Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

PDF

International Conference on Information and Communication Technologies

Conference

Routing protocols

Publication Year

Articles 1 - 5 of 5

Full-Text Articles in Physical Sciences and Mathematics

Networks - I: A Dynamic Transmission Power Control Routing Protocol To Avoid Network Partitioning In Wireless Sensor Networks, Ghufran Ahmed, Noor M. Khan, Mirza M Yasir Masood Jul 2011

Networks - I: A Dynamic Transmission Power Control Routing Protocol To Avoid Network Partitioning In Wireless Sensor Networks, Ghufran Ahmed, Noor M. Khan, Mirza M Yasir Masood

International Conference on Information and Communication Technologies

Power utilization in an efficient manner is a hot research issue in wireless sensor networks (WSNs). WSNs consist of energy hungry sensor nodes. Researchers have been trying to increase the lifetime of WSN since the development of WSN technology. Dynamic Transmission Power Control (DTPC) is a method for an efficient utilization of the energy resource and thus leads to an increase in lifetime. It has been used for the determination of minimum transmission power. A valuable study about the impact of variable transmission power on link quality has already been present in literature. In contrast to DTPC, transmitting data at …


Networks - I: A Comparative Analysis Of Energy-Aware Routing Protocols In Wireless Sensor Networks, Mohsin Raza, Ghufran Ahmed, Noor M. Khan, M Awais, Qasim Badar Jul 2011

Networks - I: A Comparative Analysis Of Energy-Aware Routing Protocols In Wireless Sensor Networks, Mohsin Raza, Ghufran Ahmed, Noor M. Khan, M Awais, Qasim Badar

International Conference on Information and Communication Technologies

This paper presents the implementation of two routing protocols for Wireless Sensor Networks (WSNs): GRACE (GRAdient Cost Establishment for Energy Aware routing) and GRAB (GRAdient Broadcasting) along with their comparative analysis using Sun SPOT sensor nodes, developed by Sun Microsystems. The performance of both the routing protocols is evaluated on the basis of various performance metrics including network lifetime, throughput and network energy etc. However in papers where these routing protocols presented, practical limitations of wireless sensor nodes were ignored. The communication of sensor nodes is established using multiple communication channels for proper implementation of both the routing protocols, GRACE …


Wireless Networks: Spert: A Stateless Protocol For Energy-Sensitive Real-Time Routing For Wireless Sensor Network, Sohail Jabbar, Abid Ali Minhas, Raja Adeel Akhtar Aug 2009

Wireless Networks: Spert: A Stateless Protocol For Energy-Sensitive Real-Time Routing For Wireless Sensor Network, Sohail Jabbar, Abid Ali Minhas, Raja Adeel Akhtar

International Conference on Information and Communication Technologies

Putting constraints on performance of a system in the temporal domain, some times turns right into wrong and update into outdate. These are the scenarios where apposite value of time inveterate in the reality. But such timing precision not only requires tightly scheduled performance constraints but also requires optimal design and operation of all system components. Any malfunctioning at any relevant aspect may causes a serious disaster and even loss of human lives. Managing and interacting with such real-time system becomes much intricate when the resources are limited as in wireless sensor nodes. A wireless sensor node is typically comprises …


Networks - Ii: Overhead Analysis Of Security Implementation Using Ipsec, Muhammad Awais Azam, Zaka -Ul- Mustafa, Usman Tahir, S. M. Ahsan, Muhammad Adnan Naseem, Imran Rashid, Muhammad Adeel Aug 2009

Networks - Ii: Overhead Analysis Of Security Implementation Using Ipsec, Muhammad Awais Azam, Zaka -Ul- Mustafa, Usman Tahir, S. M. Ahsan, Muhammad Adnan Naseem, Imran Rashid, Muhammad Adeel

International Conference on Information and Communication Technologies

Authentication, access control, encryption and auditing make up the essential elements of network security. Researchers have dedicated a large amount of efforts to implement security features that fully incorporate the use of all these elements. Currently, data networks mainly provide authentication and confidentiality services. Confidentiality alone is not able to protect the system, thus, suitable security measures must be taken. However, this security is itself an overhead which must be accounted for. A trade-off must exist between performance and security. This trade-off must be carefully managed so as not to deteriorate the systems being secured. This calls for the true …


Poster Session A: Analyzing & Enhancing Energy Efficient Communication Protocol For Wireless Micro-Sensor Networks, Irfan Majeed Butt, Shoab Ahmed Khan Aug 2005

Poster Session A: Analyzing & Enhancing Energy Efficient Communication Protocol For Wireless Micro-Sensor Networks, Irfan Majeed Butt, Shoab Ahmed Khan

International Conference on Information and Communication Technologies

The paper presents an analysis of energy efficient routing protocols with direct communication protocol. A comparison of these protocols is made analyzing energy consumption at each node and explaining system lifetime after certain rounds. The paper also proposes a novel energy conscious cluster head selection algorithm for making system more reliable and efficient. Simulation shows that our proposed algorithm enhances the system reliability and accuracy.