Distributed Computer Network Working Model in WSN: The Influence of Node Architecture, Routing and Data Traffic on System Performance

Authors

  • Anisa Triyana Author
  • Moh. Izzul Haq Ramadlani Author

Keywords:

Distributed computer networks, Wireless Sensor Networks, Adaptive routing, Node architecture, Data traffic

Abstract

     The development of distributed computer networks in Wireless Sensor Networks (WSN) has become an important element in supporting the Internet of Things (IoT), Smart City, and smart industry applications. The main challenges in WSN lie in energy limitations, data transmission stability, and adaptability to changes in network topology. Current knowledge shows that the combination of node architecture, routing algorithms, and data traffic patterns has a significant influence on system performance, but the relationship between these factors has not been comprehensively evaluated. Objective: This study aims to identify and analyze the influence of node architecture, routing algorithms, and data traffic patterns on the performance of distributed computer networks in WSN. Method: The research approach was conducted through quantitative experimental studies based on simulations using NS-3 software. Three architectures (flat, cluster, multi-hop) and three routing algorithms (LEACH, PEGASIS, Directed Diffusion) were tested in three types of data traffic (periodic, event-driven, query-based) to assess throughput, Packet Delivery Ratio (PDR), delay, and energy consumption. Results: Simulation results show that the distributed multi-hop architecture with the PEGASIS algorithm and event-driven traffic pattern produces the best performance, with a 25% increase in throughput, PDR of up to 94.8%, and energy efficiency of 87.9%. The combination of adaptive architecture, intelligent routing, and dynamic traffic management has been proven to significantly improve system efficiency and communication reliability. These findings emphasize the importance of developing machine learning-based adaptive algorithms to improve Quality of Service (QoS) and network lifetime in future WSN applications.

Downloads

Download data is not yet available.

Author Biographies

  • Anisa Triyana

    Department of Informatics, University of Madura

  • Moh. Izzul Haq Ramadlani

    Department of Informatics, University of Madura

References

REFERENSI

[1] F. P. Eka Putra, F. Muslim, N. Hasanah, Holipah, R. Paradina, and R. Alim, “Analisis Komparasi Protokol Websocket dan MQTT Dalam Proses Push Notification,” J. Sistim Inf. dan Teknol., pp. 63–72, 2024, doi: 10.60083/jsisfotek.v5i4.325.

[2] A. Baidawi, “JARINGAN SENSOR NIRKABEL DAN IoT UNTUK KOTA PINTAR PAMEKASAN,” J. Sist. Inf. Kaputama, vol. 7, no. 2, pp. 104–110, 2023, doi: 10.59697/jsik.v7i2.108.

[3] N. M. Akbar, F. P. E. Putra, K. Z. Imam, and M. U. Mansyur, “Analisis Kinerja dan Interopabilitas STB Sebagai Server Penilaian Akhir Tahun,” J. Inf. dan …, 2023, [Online]. Available: https://www.jidt.org/jidt/article/view/365

[4] F. P. E. Putra, S. M. Dewi, Maugfiroh, and A. Hamzah, “Privasi dan Keamanan Penerapan IoT Dalam Kehidupan Sehari-Hari : Tantangan dan Implikasi,” 2023. [Online]. Available: https://jsisfotek.org/index.php/JSisfotek/article/view/232

[5] A. Zulfikri, F. P. E. Putra, M. A. Huda, H. Hasbullah, M. Mahendra, and M. Surur, “Analisis Keamanan Jaringan Dari Serangan Malware Menggunakan Filtering Firewall Dengan Port Blocking,” 2023. doi: 10.47709/digitech.v3i2.3379.

[6] F. P. E. Putra, K. Mufidah, R. M. Ilhamsyah, S. A. Efendy, and S. N. R. Barokah, “Tinjauan Performa RouterOS Mikrotik dalam Jaringan Internet: Analisis Kinerja dan Kelayakan,” 2024. doi: 10.47709/digitech.v3i2.3446.

[7] F. P. E. Putra, A. M. U. Solichin, and ..., “Pemanfaatan Teknologi Wireless dan Mobile Network Berbasis 5G Untuk Pemerataan Akses Jaringan di Indonesia,” Infotek J. …, 2025, [Online]. Available: https://e-journal.hamzanwadi.ac.id/index.php/infotek/article/view/30559

[8] N. Haidar Hari, F. P. Eka Putra, U. Hasanah, S. R. Sutarsih, and Riyan, “Transformasi Jaringan Telekomunikasi dengan Teknologi 5G: Tantangan, Potensi, dan Implikasi,” J. Inf. dan Teknol., pp. 146–150, 2023, doi: 10.37034/jidt.v5i2.357.

[9] F. P. E. Putra, D. E. Arissandi, A. Rofiqi, and M. F. Hidayat, “Pemanfaatan Mikrotik Dalam Manajemen Bandwidth Pada Jaringan Sekolah,” 2025, researchgate.net. [Online]. Available: https://www.researchgate.net/profile/Fauzan-Eka-Putra-2/publication/392420575_Pemanfaatan_Mikrotik_Dalam_Manajemen_Bandwidth_Pada_Jaringan_Sekolah/links/6848fab46b5a287c304a61ca/Pemanfaatan-Mikrotik-Dalam-Manajemen-Bandwidth-Pada-Jaringan-Sekolah.pdf

[10] S. Arifin, N. P. Dewi, . U., M. N. Arifin, and F. P. E. Putra, “Aplikasi Pengolahan Data Mahasiswa Kkn Pada Universitas Madura,” Insa. Comtech Inf. Sci. Comput. Technol. J., vol. 8, no. 2, p. 24, 2023, doi: 10.53712/jic.v8i2.2085.

[11] G. Wu, J. Wu, and X. Zhang, “Research on gaussian mixture model and its distributed data mining algorithm in wireless sensor networks,” J. Intell. Fuzzy Syst., vol. 46, no. 4, pp. 8513–8527, 2024, doi: 10.3233/JIFS-238711.

[12] I. Chakraborty, L. Sun, and C.-S. Lai, “Recycling waste rubber bands and human hair into complementary surface structure-based tribo-layers for ultrahigh power generation and self-powered health monitoring,” Sustain. Mater. Technol., vol. 43, 2025, doi: 10.1016/j.susmat.2025.e01295.

[13] Y. Sun, Z. Qian, Y. Wang, Y. Li, Y. Zheng, and Y. Liu, “A flexible humidity-resistant nanofiber-based triboelectric nanogenerator with high electrical output stability as self-powered sensors for motion monitoring,” Chem. Eng. J., vol. 506, 2025, doi: 10.1016/j.cej.2025.159845.

[14] R. O. Agbaoye, J. Janovec, A. Ayuela, and J. S. Dolado, “Thermoelectric properties of the main species present in Portland cement pastes,” Cem. Concr. Res., vol. 183, 2024, doi: 10.1016/j.cemconres.2024.107587.

[15] M. Chen et al., “Highly elastic, lightweight, and high-performance all-aerogel triboelectric nanogenerator for self-powered intelligent fencing training,” Mater. Sci. Eng. R Reports, vol. 165, 2025, doi: 10.1016/j.mser.2025.101004.

[16] S. S. Mouli, V. Thalagondapati, and T. R. Rao, “A Multi-Faceted Framework to Enhance Lifespan and Optimize Latency in Wireless Sensor Networks,” J. Wirel. Mob. Networks, Ubiquitous Comput. Dependable Appl., vol. 16, no. 1, pp. 431–455, 2025, doi: 10.58346/JOWUA.2025.I1.026.

[17] K. Lien, K.-H. Lin, and H.-Y. Wei, “Energy-Efficient Traffic Steering in Millimeter-Wave Dual Connectivity Discontinuous Reception Framework,” IEEE Access, vol. 10, pp. 115716–115731, 2022, doi: 10.1109/ACCESS.2022.3218701.

[18] M. Dai, Z. Luo, Y. Wu, L. Qian, B. Lin, and Z. Su, “Incentive Oriented Two-Tier Task Offloading Scheme in Marine Edge Computing Networks: A Hybrid Stackelberg-Auction Game Approach,” IEEE Trans. Wirel. Commun., vol. 22, no. 12, pp. 8603–8619, 2023, doi: 10.1109/TWC.2023.3264607.

[19] Y. M. Raghavendra, U. B. Mahadevaswamy, M. Asha, and G. Manjula, “Energy Optimization in Spectrum Sensing Using Cognitive Radio Wireless Sensor Networks,” Wirel. Pers. Commun., vol. 133, no. 3, pp. 1675–1691, 2023, doi: 10.1007/s11277-023-10839-w.

[20] A. Sghaier and A. Meddeb, “Real Time QoS in WSN-based Network Coding and Reinforcement Learning,” Inform., vol. 47, no. 4, pp. 477–486, 2023, doi: 10.31449/inf.v47i4.3102.

[21] J. Lan et al., “OpenL3: Embedding Diverse Network Services into MANETs Using Multidimensional Identifier,” IEEE Internet Things J., vol. 12, no. 11, pp. 17700–17716, 2025, doi: 10.1109/JIOT.2025.3538167.

[22] P. Khuwuthyakorn, A. Lakhan, A. Majumdar, and O. Thinnukool, “Blockchain-Enabled Self-Autonomous Intelligent Transport System for Drone Task Workflow in Edge Cloud Networks,” Algorithms, vol. 18, no. 8, 2025, doi: 10.3390/a18080530.

[23] H. Wang, K. Liu, C. Wang, and H. Hu, “Energy-Efficient, Cluster-Based Routing Protocol for Wireless Sensor Networks Using Fuzzy Logic and Quantum Annealing Algorithm,” Sensors, vol. 24, no. 13, 2024, doi: 10.3390/s24134105.

[24] M. Zhang, J. Shi, X. Sun, S. Yong, and S. P. Beeby, “A randomly structured composite PDMS/PTFE ferroelectret soft smart material,” Smart Mater. Struct., vol. 34, no. 3, 2025, doi: 10.1088/1361-665X/adb6e1.

[25] K. Aravind and P. K. R. Maddikunta, “Optimized Fuzzy Logic Based Energy-Efficient Geographical Data Routing in Internet of Things,” IEEE Access, vol. 12, pp. 18913–18930, 2024, doi: 10.1109/ACCESS.2024.3354174.

[26] A. Sarfraz, A. Ahmad, F. Zeshan, M. Hamid, and T. A. N. Alshalali, “Unmasking deception: detection of fake profiles in online social ecosystems,” J. Big Data, vol. 12, no. 1, 2025, doi: 10.1186/s40537-025-01254-y.

[27] Y. Shen et al., “Sunflower-inspired smart evaporator with omnidirectional solar tracking for highly enhanced energy-capturing and sustainable freshwater harvesting,” Chem. Eng. J., vol. 503, 2025, doi: 10.1016/j.cej.2024.157917.

[28] S. Mohsen Hassan, M. M. Mohamad, and F. Binti Muchtar, “Enhancing MANET Security Through Long Short-Term Memory-Based Trust Prediction in Location-Aided Routing Protocols,” IEEE Access, vol. 13, pp. 120142–120168, 2025, doi: 10.1109/ACCESS.2025.3572619.

[29] N. C. Velayudhan, A. Anitha, and M. Madanan, “An Optimisation driven Deep Residual Network for Sybil attack detection with reputation and trust-based misbehaviour detection in VANET,” J. Exp. Theor. Artif. Intell., vol. 36, no. 5, pp. 721–744, 2024, doi: 10.1080/0952813X.2022.2104387.

[30] D. A. Amer, S. A. Soliman, A. F. Hassan, and A. A. Zamel, “Enhancing connectivity and coverage in wireless sensor networks: a hybrid comprehensive learning-Fick’s algorithm with particle swarm optimization for router node placement,” Neural Comput. Appl., vol. 36, no. 34, pp. 21671–21702, 2024, doi: 10.1007/s00521-024-10315-x.

[31] S. R. Kolli, M. Z. U. Zia-Ur-Rahman, and M. D. Bayleyegn, “EECS-GT: Energy-Efficient Collaborative Sensing Model Using Game Theory for Wireless Sensor Networks,” IEEE Access, vol. 12, pp. 115657–115671, 2024, doi: 10.1109/ACCESS.2024.3445953.

[32] J. Tussupov et al., “Analysis of Formal Concepts for Verification of Pests and Diseases of Crops Using Machine Learning Methods,” IEEE Access, vol. 12, pp. 19902–19910, 2024, doi: 10.1109/ACCESS.2024.3361046.

[33] H. Qu, H. Lu, and X. Li, “Numerical study on the energy-harvesting performance of multiple oscillating hydrofoils arranged in the spanwise direction,” Ocean Eng., vol. 317, 2025, doi: 10.1016/j.oceaneng.2024.120042.

[34] L. Li, X. Li, L. Wang, Y. Jia, Y. Hu, and J. Nan, “High gain nested dielectric resonator rectenna based on higher order mode and magneto-electric dipole theory,” AEU - Int. J. Electron. Commun., vol. 188, 2025, doi: 10.1016/j.aeue.2024.155590.

[35] Z. Zheng et al., “Motion response and energy harvesting of multi-module floating photovoltaics in seas,” Ocean Eng., vol. 310, 2024, doi: 10.1016/j.oceaneng.2024.118760.

[36] Z. Qu, Z. Chen, X. Xin, and P. Tiwari, “QEPP: A Quantum Efficient Privacy Protection Protocol in 6G-Quantum Internet of Vehicles,” IEEE Trans. Intell. Veh., vol. 9, no. 1, pp. 905–916, 2024, doi: 10.1109/TIV.2023.3304852.

[37] T. Dou, Z. Zheng, W. Qiu, and C. Ge, “A Secure Medical Data Framework Integrating Blockchain and Edge Computing: An Attribute-Based Signcryption Approach,” Sensors, vol. 25, no. 9, 2025, doi: 10.3390/s25092859.

[38] S. Kaneko, K. Honda, T. Kanai, J. I. Kani, and T. Yoshida, “Photonic Gateway and Protocol-Independent End-to-End Optical-Connection Provisioning in All-Photonic Metro-Access Converged Network,” IEEE Photonics J., vol. 15, no. 3, 2023, doi: 10.1109/JPHOT.2023.3262215.

[39] B. Zhang, H. Shen, T. Wang, and G. Bai, “Invisible man: blockchain-enabled peer-to-peer collaborative privacy games in LBSs,” Peer-to-Peer Netw. Appl., vol. 17, no. 4, pp. 2595–2607, 2024, doi: 10.1007/s12083-024-01728-5.

[40] M. Usman Hashmi, A. Imran, A. Bilal, M. Garayev, H. Fathi, and S. Dhelim, “Resource-Limited Skew Estimation and Correction (RLSEC) for Edge Devices in Delay Non-Tolerant Networks,” IEEE Access, vol. 12, pp. 159597–159610, 2024, doi: 10.1109/ACCESS.2024.3469581.

[41] C. Chakraborty, S. B. Soufiene, F. A. Almalki, and H. Sakli, “FC-SEEDA: fog computing-based secure and energy efficient data aggregation scheme for Internet of healthcare Things,” Neural Comput. Appl., vol. 36, no. 1, pp. 241–257, 2024, doi: 10.1007/s00521-023-08270-0.

[42] N. Poongavanam, N. Nithiyanandam, T. Suma, V. N. Thatha, and R. SHAIK, “Multi-objective shuffled frog leaping algorithm for deployment of sensors in target based wireless sensor networks,” J. Intell. Fuzzy Syst., vol. 46, no. 1, pp. 1–18, 2024, doi: 10.3233/JIFS-233595.

[43] Q. H. Ta, V. K. Ta, T. T. Nguyen, and H. Oh, “A WSN and LoRa Hybrid Multimedia Transmission Protocol for Scalar Data and Image Transmission †,” Sensors, vol. 24, no. 24, 2024, doi: 10.3390/s24248165.

[44] D. Bhatia, D. Kim, and H.-S. Park, “Smart exercise device using triboelectric self-powered sensor for high intensity interval training (HIIT),” Biosens. Bioelectron., vol. 290, 2025, doi: 10.1016/j.bios.2025.117995.

[45] K. Yesodha, M. Marudhamuthu, K. Thangaramya, and A. Kannan, “Elliptic curve encryption-based energy-efficient secured ACO routing protocol for wireless sensor networks,” J. Supercomput., vol. 80, no. 13, pp. 18866–18899, 2024, doi: 10.1007/s11227-024-06235-1.

[46] C. Reuter, A. Hughes, and C. Buntain, “Combating information warfare: state and trends in user-centred countermeasures against fake news and misinformation,” Behav. Inf. Technol., vol. 44, no. 13, pp. 3348–3361, 2025, doi: 10.1080/0144929X.2024.2442486.

[47] A. Brighente, M. Conti, G. D. Di Renzone, G. Peruzzi, and A. Pozzebon, “Security and Privacy of Smart Waste Management Systems: A Cyber-Physical System Perspective,” IEEE Internet Things J., vol. 11, no. 5, pp. 7309–7324, 2024, doi: 10.1109/JIOT.2023.3322532.

[48] M. Khalid, J. Ali, A. R. Mohsin, B.-H. Roh, and M. J. F. Alenazi, “Deep learning techniques for enhanced security and privacy in 6G terrestrial–nonterrestrial network architecture,” J. Supercomput., vol. 81, no. 4, 2025, doi: 10.1007/s11227-025-07097-x.

[49] M. Saito, T. Koshimizu, Z. Pan, J. Liu, H. Nakazawa, and S. Shimamoto, “Energy Borrowing Transmission Scheme Based on D2D Communication for 5G Networks,” IEEE Access, vol. 9, pp. 165841–165853, 2021, doi: 10.1109/ACCESS.2021.3135359.

[50] E. Nagarathinam et al., “Maximizing Solar Potential Using the Differential Grey Wolf Algorithm for PV System Optimization,” Energy Eng. J. Assoc. Energy Eng., vol. 121, no. 8, pp. 2129–2142, 2024, doi: 10.32604/ee.2024.052280.

[51] H. Tyagi, R. Kumar, and S. K. Pandey, “A detailed study on trust management techniques for security and privacy in IoT: challenges, trends, and research directions,” High-Confidence Comput., vol. 3, no. 2, 2023, doi: 10.1016/j.hcc.2023.100127.

Published

24-10-2025

How to Cite

Distributed Computer Network Working Model in WSN: The Influence of Node Architecture, Routing and Data Traffic on System Performance. (2025). Karapan Network Journal : Journal Computer Technology and Mobile Ad Hoc Network, 1(01). https://ejournal.omahtabing.com/knj/article/view/38

Most read articles by the same author(s)