SlideShare a Scribd company logo
1 of 2
Greedy Routing with Anti-Void Traversal for Wireless Sensor
Networks

[21702]



INTRODUCTION
FEASIBILITY STUDY

All projects are feasible given unlimited resources and infinite time. But the development of software is
plagued by the scarcity of resources and difficult delivery rates. It is both necessary and prudent to
evaluate the feasibility of a projects at the earliest possible time.
Three key considerations are involved in the feasibility analysis.
Economic Feasibility:
This procedure is to determine the benefits and savings that are expected from a candidate system and
compare them with costs. If benefits outweigh costs, then the decision is made to design and implement
the system. Otherwise, further justification or alterations in proposed system will have to be made if it is
to have a chance of being approved. This is an ongoing effort that improves in accuracy at each phase of
the system life cycle.
Technical Feasibility:
Technical feasibility centers on the existing computer system (hardware, software, etc.,) and to what
extent it can support the proposed addition. If the budget is a serious constraint, then the projects is
judged not feasible.
Operational Feasibility:
People are inherently resistant to change, and computers have been known to facilitate change. It is
understandable that the introduction of a candidate system requires special effort to educate, sell, and
train the staff on new ways of conducting business.



CONCEPTS
A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to cooperatively
monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion
or pollutants. The development of wireless sensor networks was motivated by military applications such
as battlefield surveillance. They are now used in many industrial and civilian application areas, including
industrial process monitoring and control, machine health monitoring, environment and habitat
monitoring, healthcare applications, home automation, and traffic control.
In addition to one or more sensors, each node in a sensor network is typically equipped with a radio
transceiver or other wireless communications device, a small microcontroller, and an energy source,
usually a battery. A sensor node might vary in size from that of a shoebox down to the size of a grain of
dust, although functioning "motes" of genuine microscopic dimensions have yet to be created. The cost
of sensor nodes is similarly variable, ranging from hundreds of dollars to a few pennies, depending on
the size of the sensor network and the complexity required of individual sensor nodes. Size and cost
constraints on sensor nodes result in corresponding constraints on resources such as energy, memory,
computational speed and bandwidth.
A sensor network normally constitutes a wireless ad-hoc network, meaning that each sensor supports a
multi-hop routing algorithm (several nodes may forward data packets to the base station).

Applications
The applications for WSNs are varied, typically involving some kind of monitoring, tracking, or
controlling. Specific applications include habitat monitoring, object tracking, nuclear reactor control, fire
detection, and traffic monitoring. In a typical application, a WSN is scattered in a region where it is
meant to collect data through its sensor nodes.
Area monitoring

Area monitoring is a common application of WSNs. In area monitoring, the WSN is deployed over a
region where some phenomenon is to be monitored. For example, a large quantity of sensor nodes
could be deployed over a battlefield to detect enemy intrusion instead of using landmines. When the
sensors detect the event being monitored (heat, pressure, sound, light, electro-magnetic field, vibration,
etc), the event needs to be reported to one of the base stations, which can take appropriate action (e.g.,
send a message on the internet or to a satellite). Depending on the exact application, different objective
functions will require different data-propagation strategies, depending on things such as need for real-
time response, redundancy of the data (which can be tackled via data aggregation and information
fusion techniques), need for security, etc.

Environmental monitoring
A number of WSNs have been deployed for environmental monitoring. Many of these have been short
lived, often due to the prototype nature of the projects. Examples of longer-lived deployments are
monitoring the state of permafrost in the Swiss Alps: The PermaSense Project, PermaSense Live Data
Browser and glacier monitoring.

More Related Content

What's hot

Overview of wireless sensor network
Overview of wireless sensor networkOverview of wireless sensor network
Overview of wireless sensor networkjuno susi
 
Sensor Based Network
Sensor Based NetworkSensor Based Network
Sensor Based NetworkSaqib Naveed
 
Abstract sensor networks
Abstract sensor networksAbstract sensor networks
Abstract sensor networksGaurav Tiwari
 
An overview of a wireless sensor network communication ppt
An overview of a wireless sensor network communication pptAn overview of a wireless sensor network communication ppt
An overview of a wireless sensor network communication pptphbhagwat
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkNeha Kulkarni
 
Sensor networks
Sensor networksSensor networks
Sensor networksMarc Pous
 
wirelss sensor network
wirelss sensor networkwirelss sensor network
wirelss sensor networkrasyidi usman
 
Sensor networks a survey
Sensor networks a surveySensor networks a survey
Sensor networks a surveywsnapple
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkShubhamTakkar
 
IR remote sensing technology
IR remote sensing technologyIR remote sensing technology
IR remote sensing technologyHarshithaAllu
 
Energy Efficient and Secure Intrusion Detection for Maximum Coverage in WSN
Energy Efficient and Secure Intrusion Detection for Maximum Coverage in WSNEnergy Efficient and Secure Intrusion Detection for Maximum Coverage in WSN
Energy Efficient and Secure Intrusion Detection for Maximum Coverage in WSNAmairullah Khan Lodhi
 
Assessment of Greenhouse Gases and Parameters using Wireless Sensor Network
Assessment of Greenhouse Gases and Parameters using Wireless Sensor NetworkAssessment of Greenhouse Gases and Parameters using Wireless Sensor Network
Assessment of Greenhouse Gases and Parameters using Wireless Sensor NetworkAssociate Professor in VSB Coimbatore
 
wireless sensor networks using zigbee and wifi
wireless sensor networks using zigbee and wifiwireless sensor networks using zigbee and wifi
wireless sensor networks using zigbee and wifisunil raj kumar
 
Data acquisition and storage in Wireless Sensor Network
Data acquisition and storage in Wireless Sensor NetworkData acquisition and storage in Wireless Sensor Network
Data acquisition and storage in Wireless Sensor NetworkRutvik Pensionwar
 
ANALYSIS OF WIRELESS SENSOR NETWORKS DEPLOYMENTS USING VERTICAL VARIANCE TRIM...
ANALYSIS OF WIRELESS SENSOR NETWORKS DEPLOYMENTS USING VERTICAL VARIANCE TRIM...ANALYSIS OF WIRELESS SENSOR NETWORKS DEPLOYMENTS USING VERTICAL VARIANCE TRIM...
ANALYSIS OF WIRELESS SENSOR NETWORKS DEPLOYMENTS USING VERTICAL VARIANCE TRIM...ijasuc
 

What's hot (20)

Overview of wireless sensor network
Overview of wireless sensor networkOverview of wireless sensor network
Overview of wireless sensor network
 
Sensor Based Network
Sensor Based NetworkSensor Based Network
Sensor Based Network
 
Abstract sensor networks
Abstract sensor networksAbstract sensor networks
Abstract sensor networks
 
An overview of a wireless sensor network communication ppt
An overview of a wireless sensor network communication pptAn overview of a wireless sensor network communication ppt
An overview of a wireless sensor network communication ppt
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
WSN
WSNWSN
WSN
 
Sensor networks
Sensor networksSensor networks
Sensor networks
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
wirelss sensor network
wirelss sensor networkwirelss sensor network
wirelss sensor network
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
Sensor networks a survey
Sensor networks a surveySensor networks a survey
Sensor networks a survey
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
IR remote sensing technology
IR remote sensing technologyIR remote sensing technology
IR remote sensing technology
 
Energy efficient routing protocol
Energy efficient routing protocolEnergy efficient routing protocol
Energy efficient routing protocol
 
Energy Efficient and Secure Intrusion Detection for Maximum Coverage in WSN
Energy Efficient and Secure Intrusion Detection for Maximum Coverage in WSNEnergy Efficient and Secure Intrusion Detection for Maximum Coverage in WSN
Energy Efficient and Secure Intrusion Detection for Maximum Coverage in WSN
 
Assessment of Greenhouse Gases and Parameters using Wireless Sensor Network
Assessment of Greenhouse Gases and Parameters using Wireless Sensor NetworkAssessment of Greenhouse Gases and Parameters using Wireless Sensor Network
Assessment of Greenhouse Gases and Parameters using Wireless Sensor Network
 
wireless sensor networks using zigbee and wifi
wireless sensor networks using zigbee and wifiwireless sensor networks using zigbee and wifi
wireless sensor networks using zigbee and wifi
 
Data acquisition and storage in Wireless Sensor Network
Data acquisition and storage in Wireless Sensor NetworkData acquisition and storage in Wireless Sensor Network
Data acquisition and storage in Wireless Sensor Network
 
ANALYSIS OF WIRELESS SENSOR NETWORKS DEPLOYMENTS USING VERTICAL VARIANCE TRIM...
ANALYSIS OF WIRELESS SENSOR NETWORKS DEPLOYMENTS USING VERTICAL VARIANCE TRIM...ANALYSIS OF WIRELESS SENSOR NETWORKS DEPLOYMENTS USING VERTICAL VARIANCE TRIM...
ANALYSIS OF WIRELESS SENSOR NETWORKS DEPLOYMENTS USING VERTICAL VARIANCE TRIM...
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 

Viewers also liked

Cancùn y su museo submarino
Cancùn y su museo submarinoCancùn y su museo submarino
Cancùn y su museo submarinoJorge Monforte
 
Entrega del trabajo_final, 29-nov-15
Entrega del trabajo_final, 29-nov-15Entrega del trabajo_final, 29-nov-15
Entrega del trabajo_final, 29-nov-15jamolanog
 
Play Group English (ii-kk drowing over dotted line 1)
Play Group English (ii-kk  drowing over dotted line 1)Play Group English (ii-kk  drowing over dotted line 1)
Play Group English (ii-kk drowing over dotted line 1)Cambriannews
 
Mapas mentales tema 8 y 9 habia sido enviado 1ro
Mapas mentales tema 8 y 9 habia sido enviado 1roMapas mentales tema 8 y 9 habia sido enviado 1ro
Mapas mentales tema 8 y 9 habia sido enviado 1rocarlyecolina
 
Informe semestral ene octubre 2015 proyectos promovidos.
Informe  semestral ene octubre 2015 proyectos promovidos.Informe  semestral ene octubre 2015 proyectos promovidos.
Informe semestral ene octubre 2015 proyectos promovidos.Hermel Cabrera
 
TRAINING BENEFICIARIES 10
TRAINING BENEFICIARIES 10TRAINING BENEFICIARIES 10
TRAINING BENEFICIARIES 10SRSP
 
Orangitossummerdiary (1)
Orangitossummerdiary (1)Orangitossummerdiary (1)
Orangitossummerdiary (1)Aphro Gkiouris
 

Viewers also liked (11)

Cancùn y su museo submarino
Cancùn y su museo submarinoCancùn y su museo submarino
Cancùn y su museo submarino
 
Entrega del trabajo_final, 29-nov-15
Entrega del trabajo_final, 29-nov-15Entrega del trabajo_final, 29-nov-15
Entrega del trabajo_final, 29-nov-15
 
Play Group English (ii-kk drowing over dotted line 1)
Play Group English (ii-kk  drowing over dotted line 1)Play Group English (ii-kk  drowing over dotted line 1)
Play Group English (ii-kk drowing over dotted line 1)
 
Mapas mentales tema 8 y 9 habia sido enviado 1ro
Mapas mentales tema 8 y 9 habia sido enviado 1roMapas mentales tema 8 y 9 habia sido enviado 1ro
Mapas mentales tema 8 y 9 habia sido enviado 1ro
 
Informe semestral ene octubre 2015 proyectos promovidos.
Informe  semestral ene octubre 2015 proyectos promovidos.Informe  semestral ene octubre 2015 proyectos promovidos.
Informe semestral ene octubre 2015 proyectos promovidos.
 
La recette
La recetteLa recette
La recette
 
TRAINING BENEFICIARIES 10
TRAINING BENEFICIARIES 10TRAINING BENEFICIARIES 10
TRAINING BENEFICIARIES 10
 
Orangitossummerdiary (1)
Orangitossummerdiary (1)Orangitossummerdiary (1)
Orangitossummerdiary (1)
 
Feliz 2011
Feliz 2011Feliz 2011
Feliz 2011
 
Resume-shweta
Resume-shwetaResume-shweta
Resume-shweta
 
Cuento El rey mocho
Cuento El rey mochoCuento El rey mocho
Cuento El rey mocho
 

Similar to Greedy routing with anti

Wireless Sensor Network – Theoretical Findings and Applications
Wireless Sensor Network – Theoretical Findings and ApplicationsWireless Sensor Network – Theoretical Findings and Applications
Wireless Sensor Network – Theoretical Findings and ApplicationsAshishDPatel1
 
Concepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networksConcepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networksIJCNCJournal
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkCassie Romero
 
Vlite node – new sensors solution for farming
Vlite node – new sensors solution for farmingVlite node – new sensors solution for farming
Vlite node – new sensors solution for farmingKarel Charvat
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Easy n Inspire L
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Networkijtsrd
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksAneeshGKumar
 
SURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINS
SURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINSSURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINS
SURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINSijasuc
 
WSN_Chapter _1.pptx
WSN_Chapter _1.pptxWSN_Chapter _1.pptx
WSN_Chapter _1.pptxKamakshiMB1
 
Issues and Challenges in Distributed Sensor Networks- A Review
Issues and Challenges in Distributed Sensor Networks- A ReviewIssues and Challenges in Distributed Sensor Networks- A Review
Issues and Challenges in Distributed Sensor Networks- A ReviewIOSR Journals
 
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor NetworksIRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor NetworksIRJET Journal
 
A survey on sensor cloud architecture, applications, and approaches
A survey on sensor cloud architecture, applications, and approachesA survey on sensor cloud architecture, applications, and approaches
A survey on sensor cloud architecture, applications, and approachesNgoc Thanh Dinh
 
Comprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolComprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolIJRES Journal
 
A Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSA Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSIRJET Journal
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNIAEME Publication
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...ijasuc
 

Similar to Greedy routing with anti (20)

Wireless Sensor Network – Theoretical Findings and Applications
Wireless Sensor Network – Theoretical Findings and ApplicationsWireless Sensor Network – Theoretical Findings and Applications
Wireless Sensor Network – Theoretical Findings and Applications
 
Concepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networksConcepts and evolution of research in the field of wireless sensor networks
Concepts and evolution of research in the field of wireless sensor networks
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor Network
 
Vlite node – new sensors solution for farming
Vlite node – new sensors solution for farmingVlite node – new sensors solution for farming
Vlite node – new sensors solution for farming
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
SURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINS
SURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINSSURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINS
SURVEY OF TRUST MODELS IN DIFFERENT NETWORK DOMAINS
 
WSN_Chapter _1.pptx
WSN_Chapter _1.pptxWSN_Chapter _1.pptx
WSN_Chapter _1.pptx
 
H017133442
H017133442H017133442
H017133442
 
Issues and Challenges in Distributed Sensor Networks- A Review
Issues and Challenges in Distributed Sensor Networks- A ReviewIssues and Challenges in Distributed Sensor Networks- A Review
Issues and Challenges in Distributed Sensor Networks- A Review
 
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor NetworksIRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
IRJET-A Brief Study of Leach based Routing Protocol in Wireless Sensor Networks
 
A survey on sensor cloud architecture, applications, and approaches
A survey on sensor cloud architecture, applications, and approachesA survey on sensor cloud architecture, applications, and approaches
A survey on sensor cloud architecture, applications, and approaches
 
survey
surveysurvey
survey
 
Comprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolComprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing Protocol
 
A Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNSA Paired Key Mechanism for Wirelesslink Security for WSNS
A Paired Key Mechanism for Wirelesslink Security for WSNS
 
F33022028
F33022028F33022028
F33022028
 
F33022028
F33022028F33022028
F33022028
 
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSNA SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
A SURVEY OF ENERGY-EFFICIENT COMMUNICATION PROTOCOLS IN WSN
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
 

Greedy routing with anti

  • 1. Greedy Routing with Anti-Void Traversal for Wireless Sensor Networks [21702] INTRODUCTION FEASIBILITY STUDY All projects are feasible given unlimited resources and infinite time. But the development of software is plagued by the scarcity of resources and difficult delivery rates. It is both necessary and prudent to evaluate the feasibility of a projects at the earliest possible time. Three key considerations are involved in the feasibility analysis. Economic Feasibility: This procedure is to determine the benefits and savings that are expected from a candidate system and compare them with costs. If benefits outweigh costs, then the decision is made to design and implement the system. Otherwise, further justification or alterations in proposed system will have to be made if it is to have a chance of being approved. This is an ongoing effort that improves in accuracy at each phase of the system life cycle. Technical Feasibility: Technical feasibility centers on the existing computer system (hardware, software, etc.,) and to what extent it can support the proposed addition. If the budget is a serious constraint, then the projects is judged not feasible. Operational Feasibility: People are inherently resistant to change, and computers have been known to facilitate change. It is understandable that the introduction of a candidate system requires special effort to educate, sell, and train the staff on new ways of conducting business. CONCEPTS A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance. They are now used in many industrial and civilian application areas, including industrial process monitoring and control, machine health monitoring, environment and habitat monitoring, healthcare applications, home automation, and traffic control. In addition to one or more sensors, each node in a sensor network is typically equipped with a radio transceiver or other wireless communications device, a small microcontroller, and an energy source, usually a battery. A sensor node might vary in size from that of a shoebox down to the size of a grain of
  • 2. dust, although functioning "motes" of genuine microscopic dimensions have yet to be created. The cost of sensor nodes is similarly variable, ranging from hundreds of dollars to a few pennies, depending on the size of the sensor network and the complexity required of individual sensor nodes. Size and cost constraints on sensor nodes result in corresponding constraints on resources such as energy, memory, computational speed and bandwidth. A sensor network normally constitutes a wireless ad-hoc network, meaning that each sensor supports a multi-hop routing algorithm (several nodes may forward data packets to the base station). Applications The applications for WSNs are varied, typically involving some kind of monitoring, tracking, or controlling. Specific applications include habitat monitoring, object tracking, nuclear reactor control, fire detection, and traffic monitoring. In a typical application, a WSN is scattered in a region where it is meant to collect data through its sensor nodes. Area monitoring Area monitoring is a common application of WSNs. In area monitoring, the WSN is deployed over a region where some phenomenon is to be monitored. For example, a large quantity of sensor nodes could be deployed over a battlefield to detect enemy intrusion instead of using landmines. When the sensors detect the event being monitored (heat, pressure, sound, light, electro-magnetic field, vibration, etc), the event needs to be reported to one of the base stations, which can take appropriate action (e.g., send a message on the internet or to a satellite). Depending on the exact application, different objective functions will require different data-propagation strategies, depending on things such as need for real- time response, redundancy of the data (which can be tackled via data aggregation and information fusion techniques), need for security, etc. Environmental monitoring A number of WSNs have been deployed for environmental monitoring. Many of these have been short lived, often due to the prototype nature of the projects. Examples of longer-lived deployments are monitoring the state of permafrost in the Swiss Alps: The PermaSense Project, PermaSense Live Data Browser and glacier monitoring.