SlideShare una empresa de Scribd logo
1 de 28
Power Aware Routing
        Protocols
           for
Wireless Sensor Networks




              Darpan Dekivadiya
                    (09BCE008)
Wireless Sensor Networks
   A wireless sensor
    network (WSN)
    consists of spatially
    distributed autonomous
    sensors to monitor
    physical or
    environmental
    conditions, such as
    temperature, sound,
    vibration, pressure,
    motion or pollutants
    and to cooperatively
    pass their data through
    the network to a main
    location.
Classification Of Routing
Protocols
   Routing techniques are required for sending
    data between sensor nodes and the base
    stations for communication.
   Routing Protocols can be classified :
     Based on Mode of functioning and type of
      target applications into Proactive, Reactive
      and Hybrid.
     Based on Participation style of the nodes into
      as Direct Communication, Flat and Clustering
      Protocols .
     Depending on the Network Structure as
      Hierarchical, Data Centric and Location
Proactive, Reactive and Hybrid
   In a Proactive Protocol the nodes switch on
    their sensors and transmitters, sense the
    environment and transmit the data to a BS
    through the predefined route.
       The Low Energy Adaptive Clustering hierarchy
        protocol (LEACH) utilizes this type of protocol.
   In Reactive Protocol if there are sudden
    changes in the sensed attribute beyond some
    pre-determined threshold value, the nodes
    immediately react. This type of protocol is used
    in time critical applications
       The Threshold sensitive Energy Efficient sensor
        Network(TEEN) is an example of a reactive protocol.
   Hybrid Protocols Incorporate both Proactive
    and Reactive concepts.
   They first compute all routes and then improve
    the routes at the time of routing.
       Adaptive Periodic TEEN(APTEEN) is an example of
        Hybrid Protocols.
Direct Communication, Flat and Clustering
Protocols
 In Direct Communication Protocols, any node can
  send information to the BS directly.
 When this is applied in a very large network, the
  energy of sensor nodes may be drained quickly.
 Its scalability is very small.
       SPIN is an example of this type of protocol.
   In the case of Flat Protocols, if any node needs to
    transmit data, it first searches for a valid route to
    the BS and then transmits the data.
   Nodes around the base station may drain their
    energy quickly.
   Its scalability is average.
       Rumor Routing is an example of this type of protocol.
   According to the clustering protocol, the total
    area is divided into numbers of clusters.
   Each and every cluster has a cluster head (CH)
    and this cluster head directly communicates
    with the BS.
   All nodes in a cluster send their data to their
    corresponding Cluster Head.
       The Threshold sensitive Energy Efficient sensor
        Network(TEEN) is an example of a clustering
        protocol.
Data Centric, Hierarchical and
    Location based
 Data centric protocols are query based and
  they depend on the naming of the desired
  data, thus it eliminates much redundant
  transmissions.
 The BS sends queries to a certain area for
  information and waits for reply from the
  nodes of that particular region.
 Depending on the query, sensors collect a
  particular data from the area of interest.
 This particular information is only required to
  transmit to the BS and thus reducing the
  number of transmissions
    ◦ SPIN was the first data centric protocol
 Hierarchical routing is used to perform energy
  efficient routing.
 Higher energy nodes can be used to process and
  send the information and low energy nodes are
  used to perform the sensing in the area of interest
    ◦ examples: LEACH, TEEN, APTEEN
 Location based routing protocols need some
  location information of the sensor nodes.
 Location information can be obtained from GPS
  signals, received radio signal strength, etc.
 Using location information, an optimal path can be
  formed without using flooding techniques.
    ◦ GEAR is an example of a location based routing
      protocol.
Flooding
 Each node Which receives a packet
  broadcasts it, if the maximum hop count of
  the packet is not reached.
 This technique does not require complex
  topology maintenance .
 The disadvantages of flooding are :
    ◦ Implosion
    ◦ Overlap
    ◦ Resource Blindness
Gossiping
 Gossiping is modified version of flooding.
 The nodes send packets to a randomly
  selected neighbor to avoid Implosion.
 The disadvantages of Gossiping are:
    ◦ It does not guarantee that all the nodes of the
      network will receive the message.
    ◦ It takes a long time for a message to propagate
      throughout the network.
Rumor Routing
   It is an agent based path creation algorithm.
   Agents are basically packets which are circulated
    in the network to establish shortest path to events.
   They can also perform path optimizations at nodes
    they visit.
   When agent finds a node whose path to an event
    is longer than its own, it updates the node’s
    routing table.
   When query is generated at a sink, it is sent on a
    random walk with the hope that it will find a path
    leading to the required event.
   If query Does not find an event path , the sink
    times out and uses flooding to propagate the
Working of Rumor
Routing
Sequential Assignment
Routing
   The SAR algorithm
    creates multiple trees,
    where the root of each
    tree is a one-hop
    neighbor of the sink.
   Each tree grows
    toward from the sink
    and avoids nodes with
    low throughput or high
    delay.
   At the end of
    procedure, most
    nodes belong to
    multiple trees.
SPIN
   SPIN stands for Sensor Protocol for
    Information via Negotiation.
   SPIN uses negotiation and resources
    adaption to address the deficiencies of
    flooding.
   Negotiation reduces overlap and
    implosion.
   Meta-data is transmitted instead of row
    data.
   SPIN has three types of messages :
    ADV, REQ and DATA.
   The simple version of SPIN is shown in
SPIN




Sensor Protocol for Information via
Negotiation
Direct Diffusion
   Useful where the sensor nodes themselves
    generate requests/queries for data sensed by
    other nodes.
   Each sensor node names its data with one or
    more attributes and other nodes express their
    interest depending on these attributes.
   Data is propagated along the reverse path of the
    interest propagation.
   Each path is associated with a gradient that is
    formed at the time of interest propagation.
   The gradient corresponding to an interest is
    derived from the interval/data-rate field specified
    in the interest.
   This model uses data naming by attributes and
    local data transformation to reflect the data
    centric nature of sensor network operations.
Geographic Hash Table
   GHT is a system based on data centric
    storage.
   GHT hashes keys into geographic co-
    ordinates and stores a pair at the sensor
    node nearest to the hash value.
   The calculated hash value is mapped onto
    a unique node consistently, so that queries
    for the data can be routed to the correct
    node.
   Data is distributed among nodes such that it
    is scalable and the storage load is
    balanced.
   GHT is more effective in large network
Direct Transmission
 All sensor nodes transmit their data
  directly to BS.
 This is extremely expensive in terms
  of energy consumed, since the BS
  may be very far away from some
  nodes.
 Nodes must take turns while
  transmitting to the BS to avoid
  collision.
 The media access delay is also large
PEGASIS
 PEGASIS assumes that all sensor nodes
  know the location of every other node.
 Any node has the required transmission
  range to reach the BS in one-hop, when it is
  select as a leader.
 The goals of PEGASIS are as follows :
    Minimize the distance over which each node
     transmits.
    Minimize the broadcasting overhead.
    Minimize the number of messages that need to
     be sent to the BS.
    Distribute the energy consumption equally across
     all nodes.
PEGASIS




Power Efficient Gathering for Sensor Information
                   Systems
 A greedy algorithm is used to construct a
  chain of sensor nodes, starting from the
  node farthest from the BS.
 At each step, the nearest neighbor which
  has not been visited is added to the chain.
 At every node, data fusion is carried out. so,
  that only one message is passed on from
  one node to next.
 The leader finally transmits one message to
  BS.
   The delay involved in message reaching the BS
    is O(N), where N is the total number of nodes in
Binary Scheme
 This is also a chain-based scheme like
  PEGASIS.
 Classifies nodes into different levels.
 Nodes which receive messages at one
  level rises to the next level.
 The number of nodes is halved from
  one level to the next.
Binary Scheme


• In figure aggregated data reaches the BS in 4
steps,
  which is O(log2 N),where N is the number of
  nodes in the network.
Chain Based Three level
Scheme
   In this scheme chain is constructed as in
    PEGASIS.
   The chain is divided into number of groups to
    space out simultaneous transmission.
   One node out of each group aggregates data
    from all group members and rises to the next
    level.
   In the second level all nodes are divided into
    two groups.
   Third level consist of a message exchange
    between one node from each group of
    second level.
   Finally the leader transmits a single message
Chain Based Three level Scheme
References
   Ad Hoc Wireless Networks
    ◦ C.Shiva Ram Murthy
    ◦ B.S.Manoj
 www.wikipedia.org/wiki/Wireless_sens
  or_network
 www.mdpi.com/jouranal/sensor
Routing Protocols in WSN

Más contenido relacionado

La actualidad más candente

Mac protocols
Mac protocolsMac protocols
Mac protocolsjuno susi
 
Traffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access ProtocolTraffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access ProtocolGaurav Chauhan
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Chandra Meena
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network LayerRahul Hada
 
Sensor node hardware and network architecture
Sensor node hardware and network architectureSensor node hardware and network architecture
Sensor node hardware and network architectureVidhi603146
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSNYara Ali
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Divya Tiwari
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocolsDarwin Nesakumar
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Divya Tiwari
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11Shreejan Acharya
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewYoav Francis
 
localization in wsn
localization in wsnlocalization in wsn
localization in wsnnehabsairam
 
mobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsmobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsAman Gupta
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
 
EC8702 adhoc and wireless sensor networks iv ece
EC8702 adhoc and wireless sensor networks iv eceEC8702 adhoc and wireless sensor networks iv ece
EC8702 adhoc and wireless sensor networks iv eceGOWTHAMMS6
 
Transport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networksTransport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networksRushin Shah
 

La actualidad más candente (20)

Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Traffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access ProtocolTraffic-adaptive Medium Access Protocol
Traffic-adaptive Medium Access Protocol
 
Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc Lecture 19 22. transport protocol for ad-hoc
Lecture 19 22. transport protocol for ad-hoc
 
Mobile Network Layer
Mobile Network LayerMobile Network Layer
Mobile Network Layer
 
Sensor node hardware and network architecture
Sensor node hardware and network architectureSensor node hardware and network architecture
Sensor node hardware and network architecture
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Wsn 08
Wsn 08Wsn 08
Wsn 08
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
Ad-Hoc Networks
Ad-Hoc NetworksAd-Hoc Networks
Ad-Hoc Networks
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocols
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Fisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol OverviewFisheye State Routing (FSR) - Protocol Overview
Fisheye State Routing (FSR) - Protocol Overview
 
localization in wsn
localization in wsnlocalization in wsn
localization in wsn
 
mobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applicationsmobile ad-hoc network (MANET) and its applications
mobile ad-hoc network (MANET) and its applications
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
EC8702 adhoc and wireless sensor networks iv ece
EC8702 adhoc and wireless sensor networks iv eceEC8702 adhoc and wireless sensor networks iv ece
EC8702 adhoc and wireless sensor networks iv ece
 
Transport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networksTransport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networks
 

Similar a Routing Protocols in WSN

Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkJamia Hamdard
 
Network structure routing_protocols_in_wsn
Network structure routing_protocols_in_wsnNetwork structure routing_protocols_in_wsn
Network structure routing_protocols_in_wsnGr Patel
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks DEBABRATASINGH3
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetIJTET Journal
 
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor Network
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor NetworkEnergy Efficient PEGASIS Routing Protocol in Wireless Sensor Network
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor NetworkIRJET Journal
 
Implementation of hybrid data collection (mobile element and hierarchical clu...
Implementation of hybrid data collection (mobile element and hierarchical clu...Implementation of hybrid data collection (mobile element and hierarchical clu...
Implementation of hybrid data collection (mobile element and hierarchical clu...IJARIIT
 
Energy Aware Shortest Path Minded SPIN
Energy Aware Shortest Path Minded SPINEnergy Aware Shortest Path Minded SPIN
Energy Aware Shortest Path Minded SPINPrajwal Panchmahalkar
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
 
Node clone detection using a stable overlay network
Node clone detection using a stable overlay network Node clone detection using a stable overlay network
Node clone detection using a stable overlay network IJECEIAES
 
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ijcsa
 
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkAnalysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkIJMER
 
A New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingA New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingIOSR Journals
 

Similar a Routing Protocols in WSN (20)

Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
 
Network structure routing_protocols_in_wsn
Network structure routing_protocols_in_wsnNetwork structure routing_protocols_in_wsn
Network structure routing_protocols_in_wsn
 
ROUTING STRATEGIES IN DTN
ROUTING STRATEGIES IN DTNROUTING STRATEGIES IN DTN
ROUTING STRATEGIES IN DTN
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks
 
A04560105
A04560105A04560105
A04560105
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
Unit8 tgb
Unit8 tgbUnit8 tgb
Unit8 tgb
 
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor Network
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor NetworkEnergy Efficient PEGASIS Routing Protocol in Wireless Sensor Network
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor Network
 
Implementation of hybrid data collection (mobile element and hierarchical clu...
Implementation of hybrid data collection (mobile element and hierarchical clu...Implementation of hybrid data collection (mobile element and hierarchical clu...
Implementation of hybrid data collection (mobile element and hierarchical clu...
 
Energy Aware Shortest Path Minded SPIN
Energy Aware Shortest Path Minded SPINEnergy Aware Shortest Path Minded SPIN
Energy Aware Shortest Path Minded SPIN
 
Final PPT.pptx
Final PPT.pptxFinal PPT.pptx
Final PPT.pptx
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
Node clone detection using a stable overlay network
Node clone detection using a stable overlay network Node clone detection using a stable overlay network
Node clone detection using a stable overlay network
 
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
ENERGY EFFICIENT, LIFETIME IMPROVING AND SECURE PERIODIC DATA COLLECTION PROT...
 
3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx
 
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkAnalysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
 
A New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingA New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware Routing
 
Fa25939942
Fa25939942Fa25939942
Fa25939942
 
F04623943
F04623943F04623943
F04623943
 

Más de Darpan Dekivadiya

Performance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksPerformance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksDarpan Dekivadiya
 
Radio Frequency Identification
Radio Frequency IdentificationRadio Frequency Identification
Radio Frequency IdentificationDarpan Dekivadiya
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksDarpan Dekivadiya
 

Más de Darpan Dekivadiya (7)

Performance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksPerformance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor Networks
 
Apache hadoop
Apache hadoopApache hadoop
Apache hadoop
 
Radio Frequency Identification
Radio Frequency IdentificationRadio Frequency Identification
Radio Frequency Identification
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor Networks
 
Intel 80486 Microprocessor
Intel 80486 MicroprocessorIntel 80486 Microprocessor
Intel 80486 Microprocessor
 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
 
Ad hoc Networks
Ad hoc NetworksAd hoc Networks
Ad hoc Networks
 

Último

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Último (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

Routing Protocols in WSN

  • 1. Power Aware Routing Protocols for Wireless Sensor Networks Darpan Dekivadiya (09BCE008)
  • 2. Wireless Sensor Networks  A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants and to cooperatively pass their data through the network to a main location.
  • 3. Classification Of Routing Protocols  Routing techniques are required for sending data between sensor nodes and the base stations for communication.  Routing Protocols can be classified :  Based on Mode of functioning and type of target applications into Proactive, Reactive and Hybrid.  Based on Participation style of the nodes into as Direct Communication, Flat and Clustering Protocols .  Depending on the Network Structure as Hierarchical, Data Centric and Location
  • 4. Proactive, Reactive and Hybrid  In a Proactive Protocol the nodes switch on their sensors and transmitters, sense the environment and transmit the data to a BS through the predefined route.  The Low Energy Adaptive Clustering hierarchy protocol (LEACH) utilizes this type of protocol.  In Reactive Protocol if there are sudden changes in the sensed attribute beyond some pre-determined threshold value, the nodes immediately react. This type of protocol is used in time critical applications  The Threshold sensitive Energy Efficient sensor Network(TEEN) is an example of a reactive protocol.
  • 5. Hybrid Protocols Incorporate both Proactive and Reactive concepts.  They first compute all routes and then improve the routes at the time of routing.  Adaptive Periodic TEEN(APTEEN) is an example of Hybrid Protocols.
  • 6. Direct Communication, Flat and Clustering Protocols  In Direct Communication Protocols, any node can send information to the BS directly.  When this is applied in a very large network, the energy of sensor nodes may be drained quickly.  Its scalability is very small.  SPIN is an example of this type of protocol.  In the case of Flat Protocols, if any node needs to transmit data, it first searches for a valid route to the BS and then transmits the data.  Nodes around the base station may drain their energy quickly.  Its scalability is average.  Rumor Routing is an example of this type of protocol.
  • 7. According to the clustering protocol, the total area is divided into numbers of clusters.  Each and every cluster has a cluster head (CH) and this cluster head directly communicates with the BS.  All nodes in a cluster send their data to their corresponding Cluster Head.  The Threshold sensitive Energy Efficient sensor Network(TEEN) is an example of a clustering protocol.
  • 8. Data Centric, Hierarchical and Location based  Data centric protocols are query based and they depend on the naming of the desired data, thus it eliminates much redundant transmissions.  The BS sends queries to a certain area for information and waits for reply from the nodes of that particular region.  Depending on the query, sensors collect a particular data from the area of interest.  This particular information is only required to transmit to the BS and thus reducing the number of transmissions ◦ SPIN was the first data centric protocol
  • 9.  Hierarchical routing is used to perform energy efficient routing.  Higher energy nodes can be used to process and send the information and low energy nodes are used to perform the sensing in the area of interest ◦ examples: LEACH, TEEN, APTEEN  Location based routing protocols need some location information of the sensor nodes.  Location information can be obtained from GPS signals, received radio signal strength, etc.  Using location information, an optimal path can be formed without using flooding techniques. ◦ GEAR is an example of a location based routing protocol.
  • 10. Flooding  Each node Which receives a packet broadcasts it, if the maximum hop count of the packet is not reached.  This technique does not require complex topology maintenance .  The disadvantages of flooding are : ◦ Implosion ◦ Overlap ◦ Resource Blindness
  • 11. Gossiping  Gossiping is modified version of flooding.  The nodes send packets to a randomly selected neighbor to avoid Implosion.  The disadvantages of Gossiping are: ◦ It does not guarantee that all the nodes of the network will receive the message. ◦ It takes a long time for a message to propagate throughout the network.
  • 12. Rumor Routing  It is an agent based path creation algorithm.  Agents are basically packets which are circulated in the network to establish shortest path to events.  They can also perform path optimizations at nodes they visit.  When agent finds a node whose path to an event is longer than its own, it updates the node’s routing table.  When query is generated at a sink, it is sent on a random walk with the hope that it will find a path leading to the required event.  If query Does not find an event path , the sink times out and uses flooding to propagate the
  • 14. Sequential Assignment Routing  The SAR algorithm creates multiple trees, where the root of each tree is a one-hop neighbor of the sink.  Each tree grows toward from the sink and avoids nodes with low throughput or high delay.  At the end of procedure, most nodes belong to multiple trees.
  • 15. SPIN  SPIN stands for Sensor Protocol for Information via Negotiation.  SPIN uses negotiation and resources adaption to address the deficiencies of flooding.  Negotiation reduces overlap and implosion.  Meta-data is transmitted instead of row data.  SPIN has three types of messages : ADV, REQ and DATA.  The simple version of SPIN is shown in
  • 16. SPIN Sensor Protocol for Information via Negotiation
  • 17. Direct Diffusion  Useful where the sensor nodes themselves generate requests/queries for data sensed by other nodes.  Each sensor node names its data with one or more attributes and other nodes express their interest depending on these attributes.  Data is propagated along the reverse path of the interest propagation.  Each path is associated with a gradient that is formed at the time of interest propagation.  The gradient corresponding to an interest is derived from the interval/data-rate field specified in the interest.  This model uses data naming by attributes and local data transformation to reflect the data centric nature of sensor network operations.
  • 18. Geographic Hash Table  GHT is a system based on data centric storage.  GHT hashes keys into geographic co- ordinates and stores a pair at the sensor node nearest to the hash value.  The calculated hash value is mapped onto a unique node consistently, so that queries for the data can be routed to the correct node.  Data is distributed among nodes such that it is scalable and the storage load is balanced.  GHT is more effective in large network
  • 19. Direct Transmission  All sensor nodes transmit their data directly to BS.  This is extremely expensive in terms of energy consumed, since the BS may be very far away from some nodes.  Nodes must take turns while transmitting to the BS to avoid collision.  The media access delay is also large
  • 20. PEGASIS  PEGASIS assumes that all sensor nodes know the location of every other node.  Any node has the required transmission range to reach the BS in one-hop, when it is select as a leader.  The goals of PEGASIS are as follows : Minimize the distance over which each node transmits. Minimize the broadcasting overhead. Minimize the number of messages that need to be sent to the BS. Distribute the energy consumption equally across all nodes.
  • 21. PEGASIS Power Efficient Gathering for Sensor Information Systems
  • 22.  A greedy algorithm is used to construct a chain of sensor nodes, starting from the node farthest from the BS.  At each step, the nearest neighbor which has not been visited is added to the chain.  At every node, data fusion is carried out. so, that only one message is passed on from one node to next.  The leader finally transmits one message to BS.  The delay involved in message reaching the BS is O(N), where N is the total number of nodes in
  • 23. Binary Scheme  This is also a chain-based scheme like PEGASIS.  Classifies nodes into different levels.  Nodes which receive messages at one level rises to the next level.  The number of nodes is halved from one level to the next.
  • 24. Binary Scheme • In figure aggregated data reaches the BS in 4 steps, which is O(log2 N),where N is the number of nodes in the network.
  • 25. Chain Based Three level Scheme  In this scheme chain is constructed as in PEGASIS.  The chain is divided into number of groups to space out simultaneous transmission.  One node out of each group aggregates data from all group members and rises to the next level.  In the second level all nodes are divided into two groups.  Third level consist of a message exchange between one node from each group of second level.  Finally the leader transmits a single message
  • 26. Chain Based Three level Scheme
  • 27. References  Ad Hoc Wireless Networks ◦ C.Shiva Ram Murthy ◦ B.S.Manoj  www.wikipedia.org/wiki/Wireless_sens or_network  www.mdpi.com/jouranal/sensor