SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 2, April-May (2013)
20
BIDIRECTIONAL DATA CENTRIC ROUTING PROTOCOL TO
IMPROVE THE ENERGY EFFICIENCY IN WIRELESS SENSOR
NETWORKS
S.P.Sivasrinivasan 1
, Dr. N.V.Anandkumar2
1
Associate Prof, Sri Venkateswara Inst.of Science & Technology, Chennai
2
Professor, Sri Venkateswara Inst.of Science & Technology, Chennai
ABSTRACT
A wireless sensor network (wsn) is made up of spatially distributed autonomous
sensors to monitor physical or environmental conditions and cooperatively pass their data
through the network to a main location. Wireless sensor network are data data centric
protocol, and the graph results prove that bidirectional data centric protocol has higher
percentage in disseminating data at a fixed centric. The challenge remains in designing a
good routing protocol which can address the issues such as energy awareness, adaptability,
and computational speed and network lifetime. But in wsn the main area of concentration is
in routing data in an efficient manner such that minimal energy resources’ are used. But in a
network, consumption of energy is mainly due to the routing of data. Protocols like classical
flooding, gossiping, spin (sensor protocol for information via negotiation) and dd (directed
diffusion can reduce the consumption drastically. But these can undergo a drawback of data
redundancy, resource blindness and packet loss. To overcome this disadvantage , we present
a novel protocol called bidirectional data centric protocol which has a meta data descriptor
and the data is send in the shortest path based on source and sink interest. On performing
simulation of bidirectional energy level.
Keywords: WSN, Routing Protocols, Spin, Directed Diffusion, Bidirectional Data Centric
Protocol.
I. INTRODUCTION
Sensor networks consist of a large number of small sensor devices that have the
capability to take various measurementsof their environment. For instance, such
measurements can include acoustic, magnetic, and video information. Each of these devices
is equipped with a small processor and wireless communication antenna and is powered by a
battery making it very resource constrained. These sensors are typically scattered around a
IJCSERD
© PRJ PUBLICATION
International Journal of Computer Science Engineering
Research and Development (IJCSERD)
ISSN 2248 – 9363(Print)
ISSN 2248 – 9371(Online),
Volume 3, Number 2, April- May (2013), pp: 20-23
© PRJ Publication, http://www.prjpublication.com/IJCSERD.asp
International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 2, April-May (2013)
21
sensing field to collect information about their surroundings.In this paper, we introduce
bidirectional routing protocol, protocol to transmit information to sink node when there is a
drastic change in the sensed and also when the sink request for particular data using metadata.
in this proposed protocol, total number of packet transmissions is less and use of meta data
memory. Therefore a significant amount of total energy can be saved. Bidirectional
datacentric routing protocol is implemented using c++ programming language and evaluated
using network simulator 2.The rest of the paper is organized as follows. Section II surveys
related works.Section III gives the system models and presents the problem statement. the
proposed bidirectional datacenric routing protocol is described in section iv. Performance
analysis of bidirectional data centric routing protocol and comparison with SPIN and
Directed Diffusion protocol is discussed in section V. Finally, in section VI we conclude the
paper with a direction for future work.
Interest Propagation: When sink node wants some information from source nodes it sends
out its query to its neighbour sensor nodes. The corresponding query is carried by interest
packet. The sensor node receives the interest packet can temporarily store the packet and
search for all of the matching target data as shown in figure1 (a).
Figure 1(a): interest propagation.
Initial Gradient Setup: Using Gradient in DD, the data propagation direction with minimum
cost principle. Propagation of interest packets setup the gradient in the network for delivering
data to the sink. Gradient is a reply linkto a neighbour node from which the interest was
received as shown in figure 1(b).
Figure 1(b): Initial Gradient Setup.
SPIN (Sensor Protocol for Information via Negotiation)
SPIN is a negotiation-based information dissemination protocol suitable for WSN. It
is based on the concept ofmetadata. Meta-data is a description of data which in database,it
can be used to describe table. In SPIN sensors use metadata to concisely and completely
describe the data collected SPIN is a data-centric routing protocol. It fits under event driven
International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 2, April-May (2013)
22
data delivery model in which the nodes sense data and disseminate the data throughout the
network by means of negotiation. SPIN nodes use three types of messages for
communication:
• ADV- When a node has new data to share; it can advertise this using ADV message
containing Metadata.
• REQ- Node sends an REQ when it needs to receive actual data.
• DATA- DATA message contains actual sensor data.
System model and problem statement
A. System model
In our research the wireless sensor network consists of various sensor nodes
scarcelydistributed. The network structure is layer based each node has the capacity to sense
multiple types of data. And data are transmitted in the form of Meta data. Here both the base
station and nodes have the capacity to transmit data.
B. problem statement
Disadvantages of SPIN protocol
• The source node on receiving the data sends ADV message to all neighboring nodes, this
results in unwanted computation.
• The node does not reply to ADV message if the sensor node dies out.
•SPIN: selective transmission is not supported in the existing SPIN protocols.
•Data advertisement method of SPIN protocol does not guarantee data delivery.
Disadvantages of DIRECTED DIFFUSION protocol:
•Directed Diffusion cannot be applied to all sensor network applications since it is based on a
query-driven data delivery model.
• The applications that require continuous data delivery to the sink will not work efficiently
with a query-driven on demand data model.
•The naming schemes used in Directed Diffusion are application dependent and each time
should be defined a priori.
•The matching process for data and queries might require some extra overhead at the sensors.
BIDIRECTIONAL DATACENRIC ROUTING
The novel protocol conserves energy by becoming active only when changes occur in
the network, broad casting data id provides guaranteed data delivery. When there is a need
for continuous it sends data without waiting for sink to send its interest. It uses two way hand
shake protocol thereby using less energy comparing to the existing protocols. The sink sends
interest in the shortest path there by conserving energy.
Key advantages
• Data redundancy is eradicated.
• Overcomes resource blindness.
International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 2, April-May (2013)
23
Performance analysis
The bandwidth and the life time of nodes increases compared to the protocols DD SPIN
CONCLUSION
In this paper, we have proposed a BIDIRECTIONAL DATACENTRIC routing
protocol using Meta data descriptor for WSN. Here the data is sent whenever there is a
drastic change in the data sensed or only when the base station request for data. We have
compared its performance with existing SPIN and Directed Diffusion protocol. But one major
problem is that security in future we will try to provide it and try to resolve redundancy of
advertisement message.
REFERENCES
[1] ZeenatRehena,SarbaniRoy’Nandini Mukherjee” A Modified SPIN for Wireless Sensor
Networks”IEEE.Conf.,Feb 2011,pp.1-4.
[2] Kai Lin, Joel J. P. C. Rodrigues, HongweiGe, NaixueXiong, and Xuedong
Liang,“Energy Efficiency QoS Assurance Routing inWireless Multimedia Sensor
Networks” IEEE Systems Journal, December 2011, Vol. 5, No. 4, pp.495-505
[3] Shio Kumar Singh , M P Singh , and D K Singh ,”Routing Protocols in Wireless Sensor
Networks –A Survey” International Journal of Computer Science & Engineering Survey
(IJCSES), November 2010, Vol.1, No.2,pp.63-83
[4] L. Alazzawi, A. Elkateeb, “Performance Evaluation of the WSN Routing Protocols
Scalability,” Journal of Computer Systems, Networks, andCommunications, 2008, Vol. 14,
Issue 2, pp. 1-9
[5] ChalermekIntanagonwiwat,Ramesh Govindan,Deborah Estfin,Johneidemann,Fabio Silva,
“Directed Diffusion for Wireless Sensor Networking”IEEE/ACM Transactions On
Networking, Feb 2003,Vol. l 1, No. 1,pp.1525-1529.
[6] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, “ A Survey on Sensor
Networks”, IEEE Commun.Mag., Aug 2002 ,pp.102-114.

More Related Content

What's hot

Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811praveen369
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...csandit
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
 
5.a robust frame of wsn utilizing localization technique 36-46
5.a robust frame of wsn utilizing localization technique  36-465.a robust frame of wsn utilizing localization technique  36-46
5.a robust frame of wsn utilizing localization technique 36-46Alexander Decker
 
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...Alexander Decker
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...LogicMindtech Nologies
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networkspijans
 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...IJERA Editor
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET Journal
 
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...IRJET Journal
 
Data Aggregation & Transfer in Data Centric Network Using Spin Protocol in WSN
Data Aggregation & Transfer in Data Centric Network Using Spin Protocol in WSNData Aggregation & Transfer in Data Centric Network Using Spin Protocol in WSN
Data Aggregation & Transfer in Data Centric Network Using Spin Protocol in WSNrahulmonikasharma
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET Journal
 
Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760Editor IJARCET
 
Secure data aggregation technique for wireless
Secure data aggregation technique for wirelessSecure data aggregation technique for wireless
Secure data aggregation technique for wirelessjpstudcorner
 
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSijassn
 
Energy efficient intrusion detection system
Energy efficient intrusion detection systemEnergy efficient intrusion detection system
Energy efficient intrusion detection systemiaemedu
 
Embedding Wireless Intelligent Sensors Based on Compact Measurement for Struc...
Embedding Wireless Intelligent Sensors Based on Compact Measurement for Struc...Embedding Wireless Intelligent Sensors Based on Compact Measurement for Struc...
Embedding Wireless Intelligent Sensors Based on Compact Measurement for Struc...IJMTST Journal
 
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Scalable and Robust Hierarchical Group of Data in Wireless Sensor NetworksScalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Scalable and Robust Hierarchical Group of Data in Wireless Sensor NetworksIJERA Editor
 

What's hot (19)

Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811Data aggregation in wireless sensor network , 11751 d5811
Data aggregation in wireless sensor network , 11751 d5811
 
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
Concealed Data Aggregation with Dynamic Intrusion Detection System to Remove ...
 
50120140505014
5012014050501450120140505014
50120140505014
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
 
5.a robust frame of wsn utilizing localization technique 36-46
5.a robust frame of wsn utilizing localization technique  36-465.a robust frame of wsn utilizing localization technique  36-46
5.a robust frame of wsn utilizing localization technique 36-46
 
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...
 
Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...Secure data aggregation technique for wireless sensor networks in the presenc...
Secure data aggregation technique for wireless sensor networks in the presenc...
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
 
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
 
Data Aggregation & Transfer in Data Centric Network Using Spin Protocol in WSN
Data Aggregation & Transfer in Data Centric Network Using Spin Protocol in WSNData Aggregation & Transfer in Data Centric Network Using Spin Protocol in WSN
Data Aggregation & Transfer in Data Centric Network Using Spin Protocol in WSN
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
 
Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760Ijarcet vol-2-issue-2-756-760
Ijarcet vol-2-issue-2-756-760
 
Secure data aggregation technique for wireless
Secure data aggregation technique for wirelessSecure data aggregation technique for wireless
Secure data aggregation technique for wireless
 
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
 
Energy efficient intrusion detection system
Energy efficient intrusion detection systemEnergy efficient intrusion detection system
Energy efficient intrusion detection system
 
Embedding Wireless Intelligent Sensors Based on Compact Measurement for Struc...
Embedding Wireless Intelligent Sensors Based on Compact Measurement for Struc...Embedding Wireless Intelligent Sensors Based on Compact Measurement for Struc...
Embedding Wireless Intelligent Sensors Based on Compact Measurement for Struc...
 
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Scalable and Robust Hierarchical Group of Data in Wireless Sensor NetworksScalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
Scalable and Robust Hierarchical Group of Data in Wireless Sensor Networks
 

Viewers also liked

5 multi robot path planning algorithms
5 multi robot path planning algorithms5 multi robot path planning algorithms
5 multi robot path planning algorithmsprj_publication
 
Fuzzy driver command interpreter
Fuzzy driver command interpreterFuzzy driver command interpreter
Fuzzy driver command interpreterprj_publication
 
An optimal unsupervised text data segmentation 3
An optimal unsupervised text data segmentation 3An optimal unsupervised text data segmentation 3
An optimal unsupervised text data segmentation 3prj_publication
 
Primary audience research
Primary audience researchPrimary audience research
Primary audience researchAnnabel Hodgson
 
Devry cis 170 c i lab 5 of 7 arrays and strings
Devry cis 170 c i lab 5 of 7 arrays and stringsDevry cis 170 c i lab 5 of 7 arrays and strings
Devry cis 170 c i lab 5 of 7 arrays and stringsjody zoll
 
Competencias supersalud ley 1438 de 2011 dr william vega
Competencias supersalud ley 1438 de 2011   dr william vegaCompetencias supersalud ley 1438 de 2011   dr william vega
Competencias supersalud ley 1438 de 2011 dr william vegaJulian Ricardo Anaya Escobar
 
COLLABORA: A COLLABORATIVE ARCHITECTURE FOR EVALUATING INDIVIDUALS PARTICIPAT...
COLLABORA: A COLLABORATIVE ARCHITECTURE FOR EVALUATING INDIVIDUALS PARTICIPAT...COLLABORA: A COLLABORATIVE ARCHITECTURE FOR EVALUATING INDIVIDUALS PARTICIPAT...
COLLABORA: A COLLABORATIVE ARCHITECTURE FOR EVALUATING INDIVIDUALS PARTICIPAT...ijseajournal
 
SOFTWARE DESIGN ANALYSIS WITH DYNAMIC SYSTEM RUN-TIME ARCHITECTURE DECOMPOSITION
SOFTWARE DESIGN ANALYSIS WITH DYNAMIC SYSTEM RUN-TIME ARCHITECTURE DECOMPOSITIONSOFTWARE DESIGN ANALYSIS WITH DYNAMIC SYSTEM RUN-TIME ARCHITECTURE DECOMPOSITION
SOFTWARE DESIGN ANALYSIS WITH DYNAMIC SYSTEM RUN-TIME ARCHITECTURE DECOMPOSITIONijseajournal
 
Advanced phishing the art of stealing
Advanced phishing   the art of stealingAdvanced phishing   the art of stealing
Advanced phishing the art of stealingprj_publication
 
Av02 2315en datasheet
Av02 2315en datasheetAv02 2315en datasheet
Av02 2315en datasheetEdwin Aguilar
 
SATTAL Main Brochure
SATTAL Main BrochureSATTAL Main Brochure
SATTAL Main BrochureDavid Mullen
 

Viewers also liked (18)

5 multi robot path planning algorithms
5 multi robot path planning algorithms5 multi robot path planning algorithms
5 multi robot path planning algorithms
 
Fuzzy driver command interpreter
Fuzzy driver command interpreterFuzzy driver command interpreter
Fuzzy driver command interpreter
 
Numerical investigation
Numerical investigationNumerical investigation
Numerical investigation
 
An optimal unsupervised text data segmentation 3
An optimal unsupervised text data segmentation 3An optimal unsupervised text data segmentation 3
An optimal unsupervised text data segmentation 3
 
CARMWhitepaper
CARMWhitepaperCARMWhitepaper
CARMWhitepaper
 
Lenguaje corporal
Lenguaje corporalLenguaje corporal
Lenguaje corporal
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Primary audience research
Primary audience researchPrimary audience research
Primary audience research
 
Devry cis 170 c i lab 5 of 7 arrays and strings
Devry cis 170 c i lab 5 of 7 arrays and stringsDevry cis 170 c i lab 5 of 7 arrays and strings
Devry cis 170 c i lab 5 of 7 arrays and strings
 
Olimpiadas
OlimpiadasOlimpiadas
Olimpiadas
 
Competencias supersalud ley 1438 de 2011 dr william vega
Competencias supersalud ley 1438 de 2011   dr william vegaCompetencias supersalud ley 1438 de 2011   dr william vega
Competencias supersalud ley 1438 de 2011 dr william vega
 
My cv
My cvMy cv
My cv
 
COLLABORA: A COLLABORATIVE ARCHITECTURE FOR EVALUATING INDIVIDUALS PARTICIPAT...
COLLABORA: A COLLABORATIVE ARCHITECTURE FOR EVALUATING INDIVIDUALS PARTICIPAT...COLLABORA: A COLLABORATIVE ARCHITECTURE FOR EVALUATING INDIVIDUALS PARTICIPAT...
COLLABORA: A COLLABORATIVE ARCHITECTURE FOR EVALUATING INDIVIDUALS PARTICIPAT...
 
SOFTWARE DESIGN ANALYSIS WITH DYNAMIC SYSTEM RUN-TIME ARCHITECTURE DECOMPOSITION
SOFTWARE DESIGN ANALYSIS WITH DYNAMIC SYSTEM RUN-TIME ARCHITECTURE DECOMPOSITIONSOFTWARE DESIGN ANALYSIS WITH DYNAMIC SYSTEM RUN-TIME ARCHITECTURE DECOMPOSITION
SOFTWARE DESIGN ANALYSIS WITH DYNAMIC SYSTEM RUN-TIME ARCHITECTURE DECOMPOSITION
 
Advanced phishing the art of stealing
Advanced phishing   the art of stealingAdvanced phishing   the art of stealing
Advanced phishing the art of stealing
 
Presentacion2 javier fernandez_vallejo
Presentacion2 javier fernandez_vallejoPresentacion2 javier fernandez_vallejo
Presentacion2 javier fernandez_vallejo
 
Av02 2315en datasheet
Av02 2315en datasheetAv02 2315en datasheet
Av02 2315en datasheet
 
SATTAL Main Brochure
SATTAL Main BrochureSATTAL Main Brochure
SATTAL Main Brochure
 

Similar to Bidirectional data centric routing protocol to improve the energy efficiency in wireless sensor networks

EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksIRJET Journal
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKIJNSA Journal
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Editor IJARCET
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
Survey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocolSurvey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocoleSAT Publishing House
 
Survey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocolSurvey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocoleSAT Journals
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocolijtsrd
 
Wireless Sensor Network Protocol with PEGASIS GA to Enhance the Network Lifetime
Wireless Sensor Network Protocol with PEGASIS GA to Enhance the Network LifetimeWireless Sensor Network Protocol with PEGASIS GA to Enhance the Network Lifetime
Wireless Sensor Network Protocol with PEGASIS GA to Enhance the Network Lifetimeijtsrd
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...IJEEE
 
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...Editor IJMTER
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...journalBEEI
 
On improvement of performance for transport protocol using sectoring sche
On improvement of performance for transport protocol using sectoring scheOn improvement of performance for transport protocol using sectoring sche
On improvement of performance for transport protocol using sectoring scheIAEME Publication
 
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...IRJET Journal
 
A seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networksA seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networkspraveen369
 

Similar to Bidirectional data centric routing protocol to improve the energy efficiency in wireless sensor networks (20)

EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
 
0512ijdps26
0512ijdps260512ijdps26
0512ijdps26
 
Ijnsa050209
Ijnsa050209Ijnsa050209
Ijnsa050209
 
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
Survey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocolSurvey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocol
 
Survey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocolSurvey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocol
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocol
 
Wireless Sensor Network Protocol with PEGASIS GA to Enhance the Network Lifetime
Wireless Sensor Network Protocol with PEGASIS GA to Enhance the Network LifetimeWireless Sensor Network Protocol with PEGASIS GA to Enhance the Network Lifetime
Wireless Sensor Network Protocol with PEGASIS GA to Enhance the Network Lifetime
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
 
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
A Review Study on Shortest Path in WSN to detect the Abnormal Packet for savi...
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
 
iPGCON14_134
iPGCON14_134iPGCON14_134
iPGCON14_134
 
On improvement of performance for transport protocol using sectoring sche
On improvement of performance for transport protocol using sectoring scheOn improvement of performance for transport protocol using sectoring sche
On improvement of performance for transport protocol using sectoring sche
 
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...
Sensor Data Aggregation using a Cross Layer Framework for Smart City Applicat...
 
A seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networksA seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networks
 

More from prj_publication

International library management systems
International library management systemsInternational library management systems
International library management systemsprj_publication
 
Smes role in reduction of the unemployment problem in the area located in sa...
Smes  role in reduction of the unemployment problem in the area located in sa...Smes  role in reduction of the unemployment problem in the area located in sa...
Smes role in reduction of the unemployment problem in the area located in sa...prj_publication
 
Diabetes and allied diseases research in india – a
Diabetes and allied diseases research in india – aDiabetes and allied diseases research in india – a
Diabetes and allied diseases research in india – aprj_publication
 
Influences of child endorsers on the consumers
Influences of child endorsers on the consumersInfluences of child endorsers on the consumers
Influences of child endorsers on the consumersprj_publication
 
Connecting the ‘long tails’ of content and users
Connecting the ‘long tails’ of content and usersConnecting the ‘long tails’ of content and users
Connecting the ‘long tails’ of content and usersprj_publication
 
The role of green intellectual capital management in acquiring green competit...
The role of green intellectual capital management in acquiring green competit...The role of green intellectual capital management in acquiring green competit...
The role of green intellectual capital management in acquiring green competit...prj_publication
 
Awareness of digital library among library professional
Awareness of digital library among library professionalAwareness of digital library among library professional
Awareness of digital library among library professionalprj_publication
 
The study of scope and implementation of lean aspects
The study of scope and implementation of lean aspectsThe study of scope and implementation of lean aspects
The study of scope and implementation of lean aspectsprj_publication
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2prj_publication
 
Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...prj_publication
 
Prevalence and factors of smoking among the saudi youth in the northern borde...
Prevalence and factors of smoking among the saudi youth in the northern borde...Prevalence and factors of smoking among the saudi youth in the northern borde...
Prevalence and factors of smoking among the saudi youth in the northern borde...prj_publication
 
Impact of job attitude towards srf limited, trichy
Impact of job attitude towards srf limited, trichyImpact of job attitude towards srf limited, trichy
Impact of job attitude towards srf limited, trichyprj_publication
 
Impact of shg bank linkage programme on women shgs empowerment with reference...
Impact of shg bank linkage programme on women shgs empowerment with reference...Impact of shg bank linkage programme on women shgs empowerment with reference...
Impact of shg bank linkage programme on women shgs empowerment with reference...prj_publication
 
Service gap analysis of footwear retail outlets a study 2
Service gap analysis of footwear retail outlets  a study 2Service gap analysis of footwear retail outlets  a study 2
Service gap analysis of footwear retail outlets a study 2prj_publication
 
Emotional intelligence in teachers a tool to transform educational institutes...
Emotional intelligence in teachers a tool to transform educational institutes...Emotional intelligence in teachers a tool to transform educational institutes...
Emotional intelligence in teachers a tool to transform educational institutes...prj_publication
 
‘E aushadhi’ a drug warehouse management system
‘E aushadhi’ a drug warehouse management system‘E aushadhi’ a drug warehouse management system
‘E aushadhi’ a drug warehouse management systemprj_publication
 
An appraisal of users’ attitudinal behaviour in
An appraisal of users’ attitudinal behaviour inAn appraisal of users’ attitudinal behaviour in
An appraisal of users’ attitudinal behaviour inprj_publication
 
Akce international journal of graphs and
Akce international journal of graphs andAkce international journal of graphs and
Akce international journal of graphs andprj_publication
 
Distribution of the number of times m m 2 n
Distribution of the number of times m m 2 nDistribution of the number of times m m 2 n
Distribution of the number of times m m 2 nprj_publication
 
A scientometric analysis of research productivity
A scientometric analysis of research productivityA scientometric analysis of research productivity
A scientometric analysis of research productivityprj_publication
 

More from prj_publication (20)

International library management systems
International library management systemsInternational library management systems
International library management systems
 
Smes role in reduction of the unemployment problem in the area located in sa...
Smes  role in reduction of the unemployment problem in the area located in sa...Smes  role in reduction of the unemployment problem in the area located in sa...
Smes role in reduction of the unemployment problem in the area located in sa...
 
Diabetes and allied diseases research in india – a
Diabetes and allied diseases research in india – aDiabetes and allied diseases research in india – a
Diabetes and allied diseases research in india – a
 
Influences of child endorsers on the consumers
Influences of child endorsers on the consumersInfluences of child endorsers on the consumers
Influences of child endorsers on the consumers
 
Connecting the ‘long tails’ of content and users
Connecting the ‘long tails’ of content and usersConnecting the ‘long tails’ of content and users
Connecting the ‘long tails’ of content and users
 
The role of green intellectual capital management in acquiring green competit...
The role of green intellectual capital management in acquiring green competit...The role of green intellectual capital management in acquiring green competit...
The role of green intellectual capital management in acquiring green competit...
 
Awareness of digital library among library professional
Awareness of digital library among library professionalAwareness of digital library among library professional
Awareness of digital library among library professional
 
The study of scope and implementation of lean aspects
The study of scope and implementation of lean aspectsThe study of scope and implementation of lean aspects
The study of scope and implementation of lean aspects
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2
 
Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...
 
Prevalence and factors of smoking among the saudi youth in the northern borde...
Prevalence and factors of smoking among the saudi youth in the northern borde...Prevalence and factors of smoking among the saudi youth in the northern borde...
Prevalence and factors of smoking among the saudi youth in the northern borde...
 
Impact of job attitude towards srf limited, trichy
Impact of job attitude towards srf limited, trichyImpact of job attitude towards srf limited, trichy
Impact of job attitude towards srf limited, trichy
 
Impact of shg bank linkage programme on women shgs empowerment with reference...
Impact of shg bank linkage programme on women shgs empowerment with reference...Impact of shg bank linkage programme on women shgs empowerment with reference...
Impact of shg bank linkage programme on women shgs empowerment with reference...
 
Service gap analysis of footwear retail outlets a study 2
Service gap analysis of footwear retail outlets  a study 2Service gap analysis of footwear retail outlets  a study 2
Service gap analysis of footwear retail outlets a study 2
 
Emotional intelligence in teachers a tool to transform educational institutes...
Emotional intelligence in teachers a tool to transform educational institutes...Emotional intelligence in teachers a tool to transform educational institutes...
Emotional intelligence in teachers a tool to transform educational institutes...
 
‘E aushadhi’ a drug warehouse management system
‘E aushadhi’ a drug warehouse management system‘E aushadhi’ a drug warehouse management system
‘E aushadhi’ a drug warehouse management system
 
An appraisal of users’ attitudinal behaviour in
An appraisal of users’ attitudinal behaviour inAn appraisal of users’ attitudinal behaviour in
An appraisal of users’ attitudinal behaviour in
 
Akce international journal of graphs and
Akce international journal of graphs andAkce international journal of graphs and
Akce international journal of graphs and
 
Distribution of the number of times m m 2 n
Distribution of the number of times m m 2 nDistribution of the number of times m m 2 n
Distribution of the number of times m m 2 n
 
A scientometric analysis of research productivity
A scientometric analysis of research productivityA scientometric analysis of research productivity
A scientometric analysis of research productivity
 

Recently uploaded

School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxkalpana413121
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfsumitt6_25730773
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...ronahami
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessorAshwiniTodkar4
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementDr. Deepak Mudgal
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesRashidFaridChishti
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxpritamlangde
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 

Recently uploaded (20)

School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 

Bidirectional data centric routing protocol to improve the energy efficiency in wireless sensor networks

  • 1. International Journal of Computer science and Engineering Research and Development (IJCSERD), ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 2, April-May (2013) 20 BIDIRECTIONAL DATA CENTRIC ROUTING PROTOCOL TO IMPROVE THE ENERGY EFFICIENCY IN WIRELESS SENSOR NETWORKS S.P.Sivasrinivasan 1 , Dr. N.V.Anandkumar2 1 Associate Prof, Sri Venkateswara Inst.of Science & Technology, Chennai 2 Professor, Sri Venkateswara Inst.of Science & Technology, Chennai ABSTRACT A wireless sensor network (wsn) is made up of spatially distributed autonomous sensors to monitor physical or environmental conditions and cooperatively pass their data through the network to a main location. Wireless sensor network are data data centric protocol, and the graph results prove that bidirectional data centric protocol has higher percentage in disseminating data at a fixed centric. The challenge remains in designing a good routing protocol which can address the issues such as energy awareness, adaptability, and computational speed and network lifetime. But in wsn the main area of concentration is in routing data in an efficient manner such that minimal energy resources’ are used. But in a network, consumption of energy is mainly due to the routing of data. Protocols like classical flooding, gossiping, spin (sensor protocol for information via negotiation) and dd (directed diffusion can reduce the consumption drastically. But these can undergo a drawback of data redundancy, resource blindness and packet loss. To overcome this disadvantage , we present a novel protocol called bidirectional data centric protocol which has a meta data descriptor and the data is send in the shortest path based on source and sink interest. On performing simulation of bidirectional energy level. Keywords: WSN, Routing Protocols, Spin, Directed Diffusion, Bidirectional Data Centric Protocol. I. INTRODUCTION Sensor networks consist of a large number of small sensor devices that have the capability to take various measurementsof their environment. For instance, such measurements can include acoustic, magnetic, and video information. Each of these devices is equipped with a small processor and wireless communication antenna and is powered by a battery making it very resource constrained. These sensors are typically scattered around a IJCSERD © PRJ PUBLICATION International Journal of Computer Science Engineering Research and Development (IJCSERD) ISSN 2248 – 9363(Print) ISSN 2248 – 9371(Online), Volume 3, Number 2, April- May (2013), pp: 20-23 © PRJ Publication, http://www.prjpublication.com/IJCSERD.asp
  • 2. International Journal of Computer science and Engineering Research and Development (IJCSERD), ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 2, April-May (2013) 21 sensing field to collect information about their surroundings.In this paper, we introduce bidirectional routing protocol, protocol to transmit information to sink node when there is a drastic change in the sensed and also when the sink request for particular data using metadata. in this proposed protocol, total number of packet transmissions is less and use of meta data memory. Therefore a significant amount of total energy can be saved. Bidirectional datacentric routing protocol is implemented using c++ programming language and evaluated using network simulator 2.The rest of the paper is organized as follows. Section II surveys related works.Section III gives the system models and presents the problem statement. the proposed bidirectional datacenric routing protocol is described in section iv. Performance analysis of bidirectional data centric routing protocol and comparison with SPIN and Directed Diffusion protocol is discussed in section V. Finally, in section VI we conclude the paper with a direction for future work. Interest Propagation: When sink node wants some information from source nodes it sends out its query to its neighbour sensor nodes. The corresponding query is carried by interest packet. The sensor node receives the interest packet can temporarily store the packet and search for all of the matching target data as shown in figure1 (a). Figure 1(a): interest propagation. Initial Gradient Setup: Using Gradient in DD, the data propagation direction with minimum cost principle. Propagation of interest packets setup the gradient in the network for delivering data to the sink. Gradient is a reply linkto a neighbour node from which the interest was received as shown in figure 1(b). Figure 1(b): Initial Gradient Setup. SPIN (Sensor Protocol for Information via Negotiation) SPIN is a negotiation-based information dissemination protocol suitable for WSN. It is based on the concept ofmetadata. Meta-data is a description of data which in database,it can be used to describe table. In SPIN sensors use metadata to concisely and completely describe the data collected SPIN is a data-centric routing protocol. It fits under event driven
  • 3. International Journal of Computer science and Engineering Research and Development (IJCSERD), ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 2, April-May (2013) 22 data delivery model in which the nodes sense data and disseminate the data throughout the network by means of negotiation. SPIN nodes use three types of messages for communication: • ADV- When a node has new data to share; it can advertise this using ADV message containing Metadata. • REQ- Node sends an REQ when it needs to receive actual data. • DATA- DATA message contains actual sensor data. System model and problem statement A. System model In our research the wireless sensor network consists of various sensor nodes scarcelydistributed. The network structure is layer based each node has the capacity to sense multiple types of data. And data are transmitted in the form of Meta data. Here both the base station and nodes have the capacity to transmit data. B. problem statement Disadvantages of SPIN protocol • The source node on receiving the data sends ADV message to all neighboring nodes, this results in unwanted computation. • The node does not reply to ADV message if the sensor node dies out. •SPIN: selective transmission is not supported in the existing SPIN protocols. •Data advertisement method of SPIN protocol does not guarantee data delivery. Disadvantages of DIRECTED DIFFUSION protocol: •Directed Diffusion cannot be applied to all sensor network applications since it is based on a query-driven data delivery model. • The applications that require continuous data delivery to the sink will not work efficiently with a query-driven on demand data model. •The naming schemes used in Directed Diffusion are application dependent and each time should be defined a priori. •The matching process for data and queries might require some extra overhead at the sensors. BIDIRECTIONAL DATACENRIC ROUTING The novel protocol conserves energy by becoming active only when changes occur in the network, broad casting data id provides guaranteed data delivery. When there is a need for continuous it sends data without waiting for sink to send its interest. It uses two way hand shake protocol thereby using less energy comparing to the existing protocols. The sink sends interest in the shortest path there by conserving energy. Key advantages • Data redundancy is eradicated. • Overcomes resource blindness.
  • 4. International Journal of Computer science and Engineering Research and Development (IJCSERD), ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 3, Number 2, April-May (2013) 23 Performance analysis The bandwidth and the life time of nodes increases compared to the protocols DD SPIN CONCLUSION In this paper, we have proposed a BIDIRECTIONAL DATACENTRIC routing protocol using Meta data descriptor for WSN. Here the data is sent whenever there is a drastic change in the data sensed or only when the base station request for data. We have compared its performance with existing SPIN and Directed Diffusion protocol. But one major problem is that security in future we will try to provide it and try to resolve redundancy of advertisement message. REFERENCES [1] ZeenatRehena,SarbaniRoy’Nandini Mukherjee” A Modified SPIN for Wireless Sensor Networks”IEEE.Conf.,Feb 2011,pp.1-4. [2] Kai Lin, Joel J. P. C. Rodrigues, HongweiGe, NaixueXiong, and Xuedong Liang,“Energy Efficiency QoS Assurance Routing inWireless Multimedia Sensor Networks” IEEE Systems Journal, December 2011, Vol. 5, No. 4, pp.495-505 [3] Shio Kumar Singh , M P Singh , and D K Singh ,”Routing Protocols in Wireless Sensor Networks –A Survey” International Journal of Computer Science & Engineering Survey (IJCSES), November 2010, Vol.1, No.2,pp.63-83 [4] L. Alazzawi, A. Elkateeb, “Performance Evaluation of the WSN Routing Protocols Scalability,” Journal of Computer Systems, Networks, andCommunications, 2008, Vol. 14, Issue 2, pp. 1-9 [5] ChalermekIntanagonwiwat,Ramesh Govindan,Deborah Estfin,Johneidemann,Fabio Silva, “Directed Diffusion for Wireless Sensor Networking”IEEE/ACM Transactions On Networking, Feb 2003,Vol. l 1, No. 1,pp.1525-1529. [6] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, “ A Survey on Sensor Networks”, IEEE Commun.Mag., Aug 2002 ,pp.102-114.