SlideShare a Scribd company logo
1 of 5
Download to read offline
Ms. Manisha M. Magdum Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -5) April 2015, pp.107-111
www.ijera.com 107 | P a g e
A Comparative Analysis for Hybrid Routing Protocol for
Wireless Sensor Networks
Ms. Manisha M. Magdum (student, ME E &TC) 1
, Associate Prof. P. P.
Belagali2
Departmen of Electronics & Telecommunication, Dr. J. J. Magdum College of Engineering, Jaysingpur4
Abstract
Wireless Sensor Networks (WSNs) consist of smallnodes with sensing, computation and wireless
communicationscapabilities. These sensor networks interconnect a several othernodes when established in large
and this opens up severaltechnical challenges and immense application possibilities.These wireless sensor
networks communicate using multi-hopwireless communications, regular ad hoc routing techniquescannot be
directly applied to sensor networks domain due tothe limited processing power and the finite power available
toeach sensor nodes hence recent advances in wireless sensornetworks have developed many protocols
depending on theapplication and network architecture and are specificallydesigned for sensor networks where
energy awareness is anessential consideration. This paper presents routingprotocols for sensor networks and
compares the routingprotocols that are presently of increasing importance.
In this paper, we propose Hybrid Routing Protocol whichcombines the merits of proactive and reactive approach
andovercome their demerits.
Keywords: Ad hoc network, Hybrid Routing Protocol, AODV, Broadcast Reply (BR), etc
I. INTRODUCTION
Wireless sensor networks are a bridge to
thephysical world. It is a fast growing and existing
researcharea which has attracted considerable
research attention inthe recent past; this is backed by
the recent tremendoustechnological advancement in
the development of low-cost sensor devices equipped
with wireless network interfaceswhich are technically
and economically feasible. Thesensing electronics
measure ambient conditions related tothe
environment surrounding the sensor and transform
theminto an electric signals which when processed
reveal someproperties about objects located or events
happening in thevicinity of the sensor.
A Wireless Sensor Network (WSN) contains
hundreds or thousands of these sensor nodes
whichcan be networked in many applications that
requireunattended operations, these have the ability
to communicate either among each other or directly
to an external basestationand also allows for sensing
over larger geographicalregions with greater
accuracy. The figure 1 shows theschematic diagram
of sensor node components where eachsensor node
comprises sensing, processing, transmission,
mobilizes, position finding system, and power units
and alsoshows the communication architecture of a
WSN. Eachsensor node bases its decisions on its
mission, theinformation it currently has, knowledge
of its computing, communication, and energy
resources and have capability tocollect and route data
either to other sensors or back to anexternal base
station or stations which may be a fixed or amobile
node capable of connecting the sensor network to
anexisting communication infrastructure or to the
Internetwhere users have access to the reported data.
Networking unattended sensor nodes may have
profoundeffect on the efficiency of many military and
civilapplications such as target field imaging,
intrusion detection,weather monitoring, security and
tactical surveillance,distributed computing, detecting
ambient conditions such astemperature, movement,
sound, light or the presence ofcertain objects,
inventory control and disaster management.Routing
in WSNs is very challenging due to theinherent
characteristics that distinguish these networks
fromother wireless networks like mobile ad hoc
RESEARCH ARTICLE OPEN ACCESS
Ms. Manisha M. Magdum Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -5) April 2015, pp.107-111
www.ijera.com 108 | P a g e
networks orcellular networks. Firstly, due to the
relatively large numberof sensor nodes, it is not
possible to build a globaladdressing scheme for the
deployment of a large number ofsensor nodes as the
overhead of ID maintenance is highhence traditional
IP-based protocols may not be applied toWSNs. In
WSNs getting the data is more important
thanknowing the IDs of the node that sent the data.
Second, incontrast to typical communication
networks, almost allapplications of sensor networks
require the flow of senseddata from multiple sources
to a particular Base Station butthis does not prevent
the flow of data to be in other forms.Third, sensor
nodes are tightly constrained in terms ofenergy,
processing, and storage capacities. Thus, theyrequire
careful resource management. Fourth, in
mostapplication scenarios, nodes in WSNs are
generallystationary after deployment except a few
mobile nodes.Sensor networks are application
specific, i.e., designrequirements of a sensor network
change with application.Fifth, position awareness of
sensor nodes is important sincedata collection is
normally based on the location.
Currently,it is not feasible to use Global
Positioning System (GPS)hardware, for this purpose
many new algorithms have beenproposed for the
routing problem in WSNs. These routingmechanisms
consider the inherent features of WSNs and
theapplication and architecture requirements. The
task offinding and maintaining routes in WSNs is
nontrivial sinceenergy restrictions and sudden
changes in node status causefrequent and
unpredictable topological changes. Tominimize
energy consumption, routing techniques proposedin
the literature for WSNs employ some well-known
routingtactics as well as tactics special to
WSNs.Classification of Almost all of the routing
protocolscan be according to the network structure as
flat,hierarchical, or location-based. In flat networks,
all nodesplay the same role while hierarchical
protocols aim atclustering the nodes so that cluster
heads can do someaggregation and reduction of data
in order to save energy.Location-based protocols
utilize the position information torelay the data to the
desired regions rather than the wholenetwork. In this
paper, the routing techniques in WSNs thathave been
developed in recent years are explored andclassified,
providing deeper understanding of the currentrouting
protocols and also some open research issues thatcan
be further pursued are identified here.
II. ROUTING CHALLENGES AND
DESIGN ISSUES INWSNs
Despite the countless applications of
WSNs,these networks have several restrictions. The
design ofrouting protocols in WSNs is influenced by
manychallenging factors which must be overcome
before efficientcommunication is achieved in WSNs.
Some of the routingchallenges and design issues that
affect routing process inWSNs.
A. Node deployment
Node deployment in WSNs is
applicationdependent and affects the performance of
the routingprotocol which can be either deterministic
or randomized. Indeterministic deployment, the
sensors are manually placedand data is routed
through pre-determined paths. In randomnode
deployment, the sensor nodes are scattered
randomlycreating an infrastructure in an ad hoc
manner. If theresultant distribution of nodes is not
uniform, optimalclustering becomes necessary to
allow connectivity andenable energy efficient
network operation.
B. Energy consumption without losing accuracy
Sensor nodes can use up their limited supply
ofenergy performing computations and
transmittinginformation in a wireless environment
but their lifetime isstrongly battery dependent and
hence energy-conservingforms of communication
and computation are essential.
C. Data Reporting Model
Data sensing and reporting in WSNs is
dependenton the application and the time criticality
of the datareporting. Data reporting can be
categorized as either time driven (continuous), event-
driven, query-driven, and hybrid.The routing protocol
is highly influenced by the datareporting model with
regard to energy consumption androute stability.
D. Fault Tolerance
Some sensor nodes may fail or be blocked due
tolack of power, physical damage, or
environmentalinterference. If many nodes fail, MAC
and routing protocolsmust accommodate formation of
new links and routes to thedata collection base station
which requires actively adjustingtransmit powers and
signaling rates on the existing links toreduce energy
consumption or rerouting packets throughregions of
the network where more energy is available.
Therefore, multiple levels of redundancy may be
needed in afault-tolerant sensor network.
E. Connectivity
High node density in sensor networks
precludesthem from being completely isolated from
each other.Therefore, sensor nodes are expected to be
highly connected.This, however, may not prevent the
network topology frombeing variable and the
network size from being shrinkingdue to sensor node
failures. In addition, connectivitydepends on the,
possibly random, distribution of nodes.
F. Quality of Service
Ms. Manisha M. Magdum Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -5) April 2015, pp.107-111
www.ijera.com 109 | P a g e
In some applications, data should be
deliveredwithin a certain period of time from the
moment it is sensed; otherwise the data will be
useless. Therefore boundedlatency for data delivery
is another condition for timeconstrainedapplications.
As the energy gets depleted, thenetwork may be
required to reduce the quality of the resultsin order to
reduce the energy dissipation in the nodes and hence
lengthen the total network lifetime. Hence, energy
awarerouting protocols are required to capture this
requirement.
G. Operating Environment
We can set up sensor network in the interior
oflarge machinery, at the bottom of an ocean, in a
biologicallyor chemically contaminated field, in a
battle field beyond theenemy lines, in a home or a
large building, in a largewarehouse, attached to
animals, attached to fast movingvehicles, in forest
area for habitat monitoring etc.
H. Production Costs
Since the sensor networks consist of a
largenumber of sensor nodes, the cost of a single
node is veryimportant to justify the overall cost of the
networks andhence the cost of each sensor node has
to be kept low.
III. ROUTING PROTOCOLS IN WSNs
In this section, we survey the state-of-the-
artrouting protocols for WSNs. Recent advances in
wirelesssensor networks have led to many new
protocols specificallydesigned for sensor networks
where energy awareness is anessential consideration.
A. Ad hoc On-Demand Distance Vector(AODV)
The Ad hoc On-demand Distance Vector
(AODV) [6, 8, 9]protocol, one of the on-demand
routing algorithms that hasreceive the most attention,
however, does not utilize multiplepaths. It joins the
mechanisms of DSDV and DSR. The
periodicbeacons, hop-by-hop routing and the
sequence numbers of DSDVand the pure on-demand
mechanism of Route Discovery andRoute
Maintenance of DSR are combined. In AODV [6], at
Every instance, route discovery is done for fresh
communication whichconsumes more bandwidth and
causes more routing over-head.The source prepares
RREQ packet which is broadcast to it's neighboring
nodes. If neighboring node will keep backward
pathtowards source. As soon as destination receives
the RREQpacket, it sends RREP packet on received
path.This RREP packet is unicast to the next node on
RREP path. Theintermediate node on receiving the
RREP packet make reversalof path set by the RREQ
packet. As soon as RREP packet isreceived by the
source, it starts data transmission on the forwardpath
set by RREP packet. Sometimes while data
transmission isgoing on, if path break occurs due to
mobility of node out ofcoverage area of nodes on the
active path, data packets will belost. When the
network traffic requires real time delivery (voice,for
instance), dropping data packets at the intermediate
nodescan be costly. Likewise, if the session is a best
effort, TCPconnection, packet drops may lead to slow
start, timeout, andthroughput degradation.
B. Threshold - sensitive Energy Efficient sensor
Network protocol (TEEN):
TEEN is a reactive protocol proposed for time-
criticalapplications [7]. BASE STATION broadcasts
the attribute, HardThreshold (HT) and Soft Threshold
(ST) values to its clustermembers. The sensor nodes
starts sensing and transmits thesensed data when it
exceeds HT. HT is the minimum attributerange above
which the values are expected. The transmitted
sensevalue is stored in an internal variable called
Sensed Value (SV).The cluster nodes again starts
sensing, when its value exceeds theST. The minimum
change in the sensed value it switches on
itstransmitter and transmits.The energy is conserved
since the sensor nodes in thecluster senses
continuously but transmits only when the
sensedvalue is above HT. The ST further reduces the
transmissionwhich could have been occurred when
there is a little change orno change in sensed
attribute. As the cluster heads (CH) need toperform
extra computations it consumes more energy
comparedto other nodes. The main drawback of this
protocol is that thetransmission from nodes to CH
will not be there when the sensedvalue is not greater
than HT, hence the CH will never come toknow even
when any one of the sensor node dies. Accurate
andclear picture of the network can be obtained by
fixing the ST assmaller value even though it
consumes more energy due tofrequent transmissions
[10].
C. Hybrid Routing Protocol:
Hybrid Routing Protocols combines the merits of
proactive andreactive routing protocols by
overcoming their demerits.The constraints of TEEN
are incorporated in AODVrouting protocol. The
modified algorithm is shown in figure 3.Each cluster
node sense the data, if the value is greater than
HT,then node sends RREQ to the destination. By
receiving RREPmessage from destination source
node transmits the data todestination node. The HT
value is stored in SV a variable whichstores the
transmitted threshold value. The cluster nodes
againstarts sensing, when its value exceeds the ST i.e.
The minimumchange in the sensed value occurs it
switches on its transmitterand transmits. Active nodes
in the networks are determined bybroadcasting a
“Hello” message periodically in the network. If
anode fails to reply a link break is detected and a
Ms. Manisha M. Magdum Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -5) April 2015, pp.107-111
www.ijera.com 110 | P a g e
Route Error(RERR) message is transmitted which is
used to invalidate theroute as it flows through the
network. A node also generates aRERR message if it
gets message destined to a node for which aroute is
unavailable. The RREP packet is broadcast by the
node along the path. Thenodes that are neighbor to
the node and not along the pathreceives the RREP
packet, updates their routing table and dropthe
packet. As a results of broadcasting RREP from
destinationtowards source, node on the active path as
well as nodesneighbor to active path node able to
gather more routinginformation.
Route Discovery in Hybrid Protocol:
Figure : RREP Transmission in the Network
In Hybrid protocol, RREP packet is broadcast to
all neighbors whichare in the coverage area of the
replying node. The RREP packetis broadcast to all
neighbor nodes along with intendednode.
Onreceiving RREP packet, neighboring node makes
an entry in therouting table about complete path
which has received in RREP. Ifneighboring node is
not the intendednode, it drops RREP packet.If it is
intendednode, it adds own id in the received path
andrebroadcast RREP. This process of extracting
useful informationfrom RREP packet and updates of
RREP packet is carried outuntil RREP packet is not
received by the destination which issource of RREQ
packet. Figure 5.2 shows the process of RREPpacket
transmission.In the Figure, node 14 is sending a
RREP packet is responseto RREQ from node 0.
Routing table at node 14 after processingRREQ
packet from node 0
Dest Next hop Hop count
0 11 4
At node 14 the next hop towards node 0 is node
11 shown inabove Table with node 11 as intended
node. It prepares RREPpacket and broadcast with
node 11 as the intended node.Neighboring node
11,12,13will receives the RREP packet.
Route Maintenance in Hybrid Protocol:
Usually link failure occurs due to node mobility.
A node ondetecting link failure send a route error
message (RERR). ThisRERR message is forwarded
to the source. Source will start freshroute discovery
procedure after receiving RERR message Thisprocess
is shown in Figure bellow:
Figure : Link Failure and Recovery
IV. Result Analysis
Energy Consumption:
The energy consumption is main factor in a
network and the average energy in AODV and
HAODV protocols is shown in figure 5.1 In HAODV
the number of transmissions is reduced due to
threshold constraints.
Figure 5.1: Graph 1: Energy in joules vs time in sec.
Packet Delivery Ratio:
Packet Delivery Ratio is used by ad-hoc and
wireless sensor networks (WSNs) protocols for
selecting best routes, optimum transmission rate and
minimal consumption of energy.
Ms. Manisha M. Magdum Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -5) April 2015, pp.107-111
www.ijera.com 111 | P a g e
Figure 5.2: Graph 2: PDR vs time in seconds.
Throughput:
Throughput is the sum of data rates delivered to
a network per time slot. Throughputs are measured in
Kbps, Mbps &Gbps. Figure 5.3 shows throughputs
for HAODV and AODV protocols. From the graph it
is observed that throughputs for HAODV is better
than AODV
Figure 5.3: Graph 3: Throughput in kbps vs time in
seconds
V. Conclusion
In this paper the energy efficient hybrid AODV
protocol is presented. It is based on hierarchical on
demand routing. It is a three level cluster based
routing algorithm. It is also a power efficient routing.
Node’s transmission power plays a very crucial role
for increasing routing stability. From the Simulation
results, the Hybrid AODV not only increments the
average energy efficiency but also improves the
network performance through the packet delivery
ratio & throughput.
References:
[1] Chiara Buratti, Andrea Conti, Davide
Dardari and Roberto Verdone “An Overview
on Wireless Sensor Networks Technology
and Evolution”, Sensors, PP: 6869-6896,
2009.
[2] Akyildiz, I.; Su, W.; Sankarasubramaniam,
Y.; Cayirci, E. “A survey on sensor
networks” IEEE Commun., Vol: 40, PP:
102–114, March. 2002.
[3] Kemal Akkaya and Mohamed Younis
“Survey on Routing Protocols for Wireless
Sensor Networks”, IEEE, 2005.
[4] J. Chang and L. Tassiulas, “Maximum
lifetime routing in wireless sensor
networks,” IEEE/ACM Transactions on
Networking (TON), vol. 12, no. 4, pp. 609–
619, 2004.
[5] I. Chakeres and E. Belding-Royer, “AODV
routing protocol implementation design,”.
Proceedings. 24th International Conference
on in Distributed Computing Systems
Workshops, pp. 698–703, 2004.
[6] Charles E. Perkins, Elizabeth M. Belding-
Royer, Samir R. Das Ad hoc On-Demand
Distance Vector Routing, IEFT MANET
Draft, February 2003.
[7] Arati Manjeshwar and Dharma P. Agarwal:
“A Routing Protocol for Enhanced
Efficiency in Wireless Sensor Networks”,
International Parallel and Distributed
Processing Symposium (IPDPS), IEEE,
2001.
[8] E. Royer and C. Perkins, “An
implementation study of the AODV routing
protocol,” in 2000 IEEE Wireless
Communications and Networking
Conference, 2000.WCNC, vol. 3, 2000.
[9] Kunjan Patel, Lim Jong Chern and C.J
Bleakley, “MAW: A Reliable Lightweight
Multi-Hop Wireless Sensor Network Routing
Protocol” International Conference on
Computational Science and Engineering,
IEEE COMPUTER SOCIETY, 2009.
[10] D.Baghyalakshmi, Jemimah Ebenezer and
S.A.V .Satyamurty, “Low Latency And
Energy Efficient Routing Protocols For
Wireless Sensor Networks” International
Conference on Wireless Communication and
Sensor Computing, ICWCSC IEEE FEB
2010.
[11] TeerawatIssariyakul and EkramHossain
“Introduction to Network Simulator NS2”
2009.
[12] De los Andes, Merida, venezuala and ESSI
“NS simulator for beginners” Lecture notes:
2003-2004.

More Related Content

What's hot

IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...IRJET Journal
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5sophiabelthome
 
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...ijwmn
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Applicationijsrd.com
 
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...IRJET Journal
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
 
Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...Iqra khalil
 
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEYROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEYijscai
 
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkMuhammad Kaife Uddin
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkKarthik
 
Sensors 19-03789-v2
Sensors 19-03789-v2Sensors 19-03789-v2
Sensors 19-03789-v2Nitin k
 
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc NetworksA Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networkscscpconf
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...IRJET Journal
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networkspijans
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKTejas Wasule
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
 
Wireless sensor networks software architecture
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architectureAdeel Javaid
 

What's hot (19)

IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...IRJET-  	  A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
IRJET- A Comprehensive Study in Wireless Sensor Network (WSN) using Artif...
 
B0470208027
B0470208027B0470208027
B0470208027
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5
 
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...
EVALUATING PERFORMANCE OF WIRELESS SENSOR NETWORK IN REALISTIC SMART GRID ENV...
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
 
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
Real-Time, Fault Tolerance and Energy-Efficiency (REFER) Enhancement in Wirel...
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
 
Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...
 
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEYROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
 
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor Network
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
 
Sensors 19-03789-v2
Sensors 19-03789-v2Sensors 19-03789-v2
Sensors 19-03789-v2
 
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc NetworksA Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
 
Ijetr021229
Ijetr021229Ijetr021229
Ijetr021229
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 
Wireless sensor networks software architecture
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architecture
 

Viewers also liked

Event Consultant Certificate
Event Consultant CertificateEvent Consultant Certificate
Event Consultant CertificateKgaugelo Mokwena
 
m - projective curvature tensor on a Lorentzian para – Sasakian manifolds
m - projective curvature tensor on a Lorentzian para – Sasakian manifoldsm - projective curvature tensor on a Lorentzian para – Sasakian manifolds
m - projective curvature tensor on a Lorentzian para – Sasakian manifoldsIOSR Journals
 
festomasterleansixsigma2012greeneblack-13391484533859-phpapp02-120608044516-p...
festomasterleansixsigma2012greeneblack-13391484533859-phpapp02-120608044516-p...festomasterleansixsigma2012greeneblack-13391484533859-phpapp02-120608044516-p...
festomasterleansixsigma2012greeneblack-13391484533859-phpapp02-120608044516-p...Giamila Buzzi
 
Gender and Climate Change in Zambia
Gender and Climate Change in ZambiaGender and Climate Change in Zambia
Gender and Climate Change in ZambiaJosefina Gabuya
 
On Hadamard Product of P-Valent Functions with Alternating Type
On Hadamard Product of P-Valent Functions with Alternating TypeOn Hadamard Product of P-Valent Functions with Alternating Type
On Hadamard Product of P-Valent Functions with Alternating TypeIOSR Journals
 
Kegiatan pembelajaran di masjid al hikmah
Kegiatan pembelajaran di masjid al hikmahKegiatan pembelajaran di masjid al hikmah
Kegiatan pembelajaran di masjid al hikmahAnang Dwi Purwanto
 
Poradnik: Jak przygotować plik do druku (naklejki)
Poradnik: Jak przygotować plik do druku (naklejki)Poradnik: Jak przygotować plik do druku (naklejki)
Poradnik: Jak przygotować plik do druku (naklejki)Drukarnia Booklet
 
2558 วิถีแห่งรูปนาม แนวคิดในการพัฒนาวัดภูเขาทอง
2558 วิถีแห่งรูปนาม แนวคิดในการพัฒนาวัดภูเขาทอง2558 วิถีแห่งรูปนาม แนวคิดในการพัฒนาวัดภูเขาทอง
2558 วิถีแห่งรูปนาม แนวคิดในการพัฒนาวัดภูเขาทองmahaoath พระมหาโอ๊ท
 
Catalogo de rubricas para la evaluación del aprendizaje
Catalogo de rubricas para la evaluación del aprendizajeCatalogo de rubricas para la evaluación del aprendizaje
Catalogo de rubricas para la evaluación del aprendizajeSecundaria Tecnica Carrizo
 
Building an Amazon Datawarehouse and Using Business Intelligence Analytics Tools
Building an Amazon Datawarehouse and Using Business Intelligence Analytics ToolsBuilding an Amazon Datawarehouse and Using Business Intelligence Analytics Tools
Building an Amazon Datawarehouse and Using Business Intelligence Analytics ToolsAmazon Web Services
 
Ток зараркунандаларига қарши курашиш
Ток зараркунандаларига қарши курашишТок зараркунандаларига қарши курашиш
Ток зараркунандаларига қарши курашишКамрон Касымов
 
Cryptography Using Laplace Transform
Cryptography Using Laplace TransformCryptography Using Laplace Transform
Cryptography Using Laplace TransformIJERA Editor
 
Inventory Management System and Performance of Food and Beverages Companies i...
Inventory Management System and Performance of Food and Beverages Companies i...Inventory Management System and Performance of Food and Beverages Companies i...
Inventory Management System and Performance of Food and Beverages Companies i...IOSR Journals
 
Lateral Thinking Puzzle - The Moneylender
Lateral Thinking Puzzle - The MoneylenderLateral Thinking Puzzle - The Moneylender
Lateral Thinking Puzzle - The MoneylenderShreyas Kamath
 

Viewers also liked (20)

Event Consultant Certificate
Event Consultant CertificateEvent Consultant Certificate
Event Consultant Certificate
 
m - projective curvature tensor on a Lorentzian para – Sasakian manifolds
m - projective curvature tensor on a Lorentzian para – Sasakian manifoldsm - projective curvature tensor on a Lorentzian para – Sasakian manifolds
m - projective curvature tensor on a Lorentzian para – Sasakian manifolds
 
festomasterleansixsigma2012greeneblack-13391484533859-phpapp02-120608044516-p...
festomasterleansixsigma2012greeneblack-13391484533859-phpapp02-120608044516-p...festomasterleansixsigma2012greeneblack-13391484533859-phpapp02-120608044516-p...
festomasterleansixsigma2012greeneblack-13391484533859-phpapp02-120608044516-p...
 
Gender and Climate Change in Zambia
Gender and Climate Change in ZambiaGender and Climate Change in Zambia
Gender and Climate Change in Zambia
 
On Hadamard Product of P-Valent Functions with Alternating Type
On Hadamard Product of P-Valent Functions with Alternating TypeOn Hadamard Product of P-Valent Functions with Alternating Type
On Hadamard Product of P-Valent Functions with Alternating Type
 
50 examples of_brilliant_homepage_design
50 examples of_brilliant_homepage_design50 examples of_brilliant_homepage_design
50 examples of_brilliant_homepage_design
 
Kegiatan pembelajaran di masjid al hikmah
Kegiatan pembelajaran di masjid al hikmahKegiatan pembelajaran di masjid al hikmah
Kegiatan pembelajaran di masjid al hikmah
 
Science
ScienceScience
Science
 
Poradnik: Jak przygotować plik do druku (naklejki)
Poradnik: Jak przygotować plik do druku (naklejki)Poradnik: Jak przygotować plik do druku (naklejki)
Poradnik: Jak przygotować plik do druku (naklejki)
 
2558 วิถีแห่งรูปนาม แนวคิดในการพัฒนาวัดภูเขาทอง
2558 วิถีแห่งรูปนาม แนวคิดในการพัฒนาวัดภูเขาทอง2558 วิถีแห่งรูปนาม แนวคิดในการพัฒนาวัดภูเขาทอง
2558 วิถีแห่งรูปนาม แนวคิดในการพัฒนาวัดภูเขาทอง
 
Catalogo de rubricas para la evaluación del aprendizaje
Catalogo de rubricas para la evaluación del aprendizajeCatalogo de rubricas para la evaluación del aprendizaje
Catalogo de rubricas para la evaluación del aprendizaje
 
Building an Amazon Datawarehouse and Using Business Intelligence Analytics Tools
Building an Amazon Datawarehouse and Using Business Intelligence Analytics ToolsBuilding an Amazon Datawarehouse and Using Business Intelligence Analytics Tools
Building an Amazon Datawarehouse and Using Business Intelligence Analytics Tools
 
Propaganda
PropagandaPropaganda
Propaganda
 
Ток зараркунандаларига қарши курашиш
Ток зараркунандаларига қарши курашишТок зараркунандаларига қарши курашиш
Ток зараркунандаларига қарши курашиш
 
Cryptography Using Laplace Transform
Cryptography Using Laplace TransformCryptography Using Laplace Transform
Cryptography Using Laplace Transform
 
Inventory Management System and Performance of Food and Beverages Companies i...
Inventory Management System and Performance of Food and Beverages Companies i...Inventory Management System and Performance of Food and Beverages Companies i...
Inventory Management System and Performance of Food and Beverages Companies i...
 
Lateral Thinking Puzzle - The Moneylender
Lateral Thinking Puzzle - The MoneylenderLateral Thinking Puzzle - The Moneylender
Lateral Thinking Puzzle - The Moneylender
 
Custom reporting from CiviCRM with Google Sheets
Custom reporting from CiviCRM with Google SheetsCustom reporting from CiviCRM with Google Sheets
Custom reporting from CiviCRM with Google Sheets
 
Salinan dari modul 2-cfd
Salinan dari modul 2-cfdSalinan dari modul 2-cfd
Salinan dari modul 2-cfd
 
ocTEL and Open Badges #altc
ocTEL and Open Badges #altcocTEL and Open Badges #altc
ocTEL and Open Badges #altc
 

Similar to Comparative Analysis of Hybrid Routing Protocols for Wireless Sensor Networks

Challenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksChallenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksAuwal Amshi
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Networkijtsrd
 
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Vinayak Kulkarni
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Editor IJARCET
 
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSijassn
 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksIRJET Journal
 
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...Editor IJMTER
 
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...Editor IJMTER
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...cscpconf
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkCassie Romero
 
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...cscpconf
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...IRJET Journal
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...IRJET Journal
 
Multiagent based multipath routing in wireless sensor networks
Multiagent based multipath routing in wireless sensor networksMultiagent based multipath routing in wireless sensor networks
Multiagent based multipath routing in wireless sensor networksijwmn
 

Similar to Comparative Analysis of Hybrid Routing Protocols for Wireless Sensor Networks (20)

0512ijdps26
0512ijdps260512ijdps26
0512ijdps26
 
Challenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksChallenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networks
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
 
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
 
Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919Ijarcet vol-2-issue-3-916-919
Ijarcet vol-2-issue-3-916-919
 
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
 
Ijetr021229
Ijetr021229Ijetr021229
Ijetr021229
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...
ENERGY EFFICIENT MULTIHOP QUALITY PATH BASED DATA COLLECTION IN WIRELESS SENS...
 
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
 
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE ...
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor Network
 
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
 
O4102103111
O4102103111O4102103111
O4102103111
 
Multiagent based multipath routing in wireless sensor networks
Multiagent based multipath routing in wireless sensor networksMultiagent based multipath routing in wireless sensor networks
Multiagent based multipath routing in wireless sensor networks
 

Recently uploaded

Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniquesugginaramesh
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 

Recently uploaded (20)

POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 

Comparative Analysis of Hybrid Routing Protocols for Wireless Sensor Networks

  • 1. Ms. Manisha M. Magdum Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -5) April 2015, pp.107-111 www.ijera.com 107 | P a g e A Comparative Analysis for Hybrid Routing Protocol for Wireless Sensor Networks Ms. Manisha M. Magdum (student, ME E &TC) 1 , Associate Prof. P. P. Belagali2 Departmen of Electronics & Telecommunication, Dr. J. J. Magdum College of Engineering, Jaysingpur4 Abstract Wireless Sensor Networks (WSNs) consist of smallnodes with sensing, computation and wireless communicationscapabilities. These sensor networks interconnect a several othernodes when established in large and this opens up severaltechnical challenges and immense application possibilities.These wireless sensor networks communicate using multi-hopwireless communications, regular ad hoc routing techniquescannot be directly applied to sensor networks domain due tothe limited processing power and the finite power available toeach sensor nodes hence recent advances in wireless sensornetworks have developed many protocols depending on theapplication and network architecture and are specificallydesigned for sensor networks where energy awareness is anessential consideration. This paper presents routingprotocols for sensor networks and compares the routingprotocols that are presently of increasing importance. In this paper, we propose Hybrid Routing Protocol whichcombines the merits of proactive and reactive approach andovercome their demerits. Keywords: Ad hoc network, Hybrid Routing Protocol, AODV, Broadcast Reply (BR), etc I. INTRODUCTION Wireless sensor networks are a bridge to thephysical world. It is a fast growing and existing researcharea which has attracted considerable research attention inthe recent past; this is backed by the recent tremendoustechnological advancement in the development of low-cost sensor devices equipped with wireless network interfaceswhich are technically and economically feasible. Thesensing electronics measure ambient conditions related tothe environment surrounding the sensor and transform theminto an electric signals which when processed reveal someproperties about objects located or events happening in thevicinity of the sensor. A Wireless Sensor Network (WSN) contains hundreds or thousands of these sensor nodes whichcan be networked in many applications that requireunattended operations, these have the ability to communicate either among each other or directly to an external basestationand also allows for sensing over larger geographicalregions with greater accuracy. The figure 1 shows theschematic diagram of sensor node components where eachsensor node comprises sensing, processing, transmission, mobilizes, position finding system, and power units and alsoshows the communication architecture of a WSN. Eachsensor node bases its decisions on its mission, theinformation it currently has, knowledge of its computing, communication, and energy resources and have capability tocollect and route data either to other sensors or back to anexternal base station or stations which may be a fixed or amobile node capable of connecting the sensor network to anexisting communication infrastructure or to the Internetwhere users have access to the reported data. Networking unattended sensor nodes may have profoundeffect on the efficiency of many military and civilapplications such as target field imaging, intrusion detection,weather monitoring, security and tactical surveillance,distributed computing, detecting ambient conditions such astemperature, movement, sound, light or the presence ofcertain objects, inventory control and disaster management.Routing in WSNs is very challenging due to theinherent characteristics that distinguish these networks fromother wireless networks like mobile ad hoc RESEARCH ARTICLE OPEN ACCESS
  • 2. Ms. Manisha M. Magdum Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -5) April 2015, pp.107-111 www.ijera.com 108 | P a g e networks orcellular networks. Firstly, due to the relatively large numberof sensor nodes, it is not possible to build a globaladdressing scheme for the deployment of a large number ofsensor nodes as the overhead of ID maintenance is highhence traditional IP-based protocols may not be applied toWSNs. In WSNs getting the data is more important thanknowing the IDs of the node that sent the data. Second, incontrast to typical communication networks, almost allapplications of sensor networks require the flow of senseddata from multiple sources to a particular Base Station butthis does not prevent the flow of data to be in other forms.Third, sensor nodes are tightly constrained in terms ofenergy, processing, and storage capacities. Thus, theyrequire careful resource management. Fourth, in mostapplication scenarios, nodes in WSNs are generallystationary after deployment except a few mobile nodes.Sensor networks are application specific, i.e., designrequirements of a sensor network change with application.Fifth, position awareness of sensor nodes is important sincedata collection is normally based on the location. Currently,it is not feasible to use Global Positioning System (GPS)hardware, for this purpose many new algorithms have beenproposed for the routing problem in WSNs. These routingmechanisms consider the inherent features of WSNs and theapplication and architecture requirements. The task offinding and maintaining routes in WSNs is nontrivial sinceenergy restrictions and sudden changes in node status causefrequent and unpredictable topological changes. Tominimize energy consumption, routing techniques proposedin the literature for WSNs employ some well-known routingtactics as well as tactics special to WSNs.Classification of Almost all of the routing protocolscan be according to the network structure as flat,hierarchical, or location-based. In flat networks, all nodesplay the same role while hierarchical protocols aim atclustering the nodes so that cluster heads can do someaggregation and reduction of data in order to save energy.Location-based protocols utilize the position information torelay the data to the desired regions rather than the wholenetwork. In this paper, the routing techniques in WSNs thathave been developed in recent years are explored andclassified, providing deeper understanding of the currentrouting protocols and also some open research issues thatcan be further pursued are identified here. II. ROUTING CHALLENGES AND DESIGN ISSUES INWSNs Despite the countless applications of WSNs,these networks have several restrictions. The design ofrouting protocols in WSNs is influenced by manychallenging factors which must be overcome before efficientcommunication is achieved in WSNs. Some of the routingchallenges and design issues that affect routing process inWSNs. A. Node deployment Node deployment in WSNs is applicationdependent and affects the performance of the routingprotocol which can be either deterministic or randomized. Indeterministic deployment, the sensors are manually placedand data is routed through pre-determined paths. In randomnode deployment, the sensor nodes are scattered randomlycreating an infrastructure in an ad hoc manner. If theresultant distribution of nodes is not uniform, optimalclustering becomes necessary to allow connectivity andenable energy efficient network operation. B. Energy consumption without losing accuracy Sensor nodes can use up their limited supply ofenergy performing computations and transmittinginformation in a wireless environment but their lifetime isstrongly battery dependent and hence energy-conservingforms of communication and computation are essential. C. Data Reporting Model Data sensing and reporting in WSNs is dependenton the application and the time criticality of the datareporting. Data reporting can be categorized as either time driven (continuous), event- driven, query-driven, and hybrid.The routing protocol is highly influenced by the datareporting model with regard to energy consumption androute stability. D. Fault Tolerance Some sensor nodes may fail or be blocked due tolack of power, physical damage, or environmentalinterference. If many nodes fail, MAC and routing protocolsmust accommodate formation of new links and routes to thedata collection base station which requires actively adjustingtransmit powers and signaling rates on the existing links toreduce energy consumption or rerouting packets throughregions of the network where more energy is available. Therefore, multiple levels of redundancy may be needed in afault-tolerant sensor network. E. Connectivity High node density in sensor networks precludesthem from being completely isolated from each other.Therefore, sensor nodes are expected to be highly connected.This, however, may not prevent the network topology frombeing variable and the network size from being shrinkingdue to sensor node failures. In addition, connectivitydepends on the, possibly random, distribution of nodes. F. Quality of Service
  • 3. Ms. Manisha M. Magdum Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -5) April 2015, pp.107-111 www.ijera.com 109 | P a g e In some applications, data should be deliveredwithin a certain period of time from the moment it is sensed; otherwise the data will be useless. Therefore boundedlatency for data delivery is another condition for timeconstrainedapplications. As the energy gets depleted, thenetwork may be required to reduce the quality of the resultsin order to reduce the energy dissipation in the nodes and hence lengthen the total network lifetime. Hence, energy awarerouting protocols are required to capture this requirement. G. Operating Environment We can set up sensor network in the interior oflarge machinery, at the bottom of an ocean, in a biologicallyor chemically contaminated field, in a battle field beyond theenemy lines, in a home or a large building, in a largewarehouse, attached to animals, attached to fast movingvehicles, in forest area for habitat monitoring etc. H. Production Costs Since the sensor networks consist of a largenumber of sensor nodes, the cost of a single node is veryimportant to justify the overall cost of the networks andhence the cost of each sensor node has to be kept low. III. ROUTING PROTOCOLS IN WSNs In this section, we survey the state-of-the- artrouting protocols for WSNs. Recent advances in wirelesssensor networks have led to many new protocols specificallydesigned for sensor networks where energy awareness is anessential consideration. A. Ad hoc On-Demand Distance Vector(AODV) The Ad hoc On-demand Distance Vector (AODV) [6, 8, 9]protocol, one of the on-demand routing algorithms that hasreceive the most attention, however, does not utilize multiplepaths. It joins the mechanisms of DSDV and DSR. The periodicbeacons, hop-by-hop routing and the sequence numbers of DSDVand the pure on-demand mechanism of Route Discovery andRoute Maintenance of DSR are combined. In AODV [6], at Every instance, route discovery is done for fresh communication whichconsumes more bandwidth and causes more routing over-head.The source prepares RREQ packet which is broadcast to it's neighboring nodes. If neighboring node will keep backward pathtowards source. As soon as destination receives the RREQpacket, it sends RREP packet on received path.This RREP packet is unicast to the next node on RREP path. Theintermediate node on receiving the RREP packet make reversalof path set by the RREQ packet. As soon as RREP packet isreceived by the source, it starts data transmission on the forwardpath set by RREP packet. Sometimes while data transmission isgoing on, if path break occurs due to mobility of node out ofcoverage area of nodes on the active path, data packets will belost. When the network traffic requires real time delivery (voice,for instance), dropping data packets at the intermediate nodescan be costly. Likewise, if the session is a best effort, TCPconnection, packet drops may lead to slow start, timeout, andthroughput degradation. B. Threshold - sensitive Energy Efficient sensor Network protocol (TEEN): TEEN is a reactive protocol proposed for time- criticalapplications [7]. BASE STATION broadcasts the attribute, HardThreshold (HT) and Soft Threshold (ST) values to its clustermembers. The sensor nodes starts sensing and transmits thesensed data when it exceeds HT. HT is the minimum attributerange above which the values are expected. The transmitted sensevalue is stored in an internal variable called Sensed Value (SV).The cluster nodes again starts sensing, when its value exceeds theST. The minimum change in the sensed value it switches on itstransmitter and transmits.The energy is conserved since the sensor nodes in thecluster senses continuously but transmits only when the sensedvalue is above HT. The ST further reduces the transmissionwhich could have been occurred when there is a little change orno change in sensed attribute. As the cluster heads (CH) need toperform extra computations it consumes more energy comparedto other nodes. The main drawback of this protocol is that thetransmission from nodes to CH will not be there when the sensedvalue is not greater than HT, hence the CH will never come toknow even when any one of the sensor node dies. Accurate andclear picture of the network can be obtained by fixing the ST assmaller value even though it consumes more energy due tofrequent transmissions [10]. C. Hybrid Routing Protocol: Hybrid Routing Protocols combines the merits of proactive andreactive routing protocols by overcoming their demerits.The constraints of TEEN are incorporated in AODVrouting protocol. The modified algorithm is shown in figure 3.Each cluster node sense the data, if the value is greater than HT,then node sends RREQ to the destination. By receiving RREPmessage from destination source node transmits the data todestination node. The HT value is stored in SV a variable whichstores the transmitted threshold value. The cluster nodes againstarts sensing, when its value exceeds the ST i.e. The minimumchange in the sensed value occurs it switches on its transmitterand transmits. Active nodes in the networks are determined bybroadcasting a “Hello” message periodically in the network. If anode fails to reply a link break is detected and a
  • 4. Ms. Manisha M. Magdum Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -5) April 2015, pp.107-111 www.ijera.com 110 | P a g e Route Error(RERR) message is transmitted which is used to invalidate theroute as it flows through the network. A node also generates aRERR message if it gets message destined to a node for which aroute is unavailable. The RREP packet is broadcast by the node along the path. Thenodes that are neighbor to the node and not along the pathreceives the RREP packet, updates their routing table and dropthe packet. As a results of broadcasting RREP from destinationtowards source, node on the active path as well as nodesneighbor to active path node able to gather more routinginformation. Route Discovery in Hybrid Protocol: Figure : RREP Transmission in the Network In Hybrid protocol, RREP packet is broadcast to all neighbors whichare in the coverage area of the replying node. The RREP packetis broadcast to all neighbor nodes along with intendednode. Onreceiving RREP packet, neighboring node makes an entry in therouting table about complete path which has received in RREP. Ifneighboring node is not the intendednode, it drops RREP packet.If it is intendednode, it adds own id in the received path andrebroadcast RREP. This process of extracting useful informationfrom RREP packet and updates of RREP packet is carried outuntil RREP packet is not received by the destination which issource of RREQ packet. Figure 5.2 shows the process of RREPpacket transmission.In the Figure, node 14 is sending a RREP packet is responseto RREQ from node 0. Routing table at node 14 after processingRREQ packet from node 0 Dest Next hop Hop count 0 11 4 At node 14 the next hop towards node 0 is node 11 shown inabove Table with node 11 as intended node. It prepares RREPpacket and broadcast with node 11 as the intended node.Neighboring node 11,12,13will receives the RREP packet. Route Maintenance in Hybrid Protocol: Usually link failure occurs due to node mobility. A node ondetecting link failure send a route error message (RERR). ThisRERR message is forwarded to the source. Source will start freshroute discovery procedure after receiving RERR message Thisprocess is shown in Figure bellow: Figure : Link Failure and Recovery IV. Result Analysis Energy Consumption: The energy consumption is main factor in a network and the average energy in AODV and HAODV protocols is shown in figure 5.1 In HAODV the number of transmissions is reduced due to threshold constraints. Figure 5.1: Graph 1: Energy in joules vs time in sec. Packet Delivery Ratio: Packet Delivery Ratio is used by ad-hoc and wireless sensor networks (WSNs) protocols for selecting best routes, optimum transmission rate and minimal consumption of energy.
  • 5. Ms. Manisha M. Magdum Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 4, ( Part -5) April 2015, pp.107-111 www.ijera.com 111 | P a g e Figure 5.2: Graph 2: PDR vs time in seconds. Throughput: Throughput is the sum of data rates delivered to a network per time slot. Throughputs are measured in Kbps, Mbps &Gbps. Figure 5.3 shows throughputs for HAODV and AODV protocols. From the graph it is observed that throughputs for HAODV is better than AODV Figure 5.3: Graph 3: Throughput in kbps vs time in seconds V. Conclusion In this paper the energy efficient hybrid AODV protocol is presented. It is based on hierarchical on demand routing. It is a three level cluster based routing algorithm. It is also a power efficient routing. Node’s transmission power plays a very crucial role for increasing routing stability. From the Simulation results, the Hybrid AODV not only increments the average energy efficiency but also improves the network performance through the packet delivery ratio & throughput. References: [1] Chiara Buratti, Andrea Conti, Davide Dardari and Roberto Verdone “An Overview on Wireless Sensor Networks Technology and Evolution”, Sensors, PP: 6869-6896, 2009. [2] Akyildiz, I.; Su, W.; Sankarasubramaniam, Y.; Cayirci, E. “A survey on sensor networks” IEEE Commun., Vol: 40, PP: 102–114, March. 2002. [3] Kemal Akkaya and Mohamed Younis “Survey on Routing Protocols for Wireless Sensor Networks”, IEEE, 2005. [4] J. Chang and L. Tassiulas, “Maximum lifetime routing in wireless sensor networks,” IEEE/ACM Transactions on Networking (TON), vol. 12, no. 4, pp. 609– 619, 2004. [5] I. Chakeres and E. Belding-Royer, “AODV routing protocol implementation design,”. Proceedings. 24th International Conference on in Distributed Computing Systems Workshops, pp. 698–703, 2004. [6] Charles E. Perkins, Elizabeth M. Belding- Royer, Samir R. Das Ad hoc On-Demand Distance Vector Routing, IEFT MANET Draft, February 2003. [7] Arati Manjeshwar and Dharma P. Agarwal: “A Routing Protocol for Enhanced Efficiency in Wireless Sensor Networks”, International Parallel and Distributed Processing Symposium (IPDPS), IEEE, 2001. [8] E. Royer and C. Perkins, “An implementation study of the AODV routing protocol,” in 2000 IEEE Wireless Communications and Networking Conference, 2000.WCNC, vol. 3, 2000. [9] Kunjan Patel, Lim Jong Chern and C.J Bleakley, “MAW: A Reliable Lightweight Multi-Hop Wireless Sensor Network Routing Protocol” International Conference on Computational Science and Engineering, IEEE COMPUTER SOCIETY, 2009. [10] D.Baghyalakshmi, Jemimah Ebenezer and S.A.V .Satyamurty, “Low Latency And Energy Efficient Routing Protocols For Wireless Sensor Networks” International Conference on Wireless Communication and Sensor Computing, ICWCSC IEEE FEB 2010. [11] TeerawatIssariyakul and EkramHossain “Introduction to Network Simulator NS2” 2009. [12] De los Andes, Merida, venezuala and ESSI “NS simulator for beginners” Lecture notes: 2003-2004.