Improving Transport Protocol for Reliable Data Transfer in Wireless Sensor Network
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Information Technology | Ethiopia | Volume 5 Issue 12, December 2016

Improving Transport Protocol for Reliable Data Transfer in Wireless Sensor Network

Andualem W/giorgis, Dr. Ing. Tofik Jemal, Salahdin Seid

In the current world of Technology, wireless sensor communication technology places the major role that led us the innovative idea of using new technology for many applications. This network is applied in many application areas such as in military, agricultural, health care, environmental monitoring, industry, natural disaster prevention, wildlife tracking system, building monitoring, space exploration, security, entertainment, seismic detection, care of the dependent people, and emergency management, dam monitoring, traffic management, and many other areas. There are challenges in providing a reliable data delivery in these applications, such as unique network topology, diverse applications, small message size, resource constraints frequent node failure and congestion. The main objective of this thesis is to improve reliable data transport protocol for wireless sensor network. In order to achieve reliability of data by detecting and recovering lost packet, by making survey on existing reliable data transport protocols, approaches and identified RMST (Reliable Multi-Segment Transport protocol) as best protocol for reliability and lastly make a survey on queue theory. The novel approach, which is named as EERMST (Energy Efferent Reliable Multi-Segment Transport protocol) has developed by hybrid (EACK and NACK), based loss detection, and recovery mechanism to grant reliability. In addition, a novel queue approach has introduced to avoid congestion in multi hop communication. Finally, new approach was tested, and evaluated with different metrics on Tinyos 2.1.x, with Five, Ten Micaz mote, meyer-heavy.txt full noisy file, in 50, 100 ms, and TOSSIM simulator on system application. From the analysis result, the end-to-end delay of EERMST was closer to NACK not more than 0.00046ms but ACK has more delay, which is 0.00231 ms. The delivery ratio of ACK is more and somewhat closer with EERMST but has more packet delay. Generally, the EERMST has less packet delay and more packet delivery ratio than the other protocols.

Keywords: Communication, hybrid, packet, protocol, technology, topology, wireless sensor network

Edition: Volume 5 Issue 12, December 2016

Pages: 1198 - 1205

Share this Article

How to Cite this Article?

Andualem W/giorgis, Dr. Ing. Tofik Jemal, Salahdin Seid, "Improving Transport Protocol for Reliable Data Transfer in Wireless Sensor Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20163569, Volume 5 Issue 12, December 2016, 1198 - 1205

140 PDF Views | 87 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Communication'

Survey Paper, Information Technology, Ghana, Volume 8 Issue 6, June 2019

Pages: 64 - 69

The Use of Information and Communication Technology (ICT) in Teaching and Learning of Mathematics in Al-Faruq College of Education, Wenchi-Ghana

Abu Sulemana, Yahuza Abdul-Kadir

Share this Article

Research Paper, Information Technology, Kenya, Volume 3 Issue 11, November 2014

Pages: 995 - 999

A Donor Information Needs Driven Approach to Address Kenyas Declining Blood Donations

Ireri Salome, Waiganjo Peter, Orwa Daniel

Share this Article

Survey Paper, Information Technology, India, Volume 4 Issue 5, May 2015

Pages: 2568 - 2570

Survey on NMS Supporting Network Elements implementing Heterogeneous Protocols

Sheik Nousheen Taj, Dr. Sagar B M

Share this Article

Research Paper, Information Technology, United States of America, Volume 9 Issue 7, July 2020

Pages: 946 - 948

Retail Business Operations Transformation by 5G

Dhanesh Thatikonda

Share this Article

Review Papers, Information Technology, Kenya, Volume 4 Issue 2, February 2015

Pages: 1228 - 1232

Information Packaging for Communication with the Physically Challenged

Samuel Macharia W.

Share this Article

Similar Articles with Keyword 'hybrid'

Research Paper, Information Technology, India, Volume 6 Issue 1, January 2017

Pages: 1773 - 1777

Optimized Load Balancing in Cloud Computing using Hybrid Approach of Round Robin and Min-Min Scheduling

Muskan Garg, Rajneesh Narula

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1892 - 1895

Securing Data in Cloud Using Homomorphic Encryption

Honey Patel, Jasmin Jha

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 2734 - 2737

Detection of Outliers Using Hybrid Algorithm on Categorical Datasets

Rachana P. Jakkulwar, Prof. R. A. Fadnavis

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 7, July 2014

Pages: 1743 - 1746

Hybrid Approach for Outlier Detection in High Dimensional Dataset

Rohini Balkrishna Gurav, Sonali Rangdale

Share this Article

Informative Article, Information Technology, Malaysia, Volume 4 Issue 1, January 2015

Pages: 2045 - 2049

The Suitability of Native Application for University E-Learning Compared to Web-Based Application

Maya Novia Sari, Noor Azian Bt. Mohamad Ali

Share this Article

Similar Articles with Keyword 'packet'

Survey Paper, Information Technology, India, Volume 5 Issue 7, July 2016

Pages: 1202 - 1204

A Survey on ?Energy Efficient MAC Protocols with Differentiation in Traffic for Wireless Sensor Networks?

Pallavi Meshram, M. V. Nimbalkar

Share this Article

Informative Article, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 1568 - 1570

Firewall: A Security Point of a Network

Manoj Parmar

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1127 - 1130

Analysis and Data Retrieval by Filtering Packets in High Speed Routers

Indumathi, K. Kumar

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1246 - 1249

From Jammer to Gambler: Modeling and Detection of Jamming Attacks against Time Critical Traffic

P. Sudha, K. Durairaj

Share this Article

Research Paper, Information Technology, Indonesia, Volume 4 Issue 4, April 2015

Pages: 3058 - 3063

The Designing of Measurement Instrument for Information Technology Risk Assessment as a Risk Management Strategy Recommendation at SBUPE Bandung

Yudi Priyadi, Suhardi

Share this Article

Similar Articles with Keyword 'protocol'

Survey Paper, Information Technology, India, Volume 4 Issue 5, May 2015

Pages: 2568 - 2570

Survey on NMS Supporting Network Elements implementing Heterogeneous Protocols

Sheik Nousheen Taj, Dr. Sagar B M

Share this Article

Survey Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1315 - 1318

SIP Over NON-TLS vs TLS Environment

Prapti Priya Nayak, G. Sujatha

Share this Article

Survey Paper, Information Technology, India, Volume 3 Issue 12, December 2014

Pages: 1137 - 1140

A Literature Survey on Virtualization Security Threats in Cloud Computing

Brona Shah, Jignesh Vania

Share this Article

Research Paper, Information Technology, Nigeria, Volume 4 Issue 7, July 2015

Pages: 2608 - 2615

The Proposed Roles of VLAN and Inter-VLAN Routing in Effective Distribution of Network Services in Ebonyi State University

Agwu Chukwuemeka Odi, Nweso Emmanuel Nwogbaga, Ojiugwo Chukwuka N.

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 2030 - 2033

Establishing Secret Key in Wireless Environment by Using Techniques of Keyless Cryptosystem

Fatima Joselyn Mystica, Gopalakrishnan Prakash

Share this Article

Similar Articles with Keyword 'technology'

Survey Paper, Information Technology, Ghana, Volume 8 Issue 6, June 2019

Pages: 64 - 69

The Use of Information and Communication Technology (ICT) in Teaching and Learning of Mathematics in Al-Faruq College of Education, Wenchi-Ghana

Abu Sulemana, Yahuza Abdul-Kadir

Share this Article

Research Paper, Information Technology, Kenya, Volume 9 Issue 12, December 2020

Pages: 881 - 889

Factors Determining Adoption of Block Chain in the Insurance Industry: A Case of Kenya

Kanuku Musyoku, Shitanda Douglas, Nganu Margaret

Share this Article

Research Paper, Information Technology, Nigeria, Volume 4 Issue 4, April 2015

Pages: 264 - 267

Nigerian Cashless Banking Policy: A Multi-Aspectual View of Trust Issues Affecting the Adoption of E-Commerce and Other Technology Tools

Abdul-Hamid A.Kaduna; Mu'azu A. A. Kaduna; Hayatu M. Kaduna

Share this Article

Informative Article, Information Technology, Nigeria, Volume 2 Issue 4, April 2013

Pages: 468 - 473

A Superficial Expos of Data Warehousing: An Intrinsic Component of Modern Day Business Intelligence

Oyerinde, O.D, Adekunle, A. Y, Ebiesuwa, O.O

Share this Article

Research Paper, Information Technology, Kenya, Volume 3 Issue 11, November 2014

Pages: 995 - 999

A Donor Information Needs Driven Approach to Address Kenyas Declining Blood Donations

Ireri Salome, Waiganjo Peter, Orwa Daniel

Share this Article

Similar Articles with Keyword 'topology'

Survey Paper, Information Technology, India, Volume 6 Issue 8, August 2017

Pages: 2249 - 2253

A Literature Review on Parameters based MANET Routing Protocols

K. Sandhya, Dr. B. Indira

Share this Article

Research Paper, Information Technology, Ethiopia, Volume 5 Issue 12, December 2016

Pages: 1198 - 1205

Improving Transport Protocol for Reliable Data Transfer in Wireless Sensor Network

Andualem W/giorgis, Dr. Ing. Tofik Jemal, Salahdin Seid

Share this Article

Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014

Pages: 2556 - 2562

Wireless Sensor Networks: An Overview from an Optimization Perspective

Haroon Shoukat Ali, NoorAzian Mohamad Ali

Share this Article

Survey Paper, Information Technology, India, Volume 5 Issue 7, July 2016

Pages: 273 - 276

Secure Data Aggregation Techniques in Smart Grid

Shital G Bhosle, Aarti A Agarkar

Share this Article

Informative Article, Information Technology, India, Volume 8 Issue 8, August 2019

Pages: 12 - 15

The Implementation of Employee Attendance System based on ZigBee technology using LAN Networking over Traditional Biometric Systems

Nongmeikapam Sursen Singh

Share this Article

Similar Articles with Keyword 'wireless sensor network'

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2849 - 2851

A Survey on Secure Mechanism for Wireless Sensor Networks

Tabbasum Sajjan Magdum, Y.B.Gurav

Share this Article

Survey Paper, Information Technology, India, Volume 4 Issue 1, January 2015

Pages: 1458 - 1460

A Survey On Data Aggregation Techniques to Improve the Energy Efficiency in Wireless Sensor Networks

Snehal S Lonare, A S Hiwale

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2422 - 2427

Secure Data Transmission with Hierarchical Clustering

Rahul Raj, J. Godwin Ponsam

Share this Article

Survey Paper, Information Technology, India, Volume 5 Issue 7, July 2016

Pages: 1202 - 1204

A Survey on ?Energy Efficient MAC Protocols with Differentiation in Traffic for Wireless Sensor Networks?

Pallavi Meshram, M. V. Nimbalkar

Share this Article

Research Paper, Information Technology, Ethiopia, Volume 5 Issue 12, December 2016

Pages: 1198 - 1205

Improving Transport Protocol for Reliable Data Transfer in Wireless Sensor Network

Andualem W/giorgis, Dr. Ing. Tofik Jemal, Salahdin Seid

Share this Article
Top