SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Research in Engineering and Science (IJRES)
ISSN (Online): 2320-9364, ISSN (Print): 2320-9356
www.ijres.org Volume 3 Issue 5 ǁ May 2015 ǁ PP.33-38
www.ijres.org 33 | Page
Comprehensive Review on Base Energy Efficient Routing
Protocol
1
Mr.Atamjit singh , 2
Ms. Gurdeep kaur
1
M.tech Scholar, Information and Technology Department, CEC, Mohali
2
Assistant Professor, Information and technology Department, CEC, Mohali
Abstract- With the faster growing in electronics industry, small inexpensive battery powered wireless sensors
have made an impact on the communications with the physical world. The Wireless Sensor Networks (WSN)
consists of hundreds of sensor nodes which are resource constrained. WSN nodes monitor various physical and
environmental conditions very cooperatively. WSN uses various nodes for the communication. WSN has become
one of the interested areas in the field of research from last few years. To enhance the lifetime of the whole
networks energy reduction is the necessary consideration for design and analyse of the clustering and routing
protocols. This paper describes the study of various energy efficient routing protocols in WSNs which are
important for their designing purpose so as to meet the various resource constraints.
Keywords- Wireless sensor network, clustering, Network lifetime, Energy efficient, Routing Protocols, Cluster
Head.
I. Introduction
Wireless sensor network (WSN) is broadly considered as a standout amongst the most critical advances for
the twenty-first century [1]. In the previous decades, it has gotten colossal consideration from both the academia
and industry everywhere throughout the world. A WSN regularly comprises of a substantial number of minimal
effort, low-control, and multifunctional wireless sensor nodes, with sensing, wireless communications and
reckoning abilities [2,3]. A wireless sensor network is an ad-hoc infrastructure of sensing, communicating
elements that gives the ability of observing, reacting in specific environment. The environment can be an
information technology framework, the physical world or a biological system. This paper describes the study of
various energy efficient routing protocols in WSNs which are important for their designing purpose so as to
meet the various resource constraints.
Wireless Sensor Networks (WSNs) comprise of small nodes with sensing, reckoning, and wireless interchanges
abilities. Numerous routing, power management, and information dispersal conventions have been particularly
intended for WSNs where energy awareness is a crucial outline issue[3]. On the other hand, the focus has given
to the routing protocols which may contrast relying upon the application and network structural engineering. A
Wireless Sensor Network (WSN) contain hundreds or thousands of these sensor nodes. These sensors can
convey either among one another or specifically to an outer base-station (BS). A more noteworthy number of
sensors takes into account sensing over larger geographical regions with more prominent accuracy. Fig. 1 shows
the schematic diagram of sensor node components. Basically, every sensor node involves sensing, processing,
transmission, mobilizer, position finding framework, and power units (some of these components are optional
like the mobilizer). The same figure shows the communication architecture of a WSN. Sensor nodes are usually
scattered in a sensor field, which is an area where the sensor nodes are deployed. Each sensor node bases its
decisions on its mission, the information it currently has, and its knowledge of its computing, communication,
and energy resources. Each one of these scattered sensor nodes has the ability to gather and route information
either to different sensors or back to an external base station(s)1. A base-station may be a fixed node or a mobile
node capable of uniting the sensor system to a current communications framework or to the Internet where a
user can have access to the reported data.
Comprehensive Review on Base Energy Efficient Routing Protocol
www.ijres.org 34 | Page
Figure 1: The components of a sensor node
Routing in WSNs is extremely difficult task due to the inherent qualities that recognize these systems from
different other wireless networks like mobile ad hoc networks or cellular systems. Networking unattended
sensor nodes may have profound effect on the efficiency of many military and civil applications such as target
field imaging, intrusion detection, weather monitoring, security and tactical surveillance, distributed computing,
detecting ambient conditions such as temperature, movement, sound, light, or the presence of certain objects,
inventory control, and disaster management.
II. Network Design Objectives
Most sensor networks are application particular and have diverse application prerequisites. In this manner,
all or part of the accompanying principle plan targets is considered in the configuration of sensor systems:
 Small node size: Since sensor nodes are generally conveyed in a brutal or unfriendly environment in
extensive numbers, reducing node size can encourage node arrangement. It will likewise decrease the power
utilization and expense of sensor nodes.
 Low node cost: Since sensor nodes are generally conveyed in a cruel or threatening environment in huge
numbers and can't be reused, decreasing expense of sensor nodes is imperative and will come about into the
expense diminishment of entire system
 Low power utilization: Since sensor nodes are powered by battery and it is regularly extremely
troublesome or even difficult to charge or energize their batteries, it is significant to decrease the power
utilization of sensor nodes such that the lifetime of the sensor nodes, additionally the entire system is
delayed.
 Reliability: Network protocols intended for sensor networks must give error control and remedy
mechanisms to guarantee reliable information conveyance over noisy, error-prone, and time-varying wireless
channels.
 Fault tolerance: Sensor nodes are inclined to disappointments because of harsh organization situations and
unattended operations. In this manner, sensor nodes ought to be fault tolerant and have the capacity of
selftesting, adjusting toward oneself, repairing toward oneself, and recovering toward oneself.
 Security: A sensor network ought to acquaint effective security mechanisms to prevent the data information
in the network or a sensor node from unapproved access or malicious attacks.
 QoS support: In sensor networks, different applications may have different quality-of-service (QoS)
requirements in terms of delivery latency and packet loss. Thus, network protocol design should consider the
QoS requirements of specific applications.
III. Routing Challenges and Design Issues in WSNs
In spite of the incalculable utilizations of WSNs, these systems have a few confinements, e.g., constrained
energy supply, restricted processing power, and restricted bandwidth of the wireless connections joining sensor
nodes. One of the principle outline objectives of WSNs is to complete information correspondence while
attempting to delay the lifetime of the system and prevent connectivity degradation by utilizing aggressive
energy management techniques. The outline of routing protocols in WSNs is affected by numerous testing
Comprehensive Review on Base Energy Efficient Routing Protocol
www.ijres.org 35 | Page
variables. These elements must be overcome before productive correspondence can be attained to in WSNs. we
condense a portion of the steering difficulties and outline issues that influence routing process in WSNs.
 Node deployment: Node deployment in WSNs is application dependent and influences the execution of the
routing protocol. The deployment can be either deterministic or randomized. In deterministic organization,
the sensors are manually placed and information is directed through pre-determined ways. On the other
hand, in arbitrary node deployment, the sensor nodes are scattered haphazardly making a base in a specially
appointed way.
 Energy consumption without losing accuracy: Sensor nodes can go through their constrained supply of
energy performing calculations and transmitting information in a wireless environment. As such, energy-
conserving forms of communication and processing are fundamental. Sensor node lifetime demonstrates an
in number reliance on the battery lifetime [4]. In a multihop WSN, each node assumes a double part as
information sender and information switch. The breaking down of some sensor nodes because of power
failure can result in huge topological changes and may oblige rerouting of packets and rearrangement of the
system.
 Sensor locations: Another test that confronts the configuration of routing protocols is to deal with the areas
of the sensors. The vast majority of the proposed conventions expect that the sensors either are outfitted with
worldwide situating framework (GPS) beneficiaries or utilize some restriction strategy [5] to find out about
their areas.
 Coverage: In WSNs, every sensor node acquires a certain perspective of nature. A given sensor's
perspective of nature is constrained both in extent and in exactness; it can just cover a restricted physical
range of the earth. Thus, region scope is additionally an essential configuration parameter in WSNs.
IV. Routing Protocols in WSNs
In this section, we survey the state-of-the-art routing protocols for WSNs. In general, routing in WSNs can
be divided into flat-based routing, hierarchical-based routing, and location-based routing depending on the
network structure. In flat-based routing, all nodes are typically assigned equal roles or functionality. In
hierarchical-based routing, however, nodes will play different roles in the network. In location-based routing,
sensor nodes positions are exploited to route data in the network.
These protocols can be further classified into multipath-based, query-based, negotiation-based, QoS-based, or
coherent-based routing techniques depending on the protocol operation. In addition to the above, routing
protocols can be classified into three categories, namely, proactive, reactive, and hybrid protocols depending on
how the source finds a route to the destination. In proactive protocols, all routes are computed before they are
really needed, while in reactive protocols, routes are computed on demand. Hybrid protocols use a combination
of these two ideas. When sensor nodes are static, it is preferable to have table driven routing protocols rather
than using reactive protocols. A significant amount of energy is used in route discovery and setup of reactive
protocols.
Routing in wireless sensor networks differs from conventional routing in fixed networks in various ways. There
is no infrastructure, wireless links are unreliable, sensor nodes may fail, and routing protocols have to meet strict
energy saving requirements [6]. Many routing algorithms were developed for wireless networks in general. All
major routing protocols proposed for WSNs may be divided into seven categories as shown in Table 1. Some of
few protocols are reviewed as follows.
Table 1: Routing Protocols for WSNs
CATAGORY REPRESENTATIVE PROTOCOLS
Location-based Protocols MECN, SMECN, GAF, GEAR, Span, TBF, BVGF, GeRaF
Data-centric Protocols SPIN, Directed Diffusion, Rumor Routing, COUGAR, ACQUIRE,
EAD, Information-Directed Routing, Gradient- Based Routing,
Energy-aware Routing, Information-Directed Routing, Quorum-
Based Information Dissemination, Home Agent Based Information
Dissemination
Hierarchical Protocols LEACH, PEGASIS, HEED, TEEN, APTEEN
Mobility-based Protocols SEAD, TTDD, Joint Mobility and Routing, Data MULES,
Dynamic Proxy Tree-Base Data Dissemination
Multipath-based Protocols Sensor-Disjoint Multipath, Braided Multipath, N-to-1 Multipath
Discovery
Heterogeneity-based Protocols IDSQ, CADR, CHR
QoS-based protocols SAR, SPEED, Energy-aware routing
Comprehensive Review on Base Energy Efficient Routing Protocol
www.ijres.org 36 | Page
 Geographic Adaptive Fidelity (GAF): GAF [15] is primarily proposed for MANETs and is an energy-
aware routing protocol, but can also be used for WSNs because it favors energy conservation. The design of
GAF is motivated based on an energy model that considers energy consumption due to the reception and
transmission of packets as well as idle (or listening) time when the radio of a sensor is on to detect the
presence of incoming packets. GAF basically depends on the principle of turning off unwanted sensors while
maintaining a fixed level of routing fidelity (or uninterrupted connectivity between communicating sensors).
Fig. 1 State transition diagram of GAF
As shown in Figure 1, the GAF state transition diagram has mainly three states, namely, discovery, active, and
sleeping. In the sleeping state of a sensor, then, for energy savings, it turns off its radio. When it enters the
discovery state of a sensor, it exchanges discovery messages in the same grid to learn about other sensors. And
Even in the active state, a sensor continuously broadcasts its discovery messages about its state to inform
equivalent sensors. The total time spent in each one of these following states can be tuned depending on several
factors, such as its needs and sensor mobility by the application. GAF main motive to maximize the system
lifetime by reaching a state where each grid has only one active sensor based on sensor ranking rules. For
example, a sensor in the active state has a higher rank than a sensor in the discovery state. A sensor with longer
expected lifetime has a higher rank.
 Sensor Protocols for Information via Negotiation (SPIN): SPIN [7] protocol was designed to
improve classic flooding protocols and overcome the problems they may cause, for example, implosion and
overlap. The SPIN protocols are resource aware and resource adaptive. The sensors running the SPIN
protocols are able to compute the energy consumption required to compute, send, and receive data over the
network. Thus, they can make informed decisions for efficient use of their own resources. The SPIN
protocols have mainly two key mechanisms namely negotiation and resource adaptation. SPIN enables the
sensors to negotiate with each other before any data dissemination can occur in order to avoid injecting non-
useful and redundant information in the network. SPIN uses meta-data as the descriptors of the data that the
sensors want to disseminate. The notion of meta-data avoids the occurrence of overlap given sensors can
name the interesting portion of the data they want to get. It may be noted here that the size of the meta-data
should definitely be less than that of the corresponding sensor data.
There are two protocols in the SPIN family: SPIN-l (or SPIN-PP) and SPIN-2 (or SPIN-EC) [7]. While
SPIN-l uses a negotiation mechanism to reduce the consumption of the sensors, SPIN-2 uses a resource-
aware mechanism for energy savings. Both protocols allow the sensors to exchange information about their
sensed data, thus helping them to obtain the data they are interested in.
 Directed Diffusion: Directed diffusion [8] is a data-centric routing protocol for sensor query
dissemination and processing. It meets the main requirements of WSNs such as energy efficiency,
scalability, and robustness. Directed diffusion has various key elements namely data naming, interests and
gradients, data propagation, and reinforcement. A sensing capability can be demonstrated by a number of
attribute-value pairs. In the directed diffusion process, in the beginning, the sink specifies a low information
rate for upcoming events. After that, the sink can reinforce one particular sensor to send events with a higher
data rate by resending the original interest message with a smaller interval. Likewise, if a neighboring sensor
receives this interest message and finds that the sender's interest has a higher data rate than before, and this
data rate is higher than that of any existing gradient, it will reinforce one or more of its neighbours.
 Rumor Routing: Rumor routing is a logical compromise between query flooding and event flooding app
schemes. Rumor routing is an efficient protocol if the number of queries is between the two intersection
points of the curve of rumor routing with those of query flooding and event flooding. Rumor routing is based
on the concept of agent, which is a long-lived packet that traverses a network and informs each sensor it
encounters about the events that it has learned during its network traverse. An agent will travel the network
for a certain number of hops and then die.
Comprehensive Review on Base Energy Efficient Routing Protocol
www.ijres.org 37 | Page
 Low-energy adaptive clustering hierarchy (LEACH): LEACH [9] is the first and most popular
energy-efficient hierarchical clustering algorithm for WSNs that was proposed for reducing power
consumption. In LEACH, the clustering task is rotated among the nodes, based on duration. Direct
communication is used by each cluster head (CH) to forward the data to the base station (BS). It uses
clusters to prolong the life of the wireless sensor network. LEACH is based on an aggregation (or fusion)
technique that combines or aggregates the original data into a smaller size of data that carry only meaningful
information to all individual sensors. LEACH divides the a network into several cluster of sensors, which are
constructed by using localized coordination and control not only to reduce the amount of data that are
transmitted to the sink, but also to make routing and data dissemination more scalable and robust. LEACH
uses a randomize rotation of high-energy CH position rather than selecting in static manner, to give a chance
to all sensors to act as CHs and avoid the battery depletion of an individual sensor and dieing quickly. The
operation of LEACH is divided into rounds having two phases each namely (i) a setup phase to organize the
network into clusters, CH advertisement, and transmission schedule creation and (ii) a steady-state phase for
data aggregation, compression, and transmission to the sink.
 Disjoint Paths: Sensor-disjoint multipath routing [10] is a multipath protocol that helps find a small
number of alternate paths that have no sensor in common with each other and with the primary path. In
sensor-disjoint path routing, the primary path is best available whereas the alternate paths are less desirable
as they have longer latency. The disjoint makes those alternate paths independent of the primary path. Thus,
if a failure occurs on the primary path, it remains local and does not affect any of those alternate paths. The
sink can determine which of its neighbors can provide it with the highest quality data characterized by the
lowest loss or lowest delay after the network has been flooded with some low-rate samples. Although
disjoint paths are more resilient to sensor failures, they can be potentially longer than the primary path and
thus less energy efficient.
 Braided Paths: Braided multipath [10] is a partially disjoint path from primary one after relaxing the
disjointedness constraint. To construct the braided multipath, first primary path is computed. Then, for each
node (or sensor) on the primary path, the best path from a source sensor to the sink that does not include that
node is computed. Those best alternate paths are not necessarily disjoint from the primary path and are called
idealized braided multipaths. Moreover, the links of each of the alternate paths lie either on or
geographically close to the primary path. Therefore, the energy consumption on the primary and alternate
paths seems to be comparable as opposed to the scenario of mutually ternate and primary paths. The braided
multipath can also be constructed in a localized manner in which case the sink sends out a primary-path
reinforcement to its first preferred neighbor and alternate-path reinforcement to its second preferred
neighbor.
V. CONCLUSION
One of the main challenges in the design of routing protocols for WSNs is energy efficiency due to the
scarce energy resources of sensors. The ultimate objective behind the routing protocol design is to keep the
sensors operating for as long as possible, thus extending the network lifetime. The energy consumption of the
sensors is dominated by data transmission and reception. Therefore, routing protocols designed for WSNs
should be as energy efficient as possible to prolong the lifetime of individual sensors, and hence the network
lifetime. In this paper, we have surveyed a sample of routing protocols by taking into account several
classification criteria, including location information, network layering and in-network processing, data
centricity, path redundancy, network dynamics, QoS requirements, and network heterogeneity. For each of these
categories, we have discussed a few example protocols.
REFERENCES
[1] “21 ideas for the 21st century”, Business Week, Aug. 30 1999, pp. 78-167.
[2] S.K. Singh, M.P. Singh, and D.K. Singh, “A survey of Energy-Efficient Hierarchical Cluster-based Routing in Wireless Sensor
Networks”, International Journal of Advanced Networking and Application (IJANA), Sept.–Oct. 2010, vol. 02, issue 02, pp. 570–
580.
[3] S.K. Singh, M.P. Singh, and D.K. Singh, "Energy-efficient Homogeneous Clustering Algorithm for Wireless Sensor Network",
International Journal of Wireless & Mobile Networks (IJWMN), Aug. 2010, vol. 2, no. 3, pp. 49-61.
[4] W. Heinzelman, A. Chandrakasan and H. Balakrishnan, "Energy-Efficient Communication Protocol for Wireless Microsensor
Networks," Proceedings of the 33rd Hawaii International Conference on System Sciences (HICSS '00), January 2000.
[5] 14. N. Bulusu, J. Heidemann, and D. Estrin, “GPS-less Low Cost Outdoor Localization for Very Small Devices”, IEEE Personal
Communication Magazine, vol. 7, no. 5, Oct. 2000, pp. 28-34.
[6] S. Misra et al. (eds.), Guide to Wireless Sensor Networks, Computer Communications and Networks, DOI: 10.1007/978-1-84882-
218-4 4, Springer-Verlag London Limited 2009.
Comprehensive Review on Base Energy Efficient Routing Protocol
www.ijres.org 38 | Page
[7] J. Kulik, W. Heinzelman, and H. Balakrishnan, "Negotiation-based protocols for disseminating information in wireless sensor
networks", Wireless Networks, vol. 8, no. 2/3, Mar.-May 2002, pp. 169- 185.
[8] C. Intanagonwiwat, R. Govindan, D. Estrin, J. Heidemann, and F. Silva, "Directed diffusion for wireless sensor networking",
IEEE/ACM Transactions on Networking, vol. 11., no. 1, Feb. 2003, pp. 2-16.
[9] W.R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “An Application-Specific Protocol Architecture for Wireless Microsensor
Networks” in IEEE Tmnsactions on Wireless Communications (October 2002), vol. 1(4), pp. 660-670.
[10] S. Lindsey, C. S. Raghavendra, and K. M. Sivalingam, "Data gathering algorithms in sensor networks using energy metrics", IEEE
Transactions on Parallel and Distributed Systems, vol. 13, no. 9, Sept. 2002, pp. 924-935.
[11] Jamal Al-Karaki, and Ahmed E. Kamal, “Routing Techniques in Wireless Sensor Networks: A Survey“, IEEE Communications
Magazine, vol 11, no. 6, Dec. 2004, pp. 6-28.
[12] Kemal Akkaya and Mohamed Younis, “A Survey on Routing Protocols for Wireless Sensor Networks”, Ad hoc Networks, vol. 3, no.
3, May 2005, pp. 325-349.

More Related Content

What's hot

EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSijassn
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network reportGanesh Khadsan
 
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkMuhammad Kaife Uddin
 
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET Journal
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksZaahir Salam
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
 
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Vinayak Kulkarni
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET Journal
 
Scalability in wireless sensor networks
Scalability in wireless sensor networksScalability in wireless sensor networks
Scalability in wireless sensor networkssourabhshivtiwari
 
Wireless sensor networks software architecture
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architectureAdeel Javaid
 
Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technologyKapil Dev
 
Wireless sensor network survey
Wireless sensor network surveyWireless sensor network survey
Wireless sensor network survey915086731
 
Sensors 19-03789-v2
Sensors 19-03789-v2Sensors 19-03789-v2
Sensors 19-03789-v2Nitin k
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkKarthik
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...IRJET Journal
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor NetworkGanesh Khadsan
 

What's hot (20)

EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 
Wireless sensor network report
Wireless sensor network reportWireless sensor network report
Wireless sensor network report
 
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor Network
 
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor NetworkIRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
IRJET- Node Deployment for Improving Coverage Area in Wireless Sensor Network
 
wireless sensor network a survey
wireless sensor network a surveywireless sensor network a survey
wireless sensor network a survey
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
 
Scalability in wireless sensor networks
Scalability in wireless sensor networksScalability in wireless sensor networks
Scalability in wireless sensor networks
 
Wireless sensor networks software architecture
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architecture
 
Chapter
ChapterChapter
Chapter
 
Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technology
 
Wireless sensor network survey
Wireless sensor network surveyWireless sensor network survey
Wireless sensor network survey
 
Sensors 19-03789-v2
Sensors 19-03789-v2Sensors 19-03789-v2
Sensors 19-03789-v2
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
 
B0470208027
B0470208027B0470208027
B0470208027
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 

Viewers also liked

El adjetivo
El adjetivoEl adjetivo
El adjetivojsanzman
 
Tipos de almacenamiento a pc
Tipos de almacenamiento a pcTipos de almacenamiento a pc
Tipos de almacenamiento a pcsamy451
 
Unit Power Factor Servo Drive Control System
Unit Power Factor Servo Drive Control SystemUnit Power Factor Servo Drive Control System
Unit Power Factor Servo Drive Control SystemIJRES Journal
 
Thesis presentation,XiangHe,10122015
Thesis presentation,XiangHe,10122015Thesis presentation,XiangHe,10122015
Thesis presentation,XiangHe,10122015Xiang He
 
생방송카지노 사이트 ≫otp88.com≪ 생중계카지노 생방송블랙잭nd9
생방송카지노 사이트 ≫otp88.com≪ 생중계카지노 생방송블랙잭nd9 생방송카지노 사이트 ≫otp88.com≪ 생중계카지노 생방송블랙잭nd9
생방송카지노 사이트 ≫otp88.com≪ 생중계카지노 생방송블랙잭nd9 rlaehdrb212
 
iOS Effective Coding: Run Loops & UI
iOS Effective Coding: Run Loops & UIiOS Effective Coding: Run Loops & UI
iOS Effective Coding: Run Loops & UIJ.M. Schaeffer
 
Model Analysis of Cymbal Generator Under Different Working Conditions
Model Analysis of Cymbal Generator Under Different Working ConditionsModel Analysis of Cymbal Generator Under Different Working Conditions
Model Analysis of Cymbal Generator Under Different Working ConditionsIJRES Journal
 
xRM4Legal for the Call Center Web2CRM
xRM4Legal for the Call Center Web2CRMxRM4Legal for the Call Center Web2CRM
xRM4Legal for the Call Center Web2CRMDavid Blumentals
 
Quaternions - Phoenix Bird presentation, v23
Quaternions - Phoenix Bird presentation, v23Quaternions - Phoenix Bird presentation, v23
Quaternions - Phoenix Bird presentation, v23Herb Klitzner
 
1.introduction to quality & total quality management
1.introduction to quality & total quality management1.introduction to quality & total quality management
1.introduction to quality & total quality managementHakeem-Ur- Rehman
 
Mobile voting by using biometrics
Mobile  voting  by  using biometricsMobile  voting  by  using biometrics
Mobile voting by using biometricsJEEVA ARAVINTH
 

Viewers also liked (15)

SGWSProdpiece2011-LoRes
SGWSProdpiece2011-LoResSGWSProdpiece2011-LoRes
SGWSProdpiece2011-LoRes
 
El adjetivo
El adjetivoEl adjetivo
El adjetivo
 
Tipos de almacenamiento a pc
Tipos de almacenamiento a pcTipos de almacenamiento a pc
Tipos de almacenamiento a pc
 
Unit Power Factor Servo Drive Control System
Unit Power Factor Servo Drive Control SystemUnit Power Factor Servo Drive Control System
Unit Power Factor Servo Drive Control System
 
Thesis presentation,XiangHe,10122015
Thesis presentation,XiangHe,10122015Thesis presentation,XiangHe,10122015
Thesis presentation,XiangHe,10122015
 
생방송카지노 사이트 ≫otp88.com≪ 생중계카지노 생방송블랙잭nd9
생방송카지노 사이트 ≫otp88.com≪ 생중계카지노 생방송블랙잭nd9 생방송카지노 사이트 ≫otp88.com≪ 생중계카지노 생방송블랙잭nd9
생방송카지노 사이트 ≫otp88.com≪ 생중계카지노 생방송블랙잭nd9
 
iOS Effective Coding: Run Loops & UI
iOS Effective Coding: Run Loops & UIiOS Effective Coding: Run Loops & UI
iOS Effective Coding: Run Loops & UI
 
Cv rafael garrido_coronel+2016
Cv rafael garrido_coronel+2016Cv rafael garrido_coronel+2016
Cv rafael garrido_coronel+2016
 
Model Analysis of Cymbal Generator Under Different Working Conditions
Model Analysis of Cymbal Generator Under Different Working ConditionsModel Analysis of Cymbal Generator Under Different Working Conditions
Model Analysis of Cymbal Generator Under Different Working Conditions
 
xRM4Legal for the Call Center Web2CRM
xRM4Legal for the Call Center Web2CRMxRM4Legal for the Call Center Web2CRM
xRM4Legal for the Call Center Web2CRM
 
Quaternions - Phoenix Bird presentation, v23
Quaternions - Phoenix Bird presentation, v23Quaternions - Phoenix Bird presentation, v23
Quaternions - Phoenix Bird presentation, v23
 
1.introduction to quality & total quality management
1.introduction to quality & total quality management1.introduction to quality & total quality management
1.introduction to quality & total quality management
 
Mobile voting by using biometrics
Mobile  voting  by  using biometricsMobile  voting  by  using biometrics
Mobile voting by using biometrics
 
арт терапия
арт терапияарт терапия
арт терапия
 
April 2015
April 2015April 2015
April 2015
 

Similar to Comprehensive Review on Base Energy Efficient Routing Protocol

Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Networkijtsrd
 
WSN_Chapter _1.pptx
WSN_Chapter _1.pptxWSN_Chapter _1.pptx
WSN_Chapter _1.pptxKamakshiMB1
 
Challenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksChallenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksAuwal Amshi
 
Routing techniques in wireless sensor networks a survey
Routing techniques in wireless sensor networks a surveyRouting techniques in wireless sensor networks a survey
Routing techniques in wireless sensor networks a surveyAmandeep Sohal
 
A Review Paper On Communication Protocols For Wireless Sensor Networks
A Review Paper On Communication Protocols For Wireless Sensor NetworksA Review Paper On Communication Protocols For Wireless Sensor Networks
A Review Paper On Communication Protocols For Wireless Sensor NetworksBria Davis
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
 
Computational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkComputational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkIRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Networkiosrjce
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networkspijans
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Applicationijsrd.com
 
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET Journal
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkCassie Romero
 
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...Editor IJCATR
 

Similar to Comprehensive Review on Base Energy Efficient Routing Protocol (20)

0512ijdps26
0512ijdps260512ijdps26
0512ijdps26
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
 
WSN_Chapter _1.pptx
WSN_Chapter _1.pptxWSN_Chapter _1.pptx
WSN_Chapter _1.pptx
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
Challenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksChallenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networks
 
Routing techniques in wireless sensor networks a survey
Routing techniques in wireless sensor networks a surveyRouting techniques in wireless sensor networks a survey
Routing techniques in wireless sensor networks a survey
 
A Review Paper On Communication Protocols For Wireless Sensor Networks
A Review Paper On Communication Protocols For Wireless Sensor NetworksA Review Paper On Communication Protocols For Wireless Sensor Networks
A Review Paper On Communication Protocols For Wireless Sensor Networks
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
 
Computational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkComputational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor Network
 
Report
ReportReport
Report
 
Ijetr021229
Ijetr021229Ijetr021229
Ijetr021229
 
Ijetr021229
Ijetr021229Ijetr021229
Ijetr021229
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
G017344246
G017344246G017344246
G017344246
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Network
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
 
Survey of Wireless Sensor Network Application
Survey of Wireless Sensor Network ApplicationSurvey of Wireless Sensor Network Application
Survey of Wireless Sensor Network Application
 
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
 
A Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor NetworkA Brief Research Study Of Wireless Sensor Network
A Brief Research Study Of Wireless Sensor Network
 
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
A Fault tolerant system based on Genetic Algorithm for Target Tracking in Wir...
 

More from IJRES Journal

Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...IJRES Journal
 
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...IJRES Journal
 
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityReview: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityIJRES Journal
 
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...IJRES Journal
 
Study and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesStudy and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesIJRES Journal
 
A Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresA Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresIJRES Journal
 
A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...IJRES Journal
 
Wear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodWear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodIJRES Journal
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionIJRES Journal
 
An improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningAn improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningIJRES Journal
 
Positioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchPositioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchIJRES Journal
 
Status of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowStatus of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowIJRES Journal
 
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...IJRES Journal
 
Experimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsExperimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsIJRES Journal
 
Correlation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalCorrelation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalIJRES Journal
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...IJRES Journal
 
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...IJRES Journal
 
A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...IJRES Journal
 
Structural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesStructural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesIJRES Journal
 
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...IJRES Journal
 

More from IJRES Journal (20)

Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...
 
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
 
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityReview: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
 
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
 
Study and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesStudy and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil properties
 
A Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresA Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their Structures
 
A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...
 
Wear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodWear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible Rod
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and Detection
 
An improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningAn improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioning
 
Positioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchPositioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision Workbench
 
Status of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowStatus of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and Now
 
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
 
Experimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsExperimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirs
 
Correlation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalCorrelation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound Signal
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
 
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
 
A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...
 
Structural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesStructural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubes
 
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
 

Recently uploaded

power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 

Recently uploaded (20)

power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 

Comprehensive Review on Base Energy Efficient Routing Protocol

  • 1. International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Print): 2320-9356 www.ijres.org Volume 3 Issue 5 ǁ May 2015 ǁ PP.33-38 www.ijres.org 33 | Page Comprehensive Review on Base Energy Efficient Routing Protocol 1 Mr.Atamjit singh , 2 Ms. Gurdeep kaur 1 M.tech Scholar, Information and Technology Department, CEC, Mohali 2 Assistant Professor, Information and technology Department, CEC, Mohali Abstract- With the faster growing in electronics industry, small inexpensive battery powered wireless sensors have made an impact on the communications with the physical world. The Wireless Sensor Networks (WSN) consists of hundreds of sensor nodes which are resource constrained. WSN nodes monitor various physical and environmental conditions very cooperatively. WSN uses various nodes for the communication. WSN has become one of the interested areas in the field of research from last few years. To enhance the lifetime of the whole networks energy reduction is the necessary consideration for design and analyse of the clustering and routing protocols. This paper describes the study of various energy efficient routing protocols in WSNs which are important for their designing purpose so as to meet the various resource constraints. Keywords- Wireless sensor network, clustering, Network lifetime, Energy efficient, Routing Protocols, Cluster Head. I. Introduction Wireless sensor network (WSN) is broadly considered as a standout amongst the most critical advances for the twenty-first century [1]. In the previous decades, it has gotten colossal consideration from both the academia and industry everywhere throughout the world. A WSN regularly comprises of a substantial number of minimal effort, low-control, and multifunctional wireless sensor nodes, with sensing, wireless communications and reckoning abilities [2,3]. A wireless sensor network is an ad-hoc infrastructure of sensing, communicating elements that gives the ability of observing, reacting in specific environment. The environment can be an information technology framework, the physical world or a biological system. This paper describes the study of various energy efficient routing protocols in WSNs which are important for their designing purpose so as to meet the various resource constraints. Wireless Sensor Networks (WSNs) comprise of small nodes with sensing, reckoning, and wireless interchanges abilities. Numerous routing, power management, and information dispersal conventions have been particularly intended for WSNs where energy awareness is a crucial outline issue[3]. On the other hand, the focus has given to the routing protocols which may contrast relying upon the application and network structural engineering. A Wireless Sensor Network (WSN) contain hundreds or thousands of these sensor nodes. These sensors can convey either among one another or specifically to an outer base-station (BS). A more noteworthy number of sensors takes into account sensing over larger geographical regions with more prominent accuracy. Fig. 1 shows the schematic diagram of sensor node components. Basically, every sensor node involves sensing, processing, transmission, mobilizer, position finding framework, and power units (some of these components are optional like the mobilizer). The same figure shows the communication architecture of a WSN. Sensor nodes are usually scattered in a sensor field, which is an area where the sensor nodes are deployed. Each sensor node bases its decisions on its mission, the information it currently has, and its knowledge of its computing, communication, and energy resources. Each one of these scattered sensor nodes has the ability to gather and route information either to different sensors or back to an external base station(s)1. A base-station may be a fixed node or a mobile node capable of uniting the sensor system to a current communications framework or to the Internet where a user can have access to the reported data.
  • 2. Comprehensive Review on Base Energy Efficient Routing Protocol www.ijres.org 34 | Page Figure 1: The components of a sensor node Routing in WSNs is extremely difficult task due to the inherent qualities that recognize these systems from different other wireless networks like mobile ad hoc networks or cellular systems. Networking unattended sensor nodes may have profound effect on the efficiency of many military and civil applications such as target field imaging, intrusion detection, weather monitoring, security and tactical surveillance, distributed computing, detecting ambient conditions such as temperature, movement, sound, light, or the presence of certain objects, inventory control, and disaster management. II. Network Design Objectives Most sensor networks are application particular and have diverse application prerequisites. In this manner, all or part of the accompanying principle plan targets is considered in the configuration of sensor systems:  Small node size: Since sensor nodes are generally conveyed in a brutal or unfriendly environment in extensive numbers, reducing node size can encourage node arrangement. It will likewise decrease the power utilization and expense of sensor nodes.  Low node cost: Since sensor nodes are generally conveyed in a cruel or threatening environment in huge numbers and can't be reused, decreasing expense of sensor nodes is imperative and will come about into the expense diminishment of entire system  Low power utilization: Since sensor nodes are powered by battery and it is regularly extremely troublesome or even difficult to charge or energize their batteries, it is significant to decrease the power utilization of sensor nodes such that the lifetime of the sensor nodes, additionally the entire system is delayed.  Reliability: Network protocols intended for sensor networks must give error control and remedy mechanisms to guarantee reliable information conveyance over noisy, error-prone, and time-varying wireless channels.  Fault tolerance: Sensor nodes are inclined to disappointments because of harsh organization situations and unattended operations. In this manner, sensor nodes ought to be fault tolerant and have the capacity of selftesting, adjusting toward oneself, repairing toward oneself, and recovering toward oneself.  Security: A sensor network ought to acquaint effective security mechanisms to prevent the data information in the network or a sensor node from unapproved access or malicious attacks.  QoS support: In sensor networks, different applications may have different quality-of-service (QoS) requirements in terms of delivery latency and packet loss. Thus, network protocol design should consider the QoS requirements of specific applications. III. Routing Challenges and Design Issues in WSNs In spite of the incalculable utilizations of WSNs, these systems have a few confinements, e.g., constrained energy supply, restricted processing power, and restricted bandwidth of the wireless connections joining sensor nodes. One of the principle outline objectives of WSNs is to complete information correspondence while attempting to delay the lifetime of the system and prevent connectivity degradation by utilizing aggressive energy management techniques. The outline of routing protocols in WSNs is affected by numerous testing
  • 3. Comprehensive Review on Base Energy Efficient Routing Protocol www.ijres.org 35 | Page variables. These elements must be overcome before productive correspondence can be attained to in WSNs. we condense a portion of the steering difficulties and outline issues that influence routing process in WSNs.  Node deployment: Node deployment in WSNs is application dependent and influences the execution of the routing protocol. The deployment can be either deterministic or randomized. In deterministic organization, the sensors are manually placed and information is directed through pre-determined ways. On the other hand, in arbitrary node deployment, the sensor nodes are scattered haphazardly making a base in a specially appointed way.  Energy consumption without losing accuracy: Sensor nodes can go through their constrained supply of energy performing calculations and transmitting information in a wireless environment. As such, energy- conserving forms of communication and processing are fundamental. Sensor node lifetime demonstrates an in number reliance on the battery lifetime [4]. In a multihop WSN, each node assumes a double part as information sender and information switch. The breaking down of some sensor nodes because of power failure can result in huge topological changes and may oblige rerouting of packets and rearrangement of the system.  Sensor locations: Another test that confronts the configuration of routing protocols is to deal with the areas of the sensors. The vast majority of the proposed conventions expect that the sensors either are outfitted with worldwide situating framework (GPS) beneficiaries or utilize some restriction strategy [5] to find out about their areas.  Coverage: In WSNs, every sensor node acquires a certain perspective of nature. A given sensor's perspective of nature is constrained both in extent and in exactness; it can just cover a restricted physical range of the earth. Thus, region scope is additionally an essential configuration parameter in WSNs. IV. Routing Protocols in WSNs In this section, we survey the state-of-the-art routing protocols for WSNs. In general, routing in WSNs can be divided into flat-based routing, hierarchical-based routing, and location-based routing depending on the network structure. In flat-based routing, all nodes are typically assigned equal roles or functionality. In hierarchical-based routing, however, nodes will play different roles in the network. In location-based routing, sensor nodes positions are exploited to route data in the network. These protocols can be further classified into multipath-based, query-based, negotiation-based, QoS-based, or coherent-based routing techniques depending on the protocol operation. In addition to the above, routing protocols can be classified into three categories, namely, proactive, reactive, and hybrid protocols depending on how the source finds a route to the destination. In proactive protocols, all routes are computed before they are really needed, while in reactive protocols, routes are computed on demand. Hybrid protocols use a combination of these two ideas. When sensor nodes are static, it is preferable to have table driven routing protocols rather than using reactive protocols. A significant amount of energy is used in route discovery and setup of reactive protocols. Routing in wireless sensor networks differs from conventional routing in fixed networks in various ways. There is no infrastructure, wireless links are unreliable, sensor nodes may fail, and routing protocols have to meet strict energy saving requirements [6]. Many routing algorithms were developed for wireless networks in general. All major routing protocols proposed for WSNs may be divided into seven categories as shown in Table 1. Some of few protocols are reviewed as follows. Table 1: Routing Protocols for WSNs CATAGORY REPRESENTATIVE PROTOCOLS Location-based Protocols MECN, SMECN, GAF, GEAR, Span, TBF, BVGF, GeRaF Data-centric Protocols SPIN, Directed Diffusion, Rumor Routing, COUGAR, ACQUIRE, EAD, Information-Directed Routing, Gradient- Based Routing, Energy-aware Routing, Information-Directed Routing, Quorum- Based Information Dissemination, Home Agent Based Information Dissemination Hierarchical Protocols LEACH, PEGASIS, HEED, TEEN, APTEEN Mobility-based Protocols SEAD, TTDD, Joint Mobility and Routing, Data MULES, Dynamic Proxy Tree-Base Data Dissemination Multipath-based Protocols Sensor-Disjoint Multipath, Braided Multipath, N-to-1 Multipath Discovery Heterogeneity-based Protocols IDSQ, CADR, CHR QoS-based protocols SAR, SPEED, Energy-aware routing
  • 4. Comprehensive Review on Base Energy Efficient Routing Protocol www.ijres.org 36 | Page  Geographic Adaptive Fidelity (GAF): GAF [15] is primarily proposed for MANETs and is an energy- aware routing protocol, but can also be used for WSNs because it favors energy conservation. The design of GAF is motivated based on an energy model that considers energy consumption due to the reception and transmission of packets as well as idle (or listening) time when the radio of a sensor is on to detect the presence of incoming packets. GAF basically depends on the principle of turning off unwanted sensors while maintaining a fixed level of routing fidelity (or uninterrupted connectivity between communicating sensors). Fig. 1 State transition diagram of GAF As shown in Figure 1, the GAF state transition diagram has mainly three states, namely, discovery, active, and sleeping. In the sleeping state of a sensor, then, for energy savings, it turns off its radio. When it enters the discovery state of a sensor, it exchanges discovery messages in the same grid to learn about other sensors. And Even in the active state, a sensor continuously broadcasts its discovery messages about its state to inform equivalent sensors. The total time spent in each one of these following states can be tuned depending on several factors, such as its needs and sensor mobility by the application. GAF main motive to maximize the system lifetime by reaching a state where each grid has only one active sensor based on sensor ranking rules. For example, a sensor in the active state has a higher rank than a sensor in the discovery state. A sensor with longer expected lifetime has a higher rank.  Sensor Protocols for Information via Negotiation (SPIN): SPIN [7] protocol was designed to improve classic flooding protocols and overcome the problems they may cause, for example, implosion and overlap. The SPIN protocols are resource aware and resource adaptive. The sensors running the SPIN protocols are able to compute the energy consumption required to compute, send, and receive data over the network. Thus, they can make informed decisions for efficient use of their own resources. The SPIN protocols have mainly two key mechanisms namely negotiation and resource adaptation. SPIN enables the sensors to negotiate with each other before any data dissemination can occur in order to avoid injecting non- useful and redundant information in the network. SPIN uses meta-data as the descriptors of the data that the sensors want to disseminate. The notion of meta-data avoids the occurrence of overlap given sensors can name the interesting portion of the data they want to get. It may be noted here that the size of the meta-data should definitely be less than that of the corresponding sensor data. There are two protocols in the SPIN family: SPIN-l (or SPIN-PP) and SPIN-2 (or SPIN-EC) [7]. While SPIN-l uses a negotiation mechanism to reduce the consumption of the sensors, SPIN-2 uses a resource- aware mechanism for energy savings. Both protocols allow the sensors to exchange information about their sensed data, thus helping them to obtain the data they are interested in.  Directed Diffusion: Directed diffusion [8] is a data-centric routing protocol for sensor query dissemination and processing. It meets the main requirements of WSNs such as energy efficiency, scalability, and robustness. Directed diffusion has various key elements namely data naming, interests and gradients, data propagation, and reinforcement. A sensing capability can be demonstrated by a number of attribute-value pairs. In the directed diffusion process, in the beginning, the sink specifies a low information rate for upcoming events. After that, the sink can reinforce one particular sensor to send events with a higher data rate by resending the original interest message with a smaller interval. Likewise, if a neighboring sensor receives this interest message and finds that the sender's interest has a higher data rate than before, and this data rate is higher than that of any existing gradient, it will reinforce one or more of its neighbours.  Rumor Routing: Rumor routing is a logical compromise between query flooding and event flooding app schemes. Rumor routing is an efficient protocol if the number of queries is between the two intersection points of the curve of rumor routing with those of query flooding and event flooding. Rumor routing is based on the concept of agent, which is a long-lived packet that traverses a network and informs each sensor it encounters about the events that it has learned during its network traverse. An agent will travel the network for a certain number of hops and then die.
  • 5. Comprehensive Review on Base Energy Efficient Routing Protocol www.ijres.org 37 | Page  Low-energy adaptive clustering hierarchy (LEACH): LEACH [9] is the first and most popular energy-efficient hierarchical clustering algorithm for WSNs that was proposed for reducing power consumption. In LEACH, the clustering task is rotated among the nodes, based on duration. Direct communication is used by each cluster head (CH) to forward the data to the base station (BS). It uses clusters to prolong the life of the wireless sensor network. LEACH is based on an aggregation (or fusion) technique that combines or aggregates the original data into a smaller size of data that carry only meaningful information to all individual sensors. LEACH divides the a network into several cluster of sensors, which are constructed by using localized coordination and control not only to reduce the amount of data that are transmitted to the sink, but also to make routing and data dissemination more scalable and robust. LEACH uses a randomize rotation of high-energy CH position rather than selecting in static manner, to give a chance to all sensors to act as CHs and avoid the battery depletion of an individual sensor and dieing quickly. The operation of LEACH is divided into rounds having two phases each namely (i) a setup phase to organize the network into clusters, CH advertisement, and transmission schedule creation and (ii) a steady-state phase for data aggregation, compression, and transmission to the sink.  Disjoint Paths: Sensor-disjoint multipath routing [10] is a multipath protocol that helps find a small number of alternate paths that have no sensor in common with each other and with the primary path. In sensor-disjoint path routing, the primary path is best available whereas the alternate paths are less desirable as they have longer latency. The disjoint makes those alternate paths independent of the primary path. Thus, if a failure occurs on the primary path, it remains local and does not affect any of those alternate paths. The sink can determine which of its neighbors can provide it with the highest quality data characterized by the lowest loss or lowest delay after the network has been flooded with some low-rate samples. Although disjoint paths are more resilient to sensor failures, they can be potentially longer than the primary path and thus less energy efficient.  Braided Paths: Braided multipath [10] is a partially disjoint path from primary one after relaxing the disjointedness constraint. To construct the braided multipath, first primary path is computed. Then, for each node (or sensor) on the primary path, the best path from a source sensor to the sink that does not include that node is computed. Those best alternate paths are not necessarily disjoint from the primary path and are called idealized braided multipaths. Moreover, the links of each of the alternate paths lie either on or geographically close to the primary path. Therefore, the energy consumption on the primary and alternate paths seems to be comparable as opposed to the scenario of mutually ternate and primary paths. The braided multipath can also be constructed in a localized manner in which case the sink sends out a primary-path reinforcement to its first preferred neighbor and alternate-path reinforcement to its second preferred neighbor. V. CONCLUSION One of the main challenges in the design of routing protocols for WSNs is energy efficiency due to the scarce energy resources of sensors. The ultimate objective behind the routing protocol design is to keep the sensors operating for as long as possible, thus extending the network lifetime. The energy consumption of the sensors is dominated by data transmission and reception. Therefore, routing protocols designed for WSNs should be as energy efficient as possible to prolong the lifetime of individual sensors, and hence the network lifetime. In this paper, we have surveyed a sample of routing protocols by taking into account several classification criteria, including location information, network layering and in-network processing, data centricity, path redundancy, network dynamics, QoS requirements, and network heterogeneity. For each of these categories, we have discussed a few example protocols. REFERENCES [1] “21 ideas for the 21st century”, Business Week, Aug. 30 1999, pp. 78-167. [2] S.K. Singh, M.P. Singh, and D.K. Singh, “A survey of Energy-Efficient Hierarchical Cluster-based Routing in Wireless Sensor Networks”, International Journal of Advanced Networking and Application (IJANA), Sept.–Oct. 2010, vol. 02, issue 02, pp. 570– 580. [3] S.K. Singh, M.P. Singh, and D.K. Singh, "Energy-efficient Homogeneous Clustering Algorithm for Wireless Sensor Network", International Journal of Wireless & Mobile Networks (IJWMN), Aug. 2010, vol. 2, no. 3, pp. 49-61. [4] W. Heinzelman, A. Chandrakasan and H. Balakrishnan, "Energy-Efficient Communication Protocol for Wireless Microsensor Networks," Proceedings of the 33rd Hawaii International Conference on System Sciences (HICSS '00), January 2000. [5] 14. N. Bulusu, J. Heidemann, and D. Estrin, “GPS-less Low Cost Outdoor Localization for Very Small Devices”, IEEE Personal Communication Magazine, vol. 7, no. 5, Oct. 2000, pp. 28-34. [6] S. Misra et al. (eds.), Guide to Wireless Sensor Networks, Computer Communications and Networks, DOI: 10.1007/978-1-84882- 218-4 4, Springer-Verlag London Limited 2009.
  • 6. Comprehensive Review on Base Energy Efficient Routing Protocol www.ijres.org 38 | Page [7] J. Kulik, W. Heinzelman, and H. Balakrishnan, "Negotiation-based protocols for disseminating information in wireless sensor networks", Wireless Networks, vol. 8, no. 2/3, Mar.-May 2002, pp. 169- 185. [8] C. Intanagonwiwat, R. Govindan, D. Estrin, J. Heidemann, and F. Silva, "Directed diffusion for wireless sensor networking", IEEE/ACM Transactions on Networking, vol. 11., no. 1, Feb. 2003, pp. 2-16. [9] W.R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “An Application-Specific Protocol Architecture for Wireless Microsensor Networks” in IEEE Tmnsactions on Wireless Communications (October 2002), vol. 1(4), pp. 660-670. [10] S. Lindsey, C. S. Raghavendra, and K. M. Sivalingam, "Data gathering algorithms in sensor networks using energy metrics", IEEE Transactions on Parallel and Distributed Systems, vol. 13, no. 9, Sept. 2002, pp. 924-935. [11] Jamal Al-Karaki, and Ahmed E. Kamal, “Routing Techniques in Wireless Sensor Networks: A Survey“, IEEE Communications Magazine, vol 11, no. 6, Dec. 2004, pp. 6-28. [12] Kemal Akkaya and Mohamed Younis, “A Survey on Routing Protocols for Wireless Sensor Networks”, Ad hoc Networks, vol. 3, no. 3, May 2005, pp. 325-349.