Home > Computer science essays > TARGET TRACKING FOR NOVEL TRACE BASED GEOCAST REGION

Essay: TARGET TRACKING FOR NOVEL TRACE BASED GEOCAST REGION

Essay details and download:

  • Subject area(s): Computer science essays
  • Reading time: 8 minutes
  • Price: Free download
  • Published: 15 October 2019*
  • Last Modified: 22 July 2024
  • File format: Text
  • Words: 1,645 (approx)
  • Number of pages: 7 (approx)

Text preview of this essay:

This page of the essay has 1,645 words.

TARGET TRACKING FOR NOVEL TRACE BASED GEOCAST REGION USING NEIGHBORING IN WIRELESS AD HOC NETWORK

Table of Contents

Abstract

In ad hoc network, Geocast tracking is strongly together to the requirements of a data gathering task, and hereafter the request semantics. This paper presents the novel trace based Geocast region tracking mechanism, in which mechanism is expressed as a combined optimization of data transport and data aggregation in particular region. The mechanism detached is to minimize communication cost while exploiting data gain, differing from directing thoughts for additional general ad hoc networks. The paper uses the real problem of locating and tracking possibly moving region to next Geocast region as an example of information generation processes, and considers two common information extraction region in an ad hoc network. We originate information limitations from realistic region tracking model, in addition present several tracking algorithms that discovery near-optimal resolutions for the correct section tracking problem. Simulation results have established that information-directed tracking is an important improvement over a previous ones, as measured by quality such as localization and tracking accuracy and communication superiority such as achievement rate in network.

Keywords:

Realistic region tracking, Geocast region, Novel trace region tracking, Adhoc network.

 

INTRODUCTION:

In this paper, we first present a new novel trace based Geocast region in adhoc networks. We do not brand any restrictions on the form of the Geocast region. The planned techniques reduces energy consumption during the point of sending data after the sink node region to the Geocast region and also simplifies in-network data aggregation and, consequently, saves vitality during the phase of recording adhoc data to the sink node. It can invented from either prohibited outside nodes or legal inside nodes which have been captured and compromised by enemies.

The last nodes are entitled malicious nodes region and issues from them are more problematic to detect than those from outside region. Very simple and strong but would not be very efficient. When using the above algorithm, observe that in the absence of transmission errors, the multicast packet would reach all nodes reachable from the sender region, not just the nodes in the multicast region. Using location information of the source and the specified multicast region, we attempt to reduce the number of nodes, outside the multicast region, to whom a multicast packet is propagated.

The ways how to effectively route the collected data among nodes are the utmost important topic in adhoc network because of the low powered sensor nodes. Based on the routing techniques and characteristics in network, many region tracking is proposed. The main design constraints and routing challenges that region tracking must face in wireless ad hoc networks.  Data delivery model overcomes the problem of fault tolerance domain by providing the alternative path to save its data packets from nodes or link failures.

It severely affect the region tracking in wireless adhoc network, especially with regard to use the limited energy of the node, data aggression using region tracking purpose, energy consumption and route immobility. The sink region sends Geocast region to certain regions and waits for data from the novel trace located in the selected regions. Since data is being requested through queries, attribute based naming is necessary to specify the properties of data.

Here data is usually transmitted from every adhoc region within the deployment region with significant redundancy. Hierarchical or cluster based methods are well known techniques with special advantage of scalability and efficient communication. Nodes region do different roles in the network. In novel trace based region tracking, nodes know where they are in a geographical region. Location information is used to improve the performance of routing and to provide new types of services in network.

RELATED WORKS:

All the entrant forwarders call off their timers when they hear the communication on or after the engaging fellow citizen. Here we can see that follows the same viewpoint as in seminal the next spread node [1, 2].  Three poles apart containment schemes are projected. The basic method consists only of cancelling timers after hearing a transmission from another neighbor. A second area-based scheme consists of defining a forward area. Three unlike areas are deliberate but the one achieve the best results is the triangle [3].

Finally a third inhibition mechanism called active containment is definite, which is in fact the same come within reach of. It allows the forward node to conclude which fellow citizen to select as next forwarder among the ones whose frames were acknowledged.  Then the packet is broadcast to all the nodes in the Geocast region [4]. Although, most proposed Geocast protocols focus on the protocol for the first phase and assume the use of flooding for the second phase. .Flooding and gossiping are the most traditional network routing [5, 6].

They do not need to know the network topology or any routing algorithms. In flooding mechanism, each sensor receives a data packet and then broadcasts it to all neighboring nodes. When the packet arrives at the destination or the maximum number of hops is reached, the broadcasting process is stopped [7]. On the other hand, gossiping is slightly enhanced version of flooding where the receiving node sends the packet to randomly selected neighbors, which pick another random neighbor to forward the packet to and so on..

Although flooding is very easy, it has several drawbacks like implosion, overlap and resource blindness problem. GEAR (Geographic and Energy Aware Routing) algorithm is one notable Geocast protocol for sensor networks [8, 9]. It uses energy aware neighbor selection to route packet towards the Geocast region and uses Recursive Geographic Forwarding algorithm to disseminate the packet inside the Geocast region [10, 11].

During the first phase, when a node receives a command packet, among its neighbors GEAR picks the next hop minimizing the cost which is the combination of the distance to the Geocast region and the consumed energy. Gossiping avoid the problem of implosion by sending information to a random neighbor instead of classic broadcasting mechanism which send packets to all neighbors [12]. However, gossiping creates another problem of delay in a propagation of data among sensor nodes.

PROPOSED SYSTEM:

In our proposed system to assume that subsequently an adhoc network is organized, a new Geocast region cannot be additional but a Geocast tracking can fail to meaning possibly due to energy enervation and, consequently, authority the region in network. When an adhoc network is organized initially, all the adhoc nodes transmission a Geocast region to its 1-hop neighbors region. The preliminary Geocast region also contains the geographic location of the distribution node. After exchanging the preliminary region in network, every region knows the individuality and location of its 1-hop neighbors region. Then each Geocast region transmissions to its 1-hop neighbors the subsequent Geocast region which includes the identities and locations of 1-hop neighbors of the sender. After tracking the subsequent Geocast region, every node recognizes the identity and position of 2-hop neighbors region. The Novel Trace Based Geocast Region Tracking (NTB-GRT) description have continued originally delivered from the sink region data in network. When a Geocast node transmissions the region tracking to its 1-hop neighbors, it adds its sender set region to the Geocast region tacking in network.

Figure1: Proposed System Architecture.

Among its 1-hop neighbors region, a node chooses some nodes that are requested to rebroadcast the knowledge packet and the set of these designated nodes is called the contributor region set in network.

3.1 Novel trace based region tracking:

Every region in the multicast hierarchy reports its data to the sink along the multicast hierarchy and any in-between data can aggregate data conventional from its region. The planned Geocast region first finds a route since the sink node to the area using energy efficient algorithm in NTB-GRT and inside the Geocast region builds a multicast hierarchy by means of a new energy efficient broadcasting technique. Therefore, the energy consumption is concentrated during the region tracking phase. When data is collected and described toward the region, the data is delivered along the multicast tree. During the data delivery, all target region can function as a data aggregation point. Therefore, the subsequent multicast tree exploits the in-network data aggregation between Geocast nodes and reduces energy consumption during the target region data reporting phase.

Algorithm:

Input: Network Region NR.

Output: Target Region TR.

Step1: initialize starting Region, neighbor region

Step2: For each neighbor region Ni

Extract logs Nl = ∫_1^(region(L))▒〖L×Ni〗

Extract common regionpresent in Nl.

NR = Ω(Nl).

For each path p from Nr

Compute network access rate NTB-GRT = ∫▒〖(Np*〗target region)/NR

NTB(i) = NTB(i)+TR.

End.

End.

Step3:  For each Time window Ti

If NTB(Ti)> Threshold

Implication=false

Mark container source address of region as malicious node region.

Add node address to malicious list. Ml = Σregion(Ml)+TR.

End

End.

Step4: stop.

3.2 Region initializing and tracking using NTB-GRT:

To simplify the mechanism we assume that here is no region following by malicious nodes for the duration of a short intermission right after adhoc region are deployed. During this period adhoc region interconnect trusting each other. We also undertake that a Geocast region is equipped with a novel trace based region a corresponding all region before data aggression in addition deployed. Upon actuality deployed, location using the Geocast based area and stores this information. At a pre-specified period after the deployment, each Geocast region broadcasts its identity, location, and neighbor region in a network to its 1-hop neighbors region via the main Geocast region tracking. The subsequent region is exchanged as in development to all other region. The above process can be achieved during a short interval and it is not difficult to assume that there may be no concerns from malicious region tracking in network.

Algorithm:

Step 1 : Ri =calculate region distance and current position

Tj =current time

Step 2  : if  Ri< region tracking

Node i current location of the network

else

Update neighbor position

Update region position

End if

Step 3   :  if (  Ri <=Tj  )

Node i  (all node position)

Find the region i current position and time, Node i random moving, update Tj

 

Step 4:  if (average distance of region)

Every time location update

Selected best path route

Else

Update neighbor discovery region

End if

Step 5: set {region 1 …. n}..Geocast region {NTB-GRT}

Step 6: communication process started

Step 7: check the distance and position

Step 8: select {get_pos (distance) ={rp1,rp2,rp3 }

Step 9: if {RT==Geocast }

Calculate distance and update position communication process

Route discovery and route update

step1, step2, step3, step4 under process

Else if {RT==FSR}

Find current position and communication process

step1, step2, step3, step4 under process

Else if {RT==GRT}

Region to region communication process

Step 10: Follow step1-9 until the process complete

RESULTS AND DISCUSSION:

The proposed PAGRM with node region tracking method has been applied and tested for its effectiveness. The proposed method has produced efficient results in all the factors of ad hoc routing. The technique has produced higher resistance in adversary node identification and has produced higher rate of detection.

Graph1: Various types of region tracking

Figure 2: Performance of Throughput

The graph2 shows the performance of throughput value generated for different number of logs available. It shows that the proposed method has produces high throughput even at higher number of logs.

The novel trace based Geocast region tracking accuracy is computed according to the number of malicious region arrived at particular time window and number of packets analyzed as malicious region in network.

Figure3: Comparison of time complexity in region tracking

The graph3, shows the comparison of time complexity introduced by various methods in region tracking and it shows clearly that the proposed method has produced less time complexity than others.

5. CONCLUSION:

In this paper we obtainable a novel trace based Geocast region tracking for adhoc networks. The mechanism first finds a route from the sink region to a right of entry point in the Geocast region and then builds a multicast region tracking which has the access opinion as the region and the Geocast region as intermediate or the novel region in network.  After a region tracking sends a packet to another region, it monitors whether the receiver area processes the packet correctly and reports receiver’s doubtful behavior. But the problematic of detecting some tracking issues become complicated because, the detected issues region will send a repudiation message to complicate neighbor region.  So finally we get higher simulation throughput and more number of region is tracking in network.

References:

Prakash and prabakaran,“A Region Based Target Tracking for Geocast in Mobile Adhoc Networks”,Issue 1, May 2015.

Ahmed Helmy, “Architectural Framework for Large-Scale Multicast in Mobile Ad Hoc Networks”. April 2011

I. Stojmenovic, Voronoi Diagram and Convex Hull Based Geocasting and Routing in Wireless Networks,  1999.

W.H. Liao et al, GeoGRID: A Geocasting Protocol for Mobile Ad Hoc Networks Based on GRID,  2009

Y. Yu, R. Govindan, & D. Estrin, Geographical and Energy Aware Routing: A Recursive Data Dissemination Protocol for Wireless Sensor Networks,  2011.

C. Maihofer, “A survey of geocast routing protocols,” IEEE Communications Surveys, vol. 6, no. 2, 2004.

R. J. Hall and J. Auzins, “A tiered geocast protocol for long range mobile ad hoc networking,” in Proceedings of the 2006 IEEE Military Communications Conf., 2006.

M. Heissenbuttel, T. Braun, T. Bernoulli, and M. Walchli, “Blr: Beaconless routing algorithm for mobile ad-hoc networks,”  vol. 27, 2003.

Y. Xue, B. Li, K. Nahrstedt. “A Scalable Location Management Scheme in Mobile Ad-hoc Networks”. November 2012.

F. Ye, H. Luo, J. Cheng, S. Lu, and L. Zhang. “A Two-tier Data Dissemination Model for Large-scale Wireless Sensor Networks”.  jan 2013.

Y. Yu, R. Govindan, and D. Estrin. “Geographical and Energy Aware Routing: A Recursive Data Dissemination Protocol for Wireless Sensor Networks”.   2014.

W. Zhang, G. Cao, and T. La Porta . “Data Dissemination with Ring-Based Index for Sensor Networks”. IEEE ICNP 2012.

 

About this essay:

If you use part of this page in your own work, you need to provide a citation, as follows:

Essay Sauce, TARGET TRACKING FOR NOVEL TRACE BASED GEOCAST REGION. Available from:<https://www.essaysauce.com/computer-science-essays/2016-1-18-1453139609/> [Accessed 16-04-26].

These Computer science essays have been submitted to us by students in order to help you with your studies.

* This essay may have been previously published on EssaySauce.com and/or Essay.uk.com at an earlier date than indicated.