SlideShare a Scribd company logo
1 of 24
SEMINAR

SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENT FOR THE AWARD OF THE
DEGREE OF
MASTER OF TECHNOLOGY
(Computer Science and Engineer)

Submitted By:
Sonam Jain
1269171
MTECH(CSE)
LLRIET,MOGA
Routing Protocol
 Routing Protocol in Wireless Sensor Networks
 BeeSensor routing protocol for Wsn’s
 Bees in nature
 Bee agent model
 An agent of group communication
 Phases of BeeSensor protocol
 Evaluation metrics
 Comparison of BeeSensor with AODV
 Conclusion
 Refrences

Routing protocol is the nervous system of any
computer network.


Routing refers to select paths in a network along
which to send data.



Protocol is a set of formal rules describing how to
transmit data across a network.
The job of a routing protocol is to discover path
connecting a pair of nodes under a given set of
constraints
To engineer an event-driven, simple, scalable,
reliable, decentralized and energy-efficient
multipath routing protocol for WSNs through
nature-inspired simple bee agents.
Characteristics of bee sensor routing protocol
 multipath routing
 Reactive
 next hop routing
 Flat routing
 address-centric routing
 Distributed routing
 Best-effort
 Event-driven
 Fault-tolerance
Everyone knows that individual bees glean nectar from
flowers and transform it into delicious honey, but it is
not so widely known that a colony of bees possesses a
complex, highly ordered social organization for the
gathering of its food.
Bee agents having limited knowledge about the
overall network topology – must cooperate and
share the routing information with their fellow
agents to make more intelligent routing decisions.
BeeSensor works with four types of agents
Packers
 Scouts
 Foragers
 Swarms

Bees communicate with each other directly through dances to
exchange the quality and location of potential foraging sites .
waggle dance: A scout bee, after discovering a fresh patch of
flowers and returning home as a forager, communicates the
quality and location of the food source to foragers at hive by
performing a waggle dance.
 Intensity of this dance is an indication of the perceived food

source quality.
 Higher the intensity of the waggle dance, better is the
quality.
tremble dance : If a returning forager has to wait
longer to get unloaded, it performs the tremble dance.


tremble dance indicates that the current food
collection rate is higher than the processing rate.
Therefore, in response, foragers may abandon their
current activity and join the food-storer bees
1.
2.
3.
4.

Scouting
Foraging
Swarming
Routing loops and Path maintenance
The scouting is divided into two steps
1. Forward scouting
2. Backward scouting


When an event1 is detected at a sensor node, it is handed over
to a packer. The packer looks for an appropriate forager that
might carry this event to a sink node. If the packer fails to find
a forager, it launches a forward scout and encapsulates the
event in its payload.



Header: scout ID, source node ID, minimum remaining energy
,number of hops (initialized to zero).



The forward scout is then broadcast to the neighbors of the
source node. A forward scout does not know a priori the
address of the sink node.



A sink node interested in the event, carried in the payload of a
scout, will convert the forward scout to a backward scout.


When a sink node receives a forward scout, it extracts the
event from the payload area and passes it to the application.
Then it creates a new forwarding table entry which contains
three fields: a unique path ID, next hop ID and previous hop ID



Next hop is set to the sink ID, previous hop entry in the
forwarding table is set to the node ID from which the forward
scout is received.



Finally, it changes the agent ID to convert it to a backward
scout. The backward scout is then forwarded to the node from
which the forward scout was received.


The forager is finally forwarded to the next hop using
the path ID of the forager.



A forager follows a predetermined path, therefore,
intermediate nodes do not make routing decisions.



In BeeSensor, the intermediate nodes simply forward
the forager to the next hop based on the path ID.



This reduces the forager processing overhead at
intermediate nodes.


A swarm encapsulates all foragers belonging to its
own group – same path ID foragers –in its payload.
The swarm is then routed towards the source node
using the reverse link entries (previous hop) in the
forwarding tables.



A swarm does not advertise a path if its minimum
remaining energy level is below certain threshold, say
ℎ, provided that better quality paths are available.
Consequently, the poor quality paths are gradually
removed from the routing tables.
Routing loops :The forwarding table entry at a node
indicates that the backward scout has already visited this
node. Therefore, if a backward scout visits a node for the
second time, it is dropped by the node and the
corresponding entry is flushed.
Path Maintenance: Swarming is simple but an elegant way
of doing path maintenance. A path at a source node remains
valid if it has foragers for it.

if no forager arrives within the wait time, it is a clear
indication that the path is broken.


Packet delivery ratio: It is the ratio of total number of
events received at a sink node to the total number of events
generated by all the source nodes in the network.



Energy efficiency: it is computed by dividing the total
energy consumed in the network by the number of Kbits
delivered successfully at the sink node.



Latency :It is defined as the difference in time when an
event is generated at a source and when it got delivered at the
sink node.



Algorithmic complexity: It is defined as the total number of
CPU cycles consumed, for processing control packets and
forwarding of data packets


Packet Delivery Ratio and latency of BeeSensor is higher than
AODV and other SI protocols.



Total Energy Consumption is less in BeeSensor than AODV
and other SI protocols ,therefore BeeSensor is energy –efficient
protocol.



Algorithmic Complexity and Control Overhead are least in
BeeSensor routing protocol.



Lifetime of network is more in BeeSensor than AODV
BeeSensor delivers superior performance in terms
of packet delivery ratio and latency, but with the
least energy consumption compared with AODV
and other SI algorithms.
.
[1]A.Moussa and N El-Sheimy, localization of wireless sensor
network using bees optimization algorithm,IEEE ,2011
[2]Karima Aksa, Mohammed Benmohammed, A Comparison
Between Geometric and Bio-Inspired Algorithms for Solving
Routing Problem in Wireless Sensor Network, International
Journal of Networks and Communications 2012, 2(3): 27-32
[3]K. Akkaya, M. Younis, A survey on routing protocols for
wireless sensor networks, Elsevier Ad Hoc Networks 3 (3)
(2005) 325–349.
[4]Nikolaos A. Pantazis, Stefanos A. Nikolidakis and Dimitrios
D. Vergados, Senior Member, IEEE, Energy-Efficient Routing
Protocols in Wireless Sensor Networks: A Survey ,IEEE
COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15,
NO. 2, SECOND QUARTER 2013
[5]Muhammad Saleem, Gianni A. Di Caro, Muddassar Farooq
Swarm intelligence based routing protocol for wireless
sensor networks: Survey and future directions ,Elsevier
Information Sciences 181 (2011) 4597–4624
[6]Muhammad Saleem, Israr Ullah, Muddassar Farooq
BeeSensor: An energy-efficient and scalable routing protocol
for wireless sensor networks, Elsevier Information Sciences
200 (2012) 38–56
BeeSensor routing protocol for wireless sensor network

More Related Content

What's hot

Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyAli Habeeb
 
Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...
Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...
Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...Abid Afsar Khan Malang Falsafi
 
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN Sathish Silence
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkeSAT Publishing House
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkeSAT Journals
 
clustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHclustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHJimit Rupani
 
Study of Leach Protocol- A Review
Study of Leach Protocol- A ReviewStudy of Leach Protocol- A Review
Study of Leach Protocol- A ReviewEditor IJMTER
 
Wireless sensor networks routing protocols
Wireless sensor networks routing protocolsWireless sensor networks routing protocols
Wireless sensor networks routing protocolssourabhshivtiwari
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsVirendra Thakur
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksDarpan Dekivadiya
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECYogesh Fulara
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsVirendra Thakur
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingHabibur Rahman
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
 

What's hot (20)

wsn routing protocol
 wsn routing protocol wsn routing protocol
wsn routing protocol
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
 
Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...
Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...
Comparative Study of Routing Protocols in Wireless Sensor Networks by Abid Af...
 
Thesis-Final-slide
Thesis-Final-slideThesis-Final-slide
Thesis-Final-slide
 
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor network
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor network
 
clustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHclustering protocol in WSN:LEACH
clustering protocol in WSN:LEACH
 
Study of Leach Protocol- A Review
Study of Leach Protocol- A ReviewStudy of Leach Protocol- A Review
Study of Leach Protocol- A Review
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1
 
Wireless sensor networks routing protocols
Wireless sensor networks routing protocolsWireless sensor networks routing protocols
Wireless sensor networks routing protocols
 
Leach
LeachLeach
Leach
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor Networks
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEEC
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 

Similar to BeeSensor routing protocol for wireless sensor network

A NALYSIS OF ANTHOCNET AND AODV P ERFORMANCE USING NS2
A NALYSIS OF  ANTHOCNET  AND  AODV P ERFORMANCE USING  NS2 A NALYSIS OF  ANTHOCNET  AND  AODV P ERFORMANCE USING  NS2
A NALYSIS OF ANTHOCNET AND AODV P ERFORMANCE USING NS2 IJCI JOURNAL
 
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkAnalysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkIJMER
 
MULTI-PATH ROUTE DETERMINATION METHOD FOR NETWORK LOAD BALANCING IN FAP-BASED...
MULTI-PATH ROUTE DETERMINATION METHOD FOR NETWORK LOAD BALANCING IN FAP-BASED...MULTI-PATH ROUTE DETERMINATION METHOD FOR NETWORK LOAD BALANCING IN FAP-BASED...
MULTI-PATH ROUTE DETERMINATION METHOD FOR NETWORK LOAD BALANCING IN FAP-BASED...AIRCC Publishing Corporation
 
Multi Path Route Determination Method for Network Load Balancing in FAP Based...
Multi Path Route Determination Method for Network Load Balancing in FAP Based...Multi Path Route Determination Method for Network Load Balancing in FAP Based...
Multi Path Route Determination Method for Network Load Balancing in FAP Based...AIRCC Publishing Corporation
 
MULTI-PATH ROUTE DETERMINATION METHOD FOR NETWORK LOAD BALANCING IN FAP-BASED...
MULTI-PATH ROUTE DETERMINATION METHOD FOR NETWORK LOAD BALANCING IN FAP-BASED...MULTI-PATH ROUTE DETERMINATION METHOD FOR NETWORK LOAD BALANCING IN FAP-BASED...
MULTI-PATH ROUTE DETERMINATION METHOD FOR NETWORK LOAD BALANCING IN FAP-BASED...ijcsit
 
C OMPARISON OF AODV AND ANTHOCNET IN S TATIC W IRELESS N ETWORK
C OMPARISON OF  AODV  AND  ANTHOCNET  IN  S TATIC  W IRELESS  N ETWORKC OMPARISON OF  AODV  AND  ANTHOCNET  IN  S TATIC  W IRELESS  N ETWORK
C OMPARISON OF AODV AND ANTHOCNET IN S TATIC W IRELESS N ETWORKIJCI JOURNAL
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networksijcnes
 
On the routing overhead in infrastructureless multihop wireless networks
On the routing overhead in infrastructureless multihop wireless networksOn the routing overhead in infrastructureless multihop wireless networks
On the routing overhead in infrastructureless multihop wireless networksNarendra Singh Yadav
 
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...IOSR Journals
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc NetworkReview of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Networkijsrd.com
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...IOSR Journals
 
Ant Colony Optimization for Wireless Sensor Network: A Review
Ant Colony Optimization for Wireless Sensor Network: A ReviewAnt Colony Optimization for Wireless Sensor Network: A Review
Ant Colony Optimization for Wireless Sensor Network: A Reviewiosrjce
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolPrafull Johri
 
Multiple optimal path identification using ant colony optimisation in wireles...
Multiple optimal path identification using ant colony optimisation in wireles...Multiple optimal path identification using ant colony optimisation in wireles...
Multiple optimal path identification using ant colony optimisation in wireles...ijwmn
 
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc NetworkSurvey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc Networkijsrd.com
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodIJTET Journal
 

Similar to BeeSensor routing protocol for wireless sensor network (20)

A NALYSIS OF ANTHOCNET AND AODV P ERFORMANCE USING NS2
A NALYSIS OF  ANTHOCNET  AND  AODV P ERFORMANCE USING  NS2 A NALYSIS OF  ANTHOCNET  AND  AODV P ERFORMANCE USING  NS2
A NALYSIS OF ANTHOCNET AND AODV P ERFORMANCE USING NS2
 
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkAnalysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
 
MULTI-PATH ROUTE DETERMINATION METHOD FOR NETWORK LOAD BALANCING IN FAP-BASED...
MULTI-PATH ROUTE DETERMINATION METHOD FOR NETWORK LOAD BALANCING IN FAP-BASED...MULTI-PATH ROUTE DETERMINATION METHOD FOR NETWORK LOAD BALANCING IN FAP-BASED...
MULTI-PATH ROUTE DETERMINATION METHOD FOR NETWORK LOAD BALANCING IN FAP-BASED...
 
Multi Path Route Determination Method for Network Load Balancing in FAP Based...
Multi Path Route Determination Method for Network Load Balancing in FAP Based...Multi Path Route Determination Method for Network Load Balancing in FAP Based...
Multi Path Route Determination Method for Network Load Balancing in FAP Based...
 
MULTI-PATH ROUTE DETERMINATION METHOD FOR NETWORK LOAD BALANCING IN FAP-BASED...
MULTI-PATH ROUTE DETERMINATION METHOD FOR NETWORK LOAD BALANCING IN FAP-BASED...MULTI-PATH ROUTE DETERMINATION METHOD FOR NETWORK LOAD BALANCING IN FAP-BASED...
MULTI-PATH ROUTE DETERMINATION METHOD FOR NETWORK LOAD BALANCING IN FAP-BASED...
 
C OMPARISON OF AODV AND ANTHOCNET IN S TATIC W IRELESS N ETWORK
C OMPARISON OF  AODV  AND  ANTHOCNET  IN  S TATIC  W IRELESS  N ETWORKC OMPARISON OF  AODV  AND  ANTHOCNET  IN  S TATIC  W IRELESS  N ETWORK
C OMPARISON OF AODV AND ANTHOCNET IN S TATIC W IRELESS N ETWORK
 
[IJET V2I3-1P1] Authors: Raghavendra S, Nagalakshmi S
[IJET V2I3-1P1] Authors: Raghavendra S, Nagalakshmi S[IJET V2I3-1P1] Authors: Raghavendra S, Nagalakshmi S
[IJET V2I3-1P1] Authors: Raghavendra S, Nagalakshmi S
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
 
On the routing overhead in infrastructureless multihop wireless networks
On the routing overhead in infrastructureless multihop wireless networksOn the routing overhead in infrastructureless multihop wireless networks
On the routing overhead in infrastructureless multihop wireless networks
 
L 1000 423
L 1000 423L 1000 423
L 1000 423
 
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Rou...
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc NetworkReview of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
 
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
Analyzing the Effect of Varying CBR on AODV, DSR, IERP Routing Protocols in M...
 
Ant Colony Optimization for Wireless Sensor Network: A Review
Ant Colony Optimization for Wireless Sensor Network: A ReviewAnt Colony Optimization for Wireless Sensor Network: A Review
Ant Colony Optimization for Wireless Sensor Network: A Review
 
N017318992
N017318992N017318992
N017318992
 
Simulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocolSimulation & comparison of aodv & dsr protocol
Simulation & comparison of aodv & dsr protocol
 
Multiple optimal path identification using ant colony optimisation in wireles...
Multiple optimal path identification using ant colony optimisation in wireles...Multiple optimal path identification using ant colony optimisation in wireles...
Multiple optimal path identification using ant colony optimisation in wireles...
 
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc NetworkSurvey of Modified Routing Protocols for Mobile Ad-hoc Network
Survey of Modified Routing Protocols for Mobile Ad-hoc Network
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
 

Recently uploaded

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

BeeSensor routing protocol for wireless sensor network

  • 1. SEMINAR SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENT FOR THE AWARD OF THE DEGREE OF MASTER OF TECHNOLOGY (Computer Science and Engineer) Submitted By: Sonam Jain 1269171 MTECH(CSE) LLRIET,MOGA
  • 2. Routing Protocol  Routing Protocol in Wireless Sensor Networks  BeeSensor routing protocol for Wsn’s  Bees in nature  Bee agent model  An agent of group communication  Phases of BeeSensor protocol  Evaluation metrics  Comparison of BeeSensor with AODV  Conclusion  Refrences 
  • 3. Routing protocol is the nervous system of any computer network.  Routing refers to select paths in a network along which to send data.  Protocol is a set of formal rules describing how to transmit data across a network.
  • 4. The job of a routing protocol is to discover path connecting a pair of nodes under a given set of constraints
  • 5. To engineer an event-driven, simple, scalable, reliable, decentralized and energy-efficient multipath routing protocol for WSNs through nature-inspired simple bee agents.
  • 6. Characteristics of bee sensor routing protocol  multipath routing  Reactive  next hop routing  Flat routing  address-centric routing  Distributed routing  Best-effort  Event-driven  Fault-tolerance
  • 7. Everyone knows that individual bees glean nectar from flowers and transform it into delicious honey, but it is not so widely known that a colony of bees possesses a complex, highly ordered social organization for the gathering of its food.
  • 8. Bee agents having limited knowledge about the overall network topology – must cooperate and share the routing information with their fellow agents to make more intelligent routing decisions. BeeSensor works with four types of agents Packers  Scouts  Foragers  Swarms 
  • 9. Bees communicate with each other directly through dances to exchange the quality and location of potential foraging sites . waggle dance: A scout bee, after discovering a fresh patch of flowers and returning home as a forager, communicates the quality and location of the food source to foragers at hive by performing a waggle dance.  Intensity of this dance is an indication of the perceived food source quality.  Higher the intensity of the waggle dance, better is the quality.
  • 10. tremble dance : If a returning forager has to wait longer to get unloaded, it performs the tremble dance.  tremble dance indicates that the current food collection rate is higher than the processing rate. Therefore, in response, foragers may abandon their current activity and join the food-storer bees
  • 12. The scouting is divided into two steps 1. Forward scouting 2. Backward scouting
  • 13.  When an event1 is detected at a sensor node, it is handed over to a packer. The packer looks for an appropriate forager that might carry this event to a sink node. If the packer fails to find a forager, it launches a forward scout and encapsulates the event in its payload.  Header: scout ID, source node ID, minimum remaining energy ,number of hops (initialized to zero).  The forward scout is then broadcast to the neighbors of the source node. A forward scout does not know a priori the address of the sink node.  A sink node interested in the event, carried in the payload of a scout, will convert the forward scout to a backward scout.
  • 14.  When a sink node receives a forward scout, it extracts the event from the payload area and passes it to the application. Then it creates a new forwarding table entry which contains three fields: a unique path ID, next hop ID and previous hop ID  Next hop is set to the sink ID, previous hop entry in the forwarding table is set to the node ID from which the forward scout is received.  Finally, it changes the agent ID to convert it to a backward scout. The backward scout is then forwarded to the node from which the forward scout was received.
  • 15.
  • 16.  The forager is finally forwarded to the next hop using the path ID of the forager.  A forager follows a predetermined path, therefore, intermediate nodes do not make routing decisions.  In BeeSensor, the intermediate nodes simply forward the forager to the next hop based on the path ID.  This reduces the forager processing overhead at intermediate nodes.
  • 17.  A swarm encapsulates all foragers belonging to its own group – same path ID foragers –in its payload. The swarm is then routed towards the source node using the reverse link entries (previous hop) in the forwarding tables.  A swarm does not advertise a path if its minimum remaining energy level is below certain threshold, say ℎ, provided that better quality paths are available. Consequently, the poor quality paths are gradually removed from the routing tables.
  • 18. Routing loops :The forwarding table entry at a node indicates that the backward scout has already visited this node. Therefore, if a backward scout visits a node for the second time, it is dropped by the node and the corresponding entry is flushed. Path Maintenance: Swarming is simple but an elegant way of doing path maintenance. A path at a source node remains valid if it has foragers for it. if no forager arrives within the wait time, it is a clear indication that the path is broken.
  • 19.  Packet delivery ratio: It is the ratio of total number of events received at a sink node to the total number of events generated by all the source nodes in the network.  Energy efficiency: it is computed by dividing the total energy consumed in the network by the number of Kbits delivered successfully at the sink node.  Latency :It is defined as the difference in time when an event is generated at a source and when it got delivered at the sink node.  Algorithmic complexity: It is defined as the total number of CPU cycles consumed, for processing control packets and forwarding of data packets
  • 20.  Packet Delivery Ratio and latency of BeeSensor is higher than AODV and other SI protocols.  Total Energy Consumption is less in BeeSensor than AODV and other SI protocols ,therefore BeeSensor is energy –efficient protocol.  Algorithmic Complexity and Control Overhead are least in BeeSensor routing protocol.  Lifetime of network is more in BeeSensor than AODV
  • 21. BeeSensor delivers superior performance in terms of packet delivery ratio and latency, but with the least energy consumption compared with AODV and other SI algorithms. .
  • 22. [1]A.Moussa and N El-Sheimy, localization of wireless sensor network using bees optimization algorithm,IEEE ,2011 [2]Karima Aksa, Mohammed Benmohammed, A Comparison Between Geometric and Bio-Inspired Algorithms for Solving Routing Problem in Wireless Sensor Network, International Journal of Networks and Communications 2012, 2(3): 27-32 [3]K. Akkaya, M. Younis, A survey on routing protocols for wireless sensor networks, Elsevier Ad Hoc Networks 3 (3) (2005) 325–349. [4]Nikolaos A. Pantazis, Stefanos A. Nikolidakis and Dimitrios D. Vergados, Senior Member, IEEE, Energy-Efficient Routing Protocols in Wireless Sensor Networks: A Survey ,IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 2, SECOND QUARTER 2013
  • 23. [5]Muhammad Saleem, Gianni A. Di Caro, Muddassar Farooq Swarm intelligence based routing protocol for wireless sensor networks: Survey and future directions ,Elsevier Information Sciences 181 (2011) 4597–4624 [6]Muhammad Saleem, Israr Ullah, Muddassar Farooq BeeSensor: An energy-efficient and scalable routing protocol for wireless sensor networks, Elsevier Information Sciences 200 (2012) 38–56