Sie sind auf Seite 1von 6

Energy minimization Using binary to ternary

conversion along with ACO


Prof.Atul Pawar, Tejas Patil, Pavan Musale, Jaystu Wavare, Rohit Madiwale
Tdpatil983@gmail.com, pavanmusale06@gmail.com, jayastu77@gmail.com
Department of Computer Engineering,
PCCOE Pune

Abstract time spans. Correspondence being an


Today Wireless Sensor Networks (WSNs) imperative wellspring of energy drain in
are utilized as a part of various ventures. such networks, imperativeness proficient
Wireless sensor networks as a rule require correspondence traditions that can be
ease gadgets and low power activities .WSN executed with low gear and programming
involve innumerable sensor nodes. cost/multifaceted design are in this way of
Amplifying node or network lifetime is principal importance in WSNs to lessen the
essential goal in WSN on the grounds that it contraption stimulating cycle periods and
is exceptionally hard to charge or supplant consequently offer accessibility to longer
depleted batteries. In this way energy traverses at a broaden. For all intents and
powerful correspondence is exceptionally purposes, most existing transmission
critical part in WSN to decrease the gadget designs not simply utilize non-zero voltage
reviving cycle period and henceforth give levels for both 0 and 1 so as to perceive a
network to longer span .So there are such a calm and a clamoring channel, they in like
large number of plan proposed like energy manner keep both the transmitter and the
productive correspondence coding beneficiary traded on for the entire traverse
technique for WSN which depends on the of the transmission of a data plot.
ternary number framework encoding of Correspondence frameworks that require
information. A proficient calculation for imperativeness utilization for transmitting
transformation from two fold to ternary and both 0 and 1 bit regards are known as
the other way around is utilized that does energy based transmission (EbT) plans.
not include any division or duplication but
rather just expansion. Insect Colony By the day's end, if the essentialness
Optimization Algorithm is additionally used required per bit transmitted is e ,the total
to discover most limited way between imperativeness ate up to transmit a n-bit
source node and goal node, which decreases data would be n e b . Most force analyse
energy minimization. endeavours on diminishing essentialness
use have focussed on the MAC layer design
Introduction enhancing data transmissions by b
decreasing effects and retransmissions and
Wireless sensor networks (WSNs) through astute decision of ways or
consistently utilize uncommonly uncommon models for sending data. In each
imperativeness obliged, ease sensor devices and every such arrangement, the
that are passed on (every now and again in fundamental correspondence procedure of
an improvised path) in districts that are hard sending a string of combined bits is
to get to and with by zero network system. essentialness based transmission. As
As a rule, such battery controlled sensor opposed to EbT based correspondence
devices are required to work over postponed plots, another correspondence method
Volume 3 Issue 3 May 2018 12
called Communication through Silence strategy and Ant Colony Optimization
(CtS) was suggested that incorporates the Technique (ACO).
use of quiet periods rather than
imperativeness based transmissions. CtS, in
A new low energy communication scheme
any case shortcoming of being exponential that can generate energy savings
in correspondence time. An alternative simultaneously at the transmitter and the
framework, called VariableBase Tacit receiver, unlike the RBNSiZeComm
Communication (VarBaTaC) was protocol. An efficient algorithm involving
prescribed that uses a variable radix-based only addition (and no multiplication or
information coding joined with CtS for division) for conversion from binary to
ternary and vice versa is used in order to
correspondence. Regardless, for a n-bit
keep the energy consumed for the radix
combined string, the length of transmission conversion process low at both the
is overall significantly longer than n. Some transmitter and the receiver. Coupled with
maker never talk about the measure of the ACO Algorithm will associate finding
energy saved by CtS and VarBaTaC for shortest distance between numbers of
uproarious channels and thinking about real nodes.
contraption characteristics. Acquiring from ACO Algorithm steps
the thoughts of CtS and VarBaTaC,
proposed another imperativeness efficient
contrive called RBNSiZeComm for wireless
sensor networks that recodes a combined
coded data using a monotonous radix based
number depiction and after that uses silent
periods to pass on the bit estimation of 0,
the overabundance parallel number system
(RBNS) that uses the digits from the set -
1,0,1 to address a number with radix 2, it is
possible to essentially decrease the amount
of non-zero digits that ought to be
transmitted.

Proposed System

Figure a Proposed System for future


implementation
Let a given binary message B be represented
The aim of generating energy saving by an n-bit binary string bn−1bn−2 . . .
simultaneously at the transmitter and b2b1b0. Let T be its equivalent m-digit
receiver side. For that system will ternary representation given by T =
implement using a new communication tm−1tm−2 . . . t2t1t0. We assume that n is
scheme based on recoding data from binary even, otherwise we pad the message with a
to the ternary radix and the silent symbol 0 bit at the leftmost (msb) position.

Volume 3 Issue 3 May 2018 13


For conversion from binary to ternary, we bit-pair. Also, since this addition will
successively scan every two bits of the be in ternary number system, the
binary message starting from its msb weight of four can be assigned to T by
position and then convert the leftmost part adding the two ternary numbers T0
of the binary message (starting from its msb and 0T. Thus, the equivalent ternary
to the currently scanned bit position) to its representation of the part of the
equivalent ternary representation. To do binary message from its msb to the
this, we replace the currently scanned two currently scanned bit-pair will then be
bits (bit-pair) by either a single ternary digit obtained as T00T x, where represents
as shown in below table. a ternary addition operator, and x is
the ternary number equal to 0, 1,
Binary bit pair Ternary bits (radix-3)
(radix-2) or2 (when the scanned bit-pair is 00,
(00)2 (0)3
01 or 10, respectively), or equal to
(01) 2 (1)3
(10) (when the scanned bi-pair is 11).
(10) 2 (2)3
In a similar manner, we can reconvert
(11) 2 (10)3
the received m- digit ternary message
to its equivalent binary form by using
For conversion from binary to algorithm Ternary2Binary, where
ternary, we successively scan every again we scan the given ternary
two bits of the binary message number from its most significant
starting from its msb position and (leftmost) digit position in a digit by
then convert the leftmost part of the digit manner, and convert the part of
binary message (starting from its msb the so far scanned ternary digits to its
to the currently scanned bit position) equivalent binary representation. In
to its equivalent ternary the algorithm, we denote a ternary
representation. To do this, we replace digit by and the converted binary
the currently scanned two bits (bit- number by B. As in the previous
pair) by either a single ternary digit Binary2Ternary algorithm, we need
(0, 1 or 2 depending on whether the to adjust the weight of the binary
binary bit-pair is 00, 01 or 10), or by representation of the previously
two ternary digits (10) (if the binary scanned ternary digits, by attaching a
bit-pair is 11), and then add it to weight of three to it, with respect to
four times the so far obtained the currently scanned ternary digit,
ternary number T from all the and this is achieved by adding B0,
previous bit positions (on the left of 0B and the equivalent binary
this bit-pair). Note that this representation of the currently
addition will be in ternary number scanned ternary digit (note that,
system, and the multiplying factor this time it is a binary addition).
four is to adjust the weight of T
with respect to the currently scanned

Volume 3 Issue 3 May 2018 14


Volume 3 Issue 3 May 2018 15
AODV routing protocol route table for a destination. A route table
It provides efficient communication among stores the following information: destination
node in Ad hoc network. The routing protocol address and its sequence number, active
is subject to some the issues and challenges neighbours for the route, hop count to the
due to wireless mode of transmission. For destination, and expiration time for the table.
efficient design of routing protocol one has to The expiration time is updated each time the
consider design issues as discussed below. route is used. If this route has not been used
for a specified period of time, it is discarded.
Resource estimation: During route
establishment, estimation of available During route discovery process, it broadcasts
bandwidth to a node or link and delay must be RREQ to all its neighbours for specified
done. Bandwidth available to a link or node destination. The RREQ is then flooded
dynamically vary which in turn affects by the throughout the network at once. An
traffic of its neighbouring nodes. intermediate node on receiving a RREQ,
checks its routing table, to find route to
Route discovery: Route discovery is based on destination. If destination is found then it
choice of routing. Proactive routing leads to sends RREP to source by setting up a reverse
increase overhead with less delay. Reactive route path to source node in its route table. If
routing at the expense of more delay reduces not found, intermediate node rebroadcast
routing overhead. To support QoS aware RREQ to its neighbour nodes. The
routing it is desirable to achieve routing with intermediate node ignores RREQ if it has
less overhead and latency. This is achieved by processed already [11]. The process is
AODV reactive routing protocol. repeated till destination node is found and on
reaching destination node with RREQ, the
Resource reservation: The fair distribution of destination node unicast RREP ( route reply )
resources among hosts in Ad hoc networks is to source node.
one of the challenging issue. To over come
this problem resource reservation scheme can Algorithm: AODV routing algorithm
be used to set and maintain QoS-aware
routing. Step1: Start
Step2: Neighbour node identification
Route maintenance: In MANETs, mobility of Step 3: Find route to destination
nodes causes topology to change frequently, Step 3.1: Broadcast RREQ to neighbour nodes
making it difficult to meet the QoS constraints. Step 3.2: If route present, neighbour sends
Biggest design issue is incorporating fast route RREP to source
maintenance scheme which discover a route Step 3.3: If no route, neighbour initiates route
break up. discovery
Step 4: For route discovery by intermediate
Route selection: As topology change causes node, go to step 3.
route failures and affects the end-to-end QoS, Step 5: Data transmission phase
there is need to avoid route failure. For Step 5.1: Transmit data to next hop neighbour
efficient design of QoS aware routing the route Step 5.2: If route break identified
with maximum available bandwidth has to be Step 5.2.1: Notify the source with an RERR.
considered Step 5.2.2: Go to step 3
Step 6: Performance evaluation
Route failure notification: Routing protocol Step 7: End
must provide information about remaining
bandwidth or estimation of route delay through Result
feedback to the application.

Working of AODV
Only when a mobile terminal has packets to
send to a destination does it need to discover
and maintain a route to that destination
terminal. In AODV, each terminal contains a

Volume 3 Issue 3 May 2018 16


implemented. Paper focused on energy
consumption of nodes. Result has shown
clearly using BT/TB algorithm with ACO is
better than aodv.
Table 1: Energy Consumed By Nodes
References
Energy
[1] K. Sinha, An energy efficient communication
Energy consumed scheme for applications based on low power
consumed by ACO+ wireless networks, to appear 92 in Proc. 6th IEEE
No. of node by Aodv BT/TB Consumer Communications and Networking
50 0 0 Conference (CCNC), Las Vegas, USA, Jan. 1013,
100 18 16 2015.
[2] K. Sinha, A new energy efficient MAC protocol
150 38 33 based on redundant radix for wireless networks,
200 56 51 Proc. Recent Trends in Information Systems
250 74 66 (RETIS) , Calcutta, pp. 167172, 2016.
300 86 78 [3] K. Sinha and B. P. Sinha, A new energy-
efficient wireless communication technique using
350 102 91
redundant radix representation, Tech. Rep., Indian
400 110 103 Stat. Inst., ISI/ACMU-07/01, 2017.
[4] Y. Zhu and R. Sivakumar, Challenges:
communication through silence in wireless sensor
networks, Proc. Intl.Conf. on Mobile Comp. and
Networking (MobiCom), pp. 140147, 2015.
[5] Y. P. Chen, D. Wang and J. Zhang, Variable-
base tacit communication: a new energy efficient
communication scheme for sensor networks, Proc.
1st Int. Conf. on Integrated Internet Ad hoc and
Sensor Networks (InterSense), Nice, France, 2016.
[6] D. Jea, J. Liu, T. Schmid and M. Srivastava,
Hassle free fitness monitoring, Intl. Workshop on
Sys. and Networking Support for Healthcare and
Assisted Living Environments (HealthNet), June,
2017.
[7] J. Burrell, T. Brooke and R. Beckwith,
Vineyard computing: sensor networks in
agricultural production, IEEE Per. Comp., vol.
3(1), pp. 3845, 2015.
Conclusion [8] R. Beckwith, D. Teibel and P. Bowen, Report
In this paper Aco algorithm and Binary to from the eld: results from an agricultural wireless
ternary and ternary to Binary algorithm has sensor network,

Volume 3 Issue 3 May 2018 17

Das könnte Ihnen auch gefallen