the Queen's University MEMs lab and is evaluated with a custom testbed. Through testing, the model is exposed to realistic disturbances of communication loss, battery effects and variable voltage supplies. It was shown that with 99% packet reception rates in the network, the model accurately estimates end node energy consumption with less than 5% error. These results were demonstrated across varying data rates, battery supply capacities, and runtimes up to full network lifetime.
{"title":"Light-Weight Energy Consumption Model and Evaluation for WirelessSensor Networks","authors":"A. Richardson, J. Rendall, Yong-Hsun Lai","doi":"10.4172/2090-4886.1000137","DOIUrl":"https://doi.org/10.4172/2090-4886.1000137","url":null,"abstract":"Wireless sensor networks are comprised of low power devices with fixed energy stores. They often require long term operation for successful deployment so it is important to efficiently manage and track their energy usage. To effectively accomplish this across distributed networks requires methods which have low energy cost with minimal error. In this paper we present a straightforward model for energy consumption in wireless sensor networks which is light-weight and accurate. The model has been applied to a wireless sensor network developed by the Queen's University MEMs lab and is evaluated with a custom testbed. Through testing, the model is exposed to realistic disturbances of communication loss, battery effects and variable voltage supplies. It was shown that with 99% packet reception rates in the network, the model accurately estimates end node energy consumption with less than 5% error. These results were demonstrated across varying data rates, battery supply capacities, and runtimes up to full network lifetime.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":"2016 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2015-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2090-4886.1000137","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70965066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-01-01DOI: 10.4172/2090-4886.1000117
N. NnamaniKelvin, Alumona Tl
This paper provides an extension of path loss prediction in urban city of Imo State of Nigeria with a measured set of propagation at 910 MHz band. This paper work discusses and implements Okumura, Hata, cost-231, walfisch-Ikegami model, Sagami-Kuboi Model even though Hata and cost-231 Hata Models are extensively used in path loss analysis for GSM and CDMA systems comparison with the set results developed. It is of utmost importance that this paper work guides network designers in mobile cellular propagation and inculcates an accurate method of designing, deploying and managing of their network for proper attenuation.
{"title":"Path Loss Prediction of Wireless Mobile Communication for Urban Areas of Imo State, South-East Region of Nigeria at 910 MHz","authors":"N. NnamaniKelvin, Alumona Tl","doi":"10.4172/2090-4886.1000117","DOIUrl":"https://doi.org/10.4172/2090-4886.1000117","url":null,"abstract":"This paper provides an extension of path loss prediction in urban city of Imo State of Nigeria with a measured set of propagation at 910 MHz band. This paper work discusses and implements Okumura, Hata, cost-231, walfisch-Ikegami model, Sagami-Kuboi Model even though Hata and cost-231 Hata Models are extensively used in path loss analysis for GSM and CDMA systems comparison with the set results developed. It is of utmost importance that this paper work guides network designers in mobile cellular propagation and inculcates an accurate method of designing, deploying and managing of their network for proper attenuation.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":"2015 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2015-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2090-4886.1000117","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70963919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-01-01DOI: 10.4172/2090-4886.1000136
Mohammed Ezz El Dien, A. Youssif, A. Ghalwash
Wireless Multimedia Sensor Networks (WMSNs), is a network of sensors which are limited in terms of computational, memory, bandwidth, and battery capability. Multimedia transmission over WSN requires certain Qos guarantees such as huge amount of bandwidth, strict delay and lower loss ratio, which makes transmitting multimedia content over it, is a challenging problem. Recently adopting cross-layer design in WMSNs proved to be a promising approach, which improves quality of service of WSN under various operational conditions. In this work, an energy aware framework for transmitting multimedia content over WSN (ECWMSN) is presented, where packet and path scheduling were introduced, so that It adaptably selects optimum video encoding parameters at application layer according to current wireless channel state, and schedules packets according to its type to drop less important packets in case of network congestion. Finally, path scheduling is introduced so that different packets types/priority is routed through suitable path with suitable Qos taking into consideration the network lifetime. Simulation results show that ECWMSN optimizes video quality and prolongs network lifetime.
{"title":"Energy-Aware Cross Layer Framework for Multimedia Transmission overWireless Sensor Networks","authors":"Mohammed Ezz El Dien, A. Youssif, A. Ghalwash","doi":"10.4172/2090-4886.1000136","DOIUrl":"https://doi.org/10.4172/2090-4886.1000136","url":null,"abstract":"Wireless Multimedia Sensor Networks (WMSNs), is a network of sensors which are limited in terms of computational, memory, bandwidth, and battery capability. Multimedia transmission over WSN requires certain Qos guarantees such as huge amount of bandwidth, strict delay and lower loss ratio, which makes transmitting multimedia content over it, is a challenging problem. Recently adopting cross-layer design in WMSNs proved to be a promising approach, which improves quality of service of WSN under various operational conditions. In this work, an energy aware framework for transmitting multimedia content over WSN (ECWMSN) is presented, where packet and path scheduling were introduced, so that It adaptably selects optimum video encoding parameters at application layer according to current wireless channel state, and schedules packets according to its type to drop less important packets in case of network congestion. Finally, path scheduling is introduced so that different packets types/priority is routed through suitable path with suitable Qos taking into consideration the network lifetime. Simulation results show that ECWMSN optimizes video quality and prolongs network lifetime.","PeriodicalId":91517,"journal":{"name":"International journal of sensor networks and data communications","volume":"5 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2015-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4172/2090-4886.1000136","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70964813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}