Sunteți pe pagina 1din 5

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 3, May June 2013 ISSN 2278-6856

Jamming Avoidance for Video Traffic in Wireless Sensor Networks


Sivapuja Srikanth Babu1, R. Konda Reddy2, P. Eswaraiah3, Supriya Sivapuja4, Srikar Babu S.V5
1

[M.Tech], PBR Visvodaya Institute of Technology & Science, Kavali, A.P, India

Associate Professor, Dept of CSE, PBR Visvodaya Institute of Technology & Science, Kavali, A.P, India

Associate Professor, Dept of MCA, PBR Visvodaya Institute of Technology & Science, Kavali, A.P, India
4

[M.Tech], PBR Visvodaya Institute of Technology & Science, Kavali, A.P, India
5

Associate consultant, OFSS, Bangalore

Abstract: In wireless sensor networks (WSN), nodes have


very limited power due to hardware constraints. Packet losses, long delay and, retransmissions resulting from jamming cost precious energy and shorten the lifetime of sensor nodes. Jamming is the main problem for video traffic in wireless sensor networks .Jamming in a wireless sensor network can cause missing packets, low energy efficiency and long delay. Jamming in the wireless sensor networks can be detected based on various parameters. Some of the parameters are internal queue length, service time of packets, load existing in channel, retransmission time of packet, delay, jitter, etc. Among all these parameters Average delay is the best parameter for jamming detection for video and other multimedia traffic in wireless multimedia network. Jamming can be detected either at sink or intermediate nodes. Whenever jamming has been detected at the intermediate node then immediately jamming is avoided by dynamically routing packets in an alternative energy efficient path. By detecting jamming in middle itself .we can reduce packet drops at intermediate node. Further the cost of retransmission of dropped packets will be significantly reduced.

Figure 1: Typical wireless sensor network Figure 1 shows the typical wireless sensor network that consist of multiple number of sensor nodes and one sink where data is collected are deployed in the sensing field. Recent years, WSNs have a great interest among researchers because of their potential in a wide variety of applications. However, there are some problem need to be overcome, for example, reliability data delivery, jamming control, energy conservation, security and management of a WSN itself. The most crucial requirement is reliable data transfer. The traffic will be bursty for multimedia application. Here huge amount of data is generated and which disseminated towards the base station. Depending on the application the data formats are different and there size of packets is also different. In that case the data traffic will not be same. The node must handle this traffic as well. All this different types of data will cause the jamming in the network. When the video traffic increases, then it may leads to jamming. Whenever a node detects that jamming is going to occur it will avoid further delay by forwarding the packets in an alternative path to the sink. 1.1 Root Cause of the Jamming The jamming may occur if the data transmission rate of previous node is high than the data processing rate of

Index Terms: Wireless Networks, Sensor, Jamming detection, jamming avoidance, reliable, Video, Delay.

1. INTRODUCTION
Wireless Sensor Networks (WSNs) have emerged as an important new area in wireless technology. WSNs can provide low cost solution to variety of real-world problems. Sensors are low cost tiny devices with limited storage, computational capability and power. A WSN consisting of tiny devices which monitor physical or environmental conditions such as temperature, pressure, motion or pollutants etc. Such sensor networks are expected to be widely deployed in a vast variety of environments for commercial, civil, and military applications such as surveillance, vehicle tracking, climate and habitat monitoring.

Volume 2, Issue 3 May June 2013

Page 293

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 3, May June 2013 ISSN 2278-6856
this node. So the nodes are provided with the buffers to hold the extra packets that are received from previous node and can be used for further processing to avoid the loss of packets. Jamming causes many problems when sensors receives more packets than that its buffer space, the excess packets has to be dropped energy consumed by sensor nodes on the packet is wasted. And if further packet has traveled, the more waste is, which in turn diminish the network throughput and reliable data transmissions. Jamming control studies how to recover from jamming. Jamming avoidance studies how to prevent jamming from happening for this we have to monitor the parameters which can helps us to avoid jamming in WSN. excessive packets along multiple paths where the idle or under-loaded nodes are sufficiently utilized in response to jamming under the fidelity requirements 2.4 CODA In CODA [2], they present a detailed study on jamming avoidance in sensor networks. The basic idea is that as soon as jamming occurs, the source (or an intermediate node) sending rates must be reduced to quickly release the jamming. In the simple case, as soon as a node detects jamming, it broadcasts a backpressure message upstream. An upstream node that receives the backpressure can decide to drop packets, preventing its queue from building up and thus controlling jamming. If multiple sources are sending packets to a sink, CODA also provides a method of asserting jamming control over these multiple sources by requiring constant feedback (ACKs) from the sinks. If a source does not receive the ACKs at predefined times, it will start throttling the sending rates. 2.5 SCTP In a WSN, the data traffic load is not evenly distributed over the nodes. For example, the sensors which are one hop away from the sink relay the entire networks data traffic. This imbalanced data traffic load distribution can degrade the network's lifetime and functionality. Then by adjusting the reporting rate of the node to the sink, we can somewhat reduce the non linearity in the traffic load. If reporting rate is very low, then it is assume that there may be chances of the jamming. ESRT [3] will give the reliability along with the jamming control with the use of the reporting rate. 2.2 EDCAM By having early detection of the buffer, we can initiate the process of the feedback to control the jamming. This scheme is better as compare to the waiting for jamming to happen and then to take corrective action. The modified EDCAM (Early Detection Jamming Avoidance Mechanism) Algorithm will be still better as we have included the priority bit along with the jamming notification bit. This will aid the conveyance of the choke packet to reach up to the neighboring nodes. 2.3 TADR A traffic-aware dynamic routing (TADR) algorithm is proposed to route packets around the jamming areas and scatter the excessive packets along multiple paths consisting of idle and under-loaded nodes. TADR algorithm is designed through constructing a mixed potential field using depth and normalized queue length to force the packets to steer clear of obstacles created by jamming and eventually move towards the sink. Trafficaware dynamic routing (TADR) algorithm to route packets around the jamming areas and scatter the Volume 2, Issue 3 May June 2013 Sensor Transmission Control Protocol (SCTP) [5] is a generic, scalable and reliable transport layer protocol where a majority of the functionalities are implemented at the base station. STCP offers controlled variable reliability, jamming detection and avoidance, and supports multiple applications in the same network. Data packets take an important role in maintaining the jamming information. STCP also has some performance problem which is SCTP assumes that all the sensor nodes within the WSN have a clock synchronization.

2. LITERATURE SURVEY
There are different methods are existing to detect the jamming. 2.1 Reporting Rate

3. PROPOSED WORK
Jamming in the sensor network can be detected based on various parameters. Some of the parameters listed in the paper are internal queue length, service time of packets, load existing in channel, retransmission time of packet, delay, jitter etc. Jamming can be detected either at the sink or at intermediate nodes. Several protocols have been proposed based upon the location at which the jamming can be detected. Different protocols use different metrics as parameter for detection of jamming in the network. The different metrics used for selecting the best parameter for jamming detection are cost, impact on quality of video, locality or being global in the network, false positivity and speed of jamming detection. The work has concluded that delay is the best parameter for jamming detection for video and other multimedia traffic in Wireless Multimedia Sensor Networks. Here I will be using the delay parameter as a metric for jamming detection. Because it has been proved that it is the best suitable parameter for jamming detection. Further rather than detecting jamming at the sink, we will detect jamming at the intermediate nodes which are involved in forwarding the packets from source to destination. Also we can detect jamming faster at the early stage itself. Page 294

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 3, May June 2013 ISSN 2278-6856
Initially the data will be forwarded from source to destination by using a routing algorithm which is suitable for WSNs. The jamming detection strategy will be implemented across all the sensor nodes and the nodes which are involved in routing the data will check whether jamming has occurred or not. The metric which is used for detecting jamming is average delay. With the average delay metric we can detect jamming in a faster way. Whenever a node detects that jamming is going to occur it will avoid further delay by forwarding the packets in an alternative path to the sink. Whenever jamming has been detected at the intermediate node further packets will be forwarded dynamically in a different route to the sink until the jamming alleviates in the main path. At the sink the packets will be collected and ordered. Coming to the title of the paper the proposed method is named as Reliable and Energy-Aware Jamming detection and avoidance algorithm. It is reliable because whenever there is jamming in the network further packets will be transmitted in a different path rather than discarding the packets. Coming to the second jargon term Energy-Aware, is explained as follows. Before forwarding the packets in an alternative path we are going to check whether those nodes have the minimum energy to participate in the routing process. If not, another set of nodes will be selected and the packets will be sent to only those nodes which have the minimum power to transmit the packets. 3.1 Jamming Detection So far, various methods are proposed in WSNs each of which using one parameter for jamming detection. Selecting this parameter is based on various factors, some of which being: network structure, data transmission rate, traffic pattern, jamming probability, type of network applications and QoS requirements of them, jamming effect on applications and network resources [3]. Table 1 shows jamming detection parameters along with their related protocols. Besides, it is illustrated that which parameter is applied to what type of nodes. In each method to make out which node is in charge of jamming detection is dependent on the parameter nature. For example using queue length is tapped only in intermediate nodes and in networks with end to end retransmission, retransmission time is only used in Sink to detect jamming. Naturally parameters that are applicable to all of nodes are more flexible since depending on network conditions and requirements it is possible to determine location of detecting jamming. For example, if speed of jamming detection is at question, we can do it in intermediate nodes and if reducing load of sensor nodes is aimed, it is possible to use sink node for jamming detection. In what follows, all of jamming detection parameters are examined and eventually we select the most suitable parameter. Metrics of comparison is the cost, impact on quality of video, locality or being global in the network and false positivity and speed of jamming detection Volume 2, Issue 3 May June 2013 Table 1: Illustration of Jamming Parameter and Node Location

3.1.1 Cost of jamming detection One of the comparison metrics in jamming detection is the cost. Some methods have overhead cost. Method with lower cost is most convenient in sensor networks. This cost is evaluated in two aspects: power overhead and processing overhead. Processing overhead: According to Table 1 the parameters that are involved in intermediate nodes such as queue length, channel load or power variance have more processing overhead because of large amount of load on intermediate nodes. Power overhead: This cost is the amount of energy that is consumed for jamming detection. These parameters are classified in three categories: Sensing the channel Using extra packets. Low cost Some methods do not necessitate extra cost for jamming detection. These methods are the most suitable for jamming detection in WMSNs. In Table 2 all methods are classified based on cost. Jamming detection parameters that are classified under two first classes consume large amount of energy and so are not suitable for WMSNs. Some of jamming detection methods requires synchronization. In this paper we have not considered synchronization between sensor nodes.

Page 295

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 3, May June 2013 ISSN 2278-6856
The methods described here may be used without synchronization between nodes by some heuristics. In what follows we examine remaining parameters in two last classed of the table 3.1.2 Effect of Jamming Detection on Quality of Received Video As we know delay, jitter and packet loss are metrics of quality of service. Among the parameters remaining from previous section, delay and jitter comply with quality of service. Other parameters such as queue length, service time of packets or inter-arrival time of packets are indirectly affect the quality of service. Reducing these parameters causes the decrease of delay and as a result enhancement of the quality of received video. Every protocol that is proposed for WMSNs should take these parameters into account. By bringing these parameters into consideration we can provide quality of service of applications in transport layer. For example if delay is used for jamming detection, threshold of delay can be adjusted to comply to play-out time in receiver. In Table 3 each of the remaining parameters of previous section is classified based on effect on quality of service. 3.1.3 Jamming Misdetection Another criterion for jamming detection parameter assessment is that how accurately that parameter detects jamming. The more that parameter accurately detect Table 2: Cost of Jamming Detection Table 3: Quality of Video

But source node in video traffics transmit packet in different intervals (packets belonging to different frame types) and so sink cannot determine whether the interval between receiving packets are due to jamming or for another reason. So this parameter is not convenient for our video network. 3.1.4 Speed of jamming detection Quick jamming control depends on two factors: quick jamming detection and suitable rate adjustment. Delay is accurate in jamming detection and it quickly detects jamming in network. The other advantage is that it can be used in either sink or in intermediate nodes. This leads to more flexibility in usage. 3.2 Jamming Avoidance Once the jamming detection is done by using delay parameter then jamming avoidance will be done by rerouting the packet by energy aware routing. We consider two situations .one is before applying dynamic routing how many packets are dropped and after applying dynamic routing how the packet drops are reduced and network life increases.

Jamming the more is convenient for this task. Misdetection occurs in two cases: upcoming jamming is not detected and a notified jamming is not an actual jamming that is going to occur. For investigating this issue firstly we should get traffic pattern and then we should consider change in jamming detection parameters so that accuracy or misdetection of them is recognized. Volume 2, Issue 3 May June 2013

Figure 2: Packets/sec dropped before and after applying Dynamic Routing Page 296

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 3, May June 2013 ISSN 2278-6856 4 CONCLUSION
According to what proceeded in this paper we conclude that delay is the best parameter for jamming detection for video and other multimedia traffic in WMSNs. By detecting the jamming by using delay parameter, jamming can be avoided by forwarding the packets in energy efficient route. By dynamic routing number of packet drops will be reduced. By detecting jamming in the middle itself we can reduce packet drops at intermediate nodes. Further the cost of retransmission of dropped packets will be significantly reduced. Assistant Professor and had 1 year of teaching experience. R. KondaReddy has received his MCA degree at Sri Krishna Devaraya University Campus College affiliated to Sri Krishna Devaraya University in 2000 and M.Tech degree in Computer science from Allahabad Agriculture Institute Deemed University in 2006. Now he is pursuing Ph.D from Rayalaseema University. He is dedicated to teaching field from the last 11 years. He has guided 15 P.G and 40 U.G students. His research areas included Computer Networks/Manets Routing. At present he is working as Associate Professor in PBR Visvodaya Institute of Technology & Science, Kavali, Andhra Pradesh, India. P. Eswaraiah has received his MCA degree at Nava Bharathi College of P.G Studies, Hyderabad affiliated to Osmania University in 1997. Now he is Pursuing Ph.D from S.V. University. He is dedicated to teaching field from the last 14 years. He has guided 20 P.G and 30 U.G students. His research areas included Data Warehousing. At present he is working as Associate Professor in PBR Visvodaya Institute of Technology & Science, Kavali, Andhra Pradesh, India.
4 3 2

References
[1]. I.F. Akyildiz, T. Melodia, K. Chowdhury, "A survey on wireless multimedia sensor networks," Computer Networks 51 (2007) 921960. [2]. C.Y. Wan, S. B. Eisenman, A. T. Campbell, "CODA: Congestion detection and avoidance in sensor networks," In Proc. of the First International Conference on Embedded Networked Sensor Systems (Sensys) 2003 Los Angeles 266-279. [3]. Hemmat Sheikhi, Congestion Detection for Video Traffic in Wireless Sensor Networks. 978-1-61284459-6/11/$26.00 2011 IEEE [4]. Ying Ouyang, F. ren, Chuang lin, Tao He, Chao Li, Yada Hu, Hao Wen,A simple active congestion control in Wireless Sensor Network, MASS 07, IEEE conference on Mobile sensor adhoc system, Pisa. [5]. Jaewon KangTARA: Topology-Aware Resource Adaptation to Alleviate Congestion in Sensor Networks [6]. Iyer, Y.; Gandham, S. and Venkatesan, S. STCP:A Generic Transport Layer Protocol for Wireless Sensor Networks. Proceedings of IEEE ICCCN 2005, San Diego, CA, USA, October 2005. [7]. O.Akan, I.F. Akyildiz, "Event-to-sink reliable transport in wireless sensor networks," IEEE/ACM Transactions on Networking 13 (2005)10031017 [8]. The network simulator(ns2)is downloaded/available from http://www.isi.edu/nsnam/ns [9]. Upstream Hop-by-Hop Congestion Control in Wireless Sensor Networks Guangxue Wang and Kai Liu School of Electronics and Information Engineering Beijing University of Aeronautics and Astronautics, Beijing, 100191, China 2009. AUTHORS S. Srikanth Babu has received his MCA degree at A.V.S College of engineering &Technology, Venkatachelam affiliated to JNTUA in 2010 and pursuing M.Tech in computer Science and Engineering at PBR Visvodaya Institute of Technology & Science (20112013), Kavali affiliated to JNTUA. He worked as
1

Supriya sivapuja has received her MCA degree at Annamacharya Institute of Technology & Sciences, Rajampet affiliated to JNTUA in 2009 and pursuing M.Tech in computer Science and Engineering at PBR Visvodaya Institute of Technology & Science (20112013), Kavali affiliated to JNTUA. She worked as Assistant Professor in Audisankara College of Engineering and Technology, Gudur, Andhra Pradesh, India and had 2 years of experience in teaching.
5

Srikar Babu S.V. has received his B.Tech degree in Electronics and Communication Engineering at Priyadarshini College of engineering & Technology, Kanaparthipadu affiliated to JNTUA in 2012. Currently, he is working as Associate consultant in OFSS, Bangalore.

Volume 2, Issue 3 May June 2013

Page 297

S-ar putea să vă placă și