SlideShare a Scribd company logo
Mona mohamed ragheb
Routing protocols in WSN
Agenda
2
 Introduction
 Routing challenges in WSN
 Flat Routing
 Hierarchical Routing
 Location-based Routing
 Routing Protocols Based on Protocol Operation
 some Routing protocols
 Conclusion
 References
3
 Routing is a process of selecting paths in a
network along which to send data traffic
 First, it is not possible to build a global addressing
scheme for a large number of sensor nodes. Thus,
traditional IP-based protocols may not be applied to
WSNs. In WSNs, sometimes getting the data is more
important than knowing the IDs of which nodes sent the
data.
 Second, in contrast to typical communication networks,
almost all applications of sensor networks require the
flow of sensed data from multiple sources to a particular
Introduction
4
 Routing protocols in WSNs Differ depending on the
application and network architecture
 sensor nodes are tightly constrained in terms of energy,
processing, and storage capacities. Thus, they require carefully
resource management.
 position awareness of sensor nodes is important since data
collection is normally based on the location.
 data collected by many sensors in WSNs is typically based
on common phenomena, hence there is a high probability
that this data has some redundancy
 Trade-offs between energy and communication overhead
savings
Routing challenges and design
issues
5
 Node deployment
 Energy consumption without losing accuracy
 Data reporting method
 Node/link heterogeneity
 Scalability
 Data aggregation
 Quality of service
Routing challenges and design
issues
6
 Node deployment
 Manual deployment
 Sensors are manually deployed
 Data is routed through predetermined path
 Random deployment
 Optimal clustering is necessary to allow connectivity &
energy-efficiency
 Multi-hop routing
Routing challenges and design
issues
7
 Data reporting method
Application-specific:
• Time-driven: Periodic monitoring
• Event-driven: Respond to sudden changes
• Query-driven: Respond to queries
• Hybrid (combination of delivery models)
Routing challenges and design
issues
8
 Node/link heterogeneity
 Depending on the application, a sensor node can
have a different role or capability such as relaying,
sensing and aggregation
 three functionalities at the same time on a node
might quickly drain the energy of that node.
 Combining these capabilities on one node raises a
challenge for routing protocols.
 For example, hierarchical protocols designate a
cluster head node
Routing challenges and design
issues
9
 Fault tolerance
 The failure of sensor nodes should not affect the
overall task of the sensor network
Routing challenges and design
issues
10
Network dynamics
 Routing messages from or to moving nodes is
more challenging since route and topology
stability become important issues
 Moreover, the phenomenon can be mobile
(e.g., a target detection/ tracking application).
Routing challenges and design
issues
11
 Connectivity
High density  high connectivity
Some sensors may die after consuming their
battery power
Connectivity depends on possibly random
deployment
Routing challenges and design
issues
12
 Coverage
 An individual sensor’s view is limited
 Area coverage is an important design factor
 Data aggregation Since sensor nodes may generate
significant redundant data, similar packets from
multiple nodes can be aggregated to reduce the
number of transmissions.
 Data aggregation is the combination of data from
different sources according to a certain
aggregation function.
 Quality of Service
 Bounded delay
 Energy efficiency for longer network lifetime
13
Routing Protocols in WSNs: A
taxonomy
14
 Proactive protocols :compute all the routes before they
are really needed and then store these routes in a
routing table in each node. When a route changes, the
change has to be propagated throughout the network.
Since a WSN could consist of thousands of nodes, the
routing table that each node would have to keep could
be huge and therefore proactive protocols are not suited
to WSNs.
 Reactive protocols compute routes only when they are
needed.
 Hybrid protocols use a combination of these two ideas.
Routing protocol survey
15
 Traditional technique
 Flooding
 Gossiping
 Current routing technique
 Flat-routing
 Hierarchical-routing
 Location-based routing
[1]Ian F. Akyildiz, Weilian Su, Yogesh Sankarasubramaniam, and Erdal Cayirci Georgia Institute of Technology” A Survey on Sensor Networks” IEEE
Communications Magazine • August 2002
Flooding(1/4)
16
• Flooding is the classic approach for dissemination
without the need for any routing algorithms and
topology maintenance
• Source node sends data to all neighbors
• Receiving node stores and sends data to all its
neighbors
• Disseminate data quickly
 drawbacks:
• Implosion
• Overlap
• Resource blindness
Implosion(2/4)
1
7
Node
The direction
of data sending
The connect
between nodes
A
CB
D
x
x x
x
Overlap(3/4)
1
8
q
r
s
(q, r) (s, r)
Node
The direction
of data sending
The connect
between nodes
The searching
range of the
node
A B
C
Resource blindness(4/4)
1
9
 In flooding, nodes do not modify their activities
based on the amount of energy available to them.
 A network of embedded sensors can be
resource-aware and adapt its communication
and computation to the state of its energy
resource.
Gossiping
20
 A slightly enhanced version of flooding where
the receiving node sends the packet to a
randomly selected neighbor which picks
another neighbor to forward the packet to and
so on.
Advantage: avoid the implosion
Drawback: Transmission delay
Router protocol survey
21
 Traditional routing technique
Flooding
Gossiping
 Current routing technique[1]
Flat-routing
Hierarchical-routing
Location-based routing
[1]JAMAL N. AL-KARAKI, AHMED E. KAMAL,” ROUTING TECHNIQUES IN WIRELESS SENSOR NETWORKS: A SURVEY”,
IEEE Wireless Communications • December 2004
22
 Each node plays the same role (Each node needs to
know only its neighbors)
 Data-centric routing
In data-centric routing, the sink sends queries to certain
regions and waits for data from the sensors located in
the selected regions.
 Save energy through data negotiation and elimination of
redundant data
 Protocols
 SPIN (Sensor Protocols for Information via Negotiation)
 DD (Directed diffusion)
 Rumor routing
Flat-routing (Data centric )
Sensor protocols for information via
negotiation (SPIN)
23
 Features
 Negotiation
 Before transmitting data, nodes negotiate with each other to
overcome implosion and overlap
 Only useful information will be transferred
 Observed data must be described using a meta-data
 Resource adaptation
 Each sensor node has resource manager
 monitoring their own energy resources may reduce certain
activities when energy is low
To extend the operating lifetime of the system
 SPIN Message
 ADV – new data advertisement
 REQ – request for ADV data
 DATA – actual data message Contain actual sensor data with a
meta-data header
 ADV, REQ messages contain only meta-data
Sensor protocols for information via
negotiation (SPIN)
24
• Operation process
Step1
ADV
Step3
DATA
Step2
REQ
Step4
ADV
Step5
REQ
Step6
DATA
Sensor protocols for information via
negotiation (SPIN)
25
 Resource adaptive algorithm
 When energy is plentiful
 Communicate using the 3-stage handshake protocol
 When energy is approaching a low-energy threshold
 If a node receives ADV, it does not send out REQ
 Energy is reserved to sensing the event
 Advantage
 Each node only needs to know its one-hop neighbors
 Significantly reduce energy consumption compared to flooding
 Drawback
- If the node interested in the data are far from the source, data will not
be delivered
- Large overhead
 Data broadcasting
-cannot guarantee delivery of data.
Flat-routing
26
 SPIN (Sensor Protocols for Information via
Negotiation)
 DD (Directed diffusion)
 Rumor routing
Directed Diffusion (DD) Feature
 Data-centric routing protocol
 A path is established between sink node and source
node
 Localized interactions
 The propagation and aggregation procedures are
all based on local information
 Four elements
 Interest
 A task description which is named by a list of
attribute-value pairs that describe a task
 Gradient
 Path direction, data transmission rate
 Data message
 Reinforcement
 To select a single path from multiple paths
27
Directed Diffusion (DD)
28
 Basic scheme
SinkSource
Step 1 : Interest propagation
Interests
Event
SinkSource
Step 2 : Initial gradients setup
Gradients
Event
Low rate
SinkSource
Step 3 : Data delivery along reinforced path
Event
High rate
Directed Diffusion (DD)
29
 Advantage
 Small delay
 Always transmit the data through shortest path
 Robust to failed path
 Drawback
 Imbalance of node lifetime
 The energy of node on shortest path is drained faster than
another
 Time synchronization technique
 To implement data aggregation
 Matching data to queries might require some extra overhead
Rumor Routing
Variation of directed diffusion
 Don’t flood interests (or queries)
 Flood events when the number of events is small
but the number of queries large
 Route the query to the nodes that have observed
a particular event
 Long-lived packets, called agents(Set up path by
random walk, Aggregate paths), flood events
through the network
 When a node detects an event, it adds the event
to its events table, and generates an agent
 Agents travel the network to propagate info about
local events
 An agent is associated with TTL (Time-To-Live) 30
Rumor Routing
31
 Basic scheme
 Each node maintain
 A lists of neighbors
 An event table
 When a node detects an event
 Generate an agent
 Let it travel on a random path
 The visited node form a gradient to the
event
 When a sink needs an event
 Transmit a query
 a node knowing the route to a
corresponding event can respond by
looking up its events table
When a node receives query  checks
its table and returns source –
destination path
Rumor Routing
32
 No need for query flooding 
 Only one path between the source and sink  
 Rumor routing works well only when the number of events is
small 
 Cost of maintaining a large number of agents and large event
tables will be prohibitive 
 Heuristic for defining the route of an event agent highly affects
the performance of next-hop selection 
Router protocol survey
33
 Traditional routing technique
 Flooding
 Gossiping
 Current routing technique
 Flat-routing
 Hierarchical-routing
 Location-based routing
Hierarchical-routing
34
 LEACH (Low Energy Adaptive Clustering
Hierarchy)
 PEGASIS (Power-Efficient Gathering in Sensor
Information Systems)
 TEEN(APTEEN) (Threshold-Sensitive Energy
Efficient Protocols)
LEACH (Low Energy Clustering Hierarchy)
35
 Cluster-based protocol
 Each node randomly decides to become a cluster heads (CH)
 CH chooses the code to be used in its cluster
 CDMA between clusters
 CH broadcasts Adv; Each node decides to which cluster it belongs
based on the received signal strength of Adv
 Nodes can sleep when its not their turn to xmit
 CH compresses data received from the nodes in the cluster and
sends the aggregated data to BS
 CH is rotated randomly
LEACH
36
 Advantages
 Increases the lifetime of the network
 Even drain of energy
 Energy saving due to aggregation by CHs
 Disadvantages
 LEACH assumes all nodes can transmit with enough power
to reach BS if necessary (e.g., elected as CHs)
 Each node should support both TDMA & CDMA
 Need to do time synchronization
 Nodes use single-hop communication
Comparison between SPIN, LEACH &
Directed Diffusion
SPIN LEACH Directed
Diffusion
Optimal
Route
No No Yes
Network
Lifetime
Good Very good Good
Resource
Awareness
Yes Yes Yes
Use of
meta-data
Yes No Yes
37
Power-Efficient Gathering in Sensor
Information Systems (PEGASIS)
38
 Only one node transmits to BS
 When a node dies, the chain is reconstructed in the same
manner to bypass the dead node.
• Data aggregation in the chain  one node sends the data to
the base station
 Performance
 PEGASIS Outperforms LEACH
 By eliminating the overhead of dynamic cluster formation
 By minimizing the total sum of transmission distances
 Decrease the delay for the packets during transmission to the base
station
 Problem
 the single leader can become a bottleneck.
 Scalability problem
 Excessive delay for distant nodes in the chain
The TEEN Protocol
39
 Threshold sensitive Energy Efficient sensor Network
protocol.
 Proactive Protocols (LEACH)
 The nodes in this network periodically switch on their sensors
and transmitters, sense the environment and transmit the data
of interest.
 Reactive Protocols (TEEN)
 The nodes react immediately to sudden and drastic changes
in the value of a sensed attribute.
Multi-level hierarchical clustering in TEEN
& APTEEN
40
TEEN - Functioning
41
 the cluster-head broadcasts two thresholds to
its members:
 Hard Threshold (HT)
 This is a threshold value for the sensed attribute.
 It is the absolute value of the attribute beyond which, the
node sensing this value must switch on its transmitter and
report to its cluster head.
 Soft Threshold (ST)
 This is a small change in the value of the sensed attribute
which triggers the node to switch on its transmitter and
transmit.
TEEN - Hard Threshold
42
 The first time a parameter from the attribute set
reaches its hard threshold value, the node
switches on its transmitter and sends the sensed
data.
 The sensed value is stored in an internal variable
in the node, called the sensed value (SV).
TEEN - Soft Threshold
43
 The nodes will next transmit data in the current
cluster period, only when both the following
conditions are true:
 The current value of the sensed attribute is greater
than the hard threshold.
 The current value of the sensed attribute differs
from SV by an amount equal to or greater than the
soft threshold.
TEEN
44
Good for time-critical applications 
If the thresholds are not reached, the user will
not get any data from the network at all and
will not come to know even if all the nodes die.

This scheme practical implementation would
have to ensure that there are no collisions in
the cluster. 
APTEEN (Adaptive Threshold sensitive
Energy Efficient Network protocol)
45
 APTEEN has been proposed just as an improvement
to TEEN in order to overcome its limitations and
shortcomings.
 APTEEN guarantees lower energy dissipation and a
helps in ensuring a larger number of sensors alive.
 Compared to LEACH, TEEN & APTEEN consumes
less energy (TEEN consumes the least)
 Network lifetime: TEEN ≥ APTEEN ≥ LEACH
Router protocol survey
46
 Traditional routing technique
Flooding
Gossiping
 Current routing technique
Flat-routing
Hierarchical-routing
Location-based routing
Location-based routing
47
 GEAR (Geographic and Energy Aware Routing)
Geographic and Energy Aware Routing
48
Geographic and Energy Aware Routing
 Routing based on a cost function depending on the
distance to the target and the remaining energy.
 A node N receive from a neighbor Ni its cost function
and then updates its own cost function:
H(N,T) = H( Ni , T) + C(N , Ni)
 If no cost function received from the node, then
compute a default cost function:C(N,T)= αd(N,T) + (1- α) Er
Geographic and Energy Aware
Routing
49
 Suppose α = 1
 S is sending a packet to T
 C is the closer neighbor to
T
 S receive new learned cost
function from C.
 Now, B’s cost function is
less than C
T
B C
S
S Sends the packet
through C
 Next packet will be sent
through B
Routing Protocols Based on Protocol
Operation
50
 Multipath Routing Protocols
 Query-Based Routing
 Negotiation-Based Routing Protocols
 QoS-based Routing
 Coherent and Noncoherent Processing
Multipath Routing Protocols
51
 Use multiple paths in order to enhance network
performance
Fault tolerance
Balance energy consumption
Energy-efficient
Reliability
Query-Based Routing
52
Destination nodes propagate a query for data
Usually theses queries are described in
natural language or high-level query language
E.g.
Directed diffusion
Rumor routing protocol
Negotiation-Based Routing Protocols
53
Use high-level data descriptors in order to
eliminate redundant data transmissions
through negotiation
Communication decisions are also made
based on the resources available to them
 E.g.
 SPIN
QoS-based Routing
54
 Has to balance between energy consumption and
data quality
 E.g.
 SPEED (congestion avoidance)
Conclusion
55
 based on the network structure divide three
categories: flat, hierarchical, and location-based
routing protocols.
 The advantages and disadvantages of each
routing technique
 In general hierarchical routing are outperform
than flat routing
reference
56
 I. Akyildiz et al., “A Survey on Sensor Networks,” IEEE Commun.
Mag., vol. 40, no. 8, Aug. 2002, pp. 102–14.
 W. Heinzelman, A. Chandrakasan and H. Balakrishnan,“Energy-
Efficient Communication Protocol for Wireless Microsensor
Networks,” Proc. 33rd Hawaii Int’l. Conf. Sys. Sci., Jan. 2000.
 F. Ye et al., “A Two-Tier Data Dissemination Model for Large-
Scale Wireless S. Hedetniemi and A. Liestman, “A Survey of
Gossiping and broadcasting in Communication Networks,” IEEE
Network, vol. 18, no. 4, 1988, pp. 319–49.
reference
57
 C. Intanagonwiwat, R. Govindan, and D. Estrin, “Directed
Diffusion: a Scalable and Robust Communication Paradigm
for Sensor Networks,” Proc. ACM Mobi- Com 2000, Boston,
MA, 2000, pp. 56–67.
 D. Braginsky and D. Estrin, “Rumor Routing Algorithm for
Sensor Networks,” Proc. 1st Wksp. Sensor Networks and
Apps., Atlanta, GA, Oct. 2002.
 C. Schurgers and M.B. Srivastava, “Energy Efficient Routing
in Wireless Sensor Networks,” MILCOM Proc. Commun. for
Network-Centric Ops.: Creating the Info. Force, McLean, VA,
2001.
 M. Chu, H. Haussecker, and F. Zhao, “Scalable Information
Driven Sensor Querying and Routing for Ad Hoc
Heterogeneous Sensor Networks,” Int’l. J. High Perf. Comp.
Apps., vol. 16, no. 3, Aug. 2002.

More Related Content

What's hot

Routing protocols in ad hoc network
Routing protocols in ad hoc networkRouting protocols in ad hoc network
Routing protocols in ad hoc network
NIIS Institute of Business Management, Bhubaneswar
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks
DEBABRATASINGH3
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
Murtadha Alsabbagh
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
Darpan Dekivadiya
 
clustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHclustering protocol in WSN:LEACH
clustering protocol in WSN:LEACH
Jimit Rupani
 
Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02
Ali Habeeb
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocols
Darwin Nesakumar
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
ArunChokkalingam
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
Sayed Chhattan Shah
 
Leach protocol
Leach protocolLeach protocol
Data retrieval in sensor networks
Data retrieval in sensor networksData retrieval in sensor networks
Data retrieval in sensor networks
Acad
 
Energy efficient routing protocol
Energy efficient routing protocolEnergy efficient routing protocol
Energy efficient routing protocol
NIIS Institute of Business Management, Bhubaneswar
 
The cellular concept
The cellular conceptThe cellular concept
The cellular concept
ZunAib Ali
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
DeepaDasarathan
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
Divya Tiwari
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
A. Shamel
 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocols
Darwin Nesakumar
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
Chandra Meena
 
MIMO in 15 minutes
MIMO in 15 minutesMIMO in 15 minutes
MIMO in 15 minutes
Chaitanya Tata, PMP
 
MANET routing protocols Issues and Classifications
 MANET routing protocols Issues and Classifications MANET routing protocols Issues and Classifications
MANET routing protocols Issues and Classifications
ArunChokkalingam
 

What's hot (20)

Routing protocols in ad hoc network
Routing protocols in ad hoc networkRouting protocols in ad hoc network
Routing protocols in ad hoc network
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
clustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHclustering protocol in WSN:LEACH
clustering protocol in WSN:LEACH
 
Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocols
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
Leach protocol
Leach protocolLeach protocol
Leach protocol
 
Data retrieval in sensor networks
Data retrieval in sensor networksData retrieval in sensor networks
Data retrieval in sensor networks
 
Energy efficient routing protocol
Energy efficient routing protocolEnergy efficient routing protocol
Energy efficient routing protocol
 
The cellular concept
The cellular conceptThe cellular concept
The cellular concept
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocols
 
Lecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocolsLecture 9 10 .mobile ad-hoc routing protocols
Lecture 9 10 .mobile ad-hoc routing protocols
 
MIMO in 15 minutes
MIMO in 15 minutesMIMO in 15 minutes
MIMO in 15 minutes
 
MANET routing protocols Issues and Classifications
 MANET routing protocols Issues and Classifications MANET routing protocols Issues and Classifications
MANET routing protocols Issues and Classifications
 

Viewers also liked

Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
shashankcsnits
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
rajivagarwal23dei
 
Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2
Rushin Shah
 
Research Issues on WSN
Research Issues on WSNResearch Issues on WSN
Research Issues on WSN
Kathirvel Ayyaswamy
 
Tổng quan,ứng dụng mạng cảm biến không dây
Tổng quan,ứng dụng mạng cảm biến không dâyTổng quan,ứng dụng mạng cảm biến không dây
Tổng quan,ứng dụng mạng cảm biến không dâyTien Quan
 
Presentation1
Presentation1Presentation1
Presentation1
Rajat Soni
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Ali Habeeb
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
Nishant Bhardwaj
 

Viewers also liked (8)

Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2
 
Research Issues on WSN
Research Issues on WSNResearch Issues on WSN
Research Issues on WSN
 
Tổng quan,ứng dụng mạng cảm biến không dây
Tổng quan,ứng dụng mạng cảm biến không dâyTổng quan,ứng dụng mạng cảm biến không dây
Tổng quan,ứng dụng mạng cảm biến không dây
 
Presentation1
Presentation1Presentation1
Presentation1
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 

Similar to Routing

WSN_Chapter 4 Routing Protocols-I.pptx
WSN_Chapter 4 Routing Protocols-I.pptxWSN_Chapter 4 Routing Protocols-I.pptx
WSN_Chapter 4 Routing Protocols-I.pptx
RamprakashSingaravel1
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
Virendra Thakur
 
A review of routing protocols in wsn
A review of routing protocols in wsnA review of routing protocols in wsn
A review of routing protocols in wsn
Ayman Adel
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
IJET - International Journal of Engineering and Techniques
 
3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx
MohitKumarSingh71
 
Energy efficient neighbour selection for flat wireless sensor networks
Energy efficient neighbour selection for flat wireless sensor networksEnergy efficient neighbour selection for flat wireless sensor networks
Energy efficient neighbour selection for flat wireless sensor networks
csandit
 
Thesis-Final-slide
Thesis-Final-slideThesis-Final-slide
Thesis-Final-slide
Mahmuda Rahman
 
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKIMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
Editor IJMTER
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
ijsrd.com
 
kuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptxkuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptx
IrawanAbiyantoro1
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
pijans
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor Networks
Editor IJCATR
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor Networks
Editor IJCATR
 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
IRJET Journal
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
ijwmn
 
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
ijasuc
 
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
ijasuc
 
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
ijasuc
 
Rmdtn ppt
Rmdtn pptRmdtn ppt
Rmdtn ppt
varsha mohite
 

Similar to Routing (20)

WSN_Chapter 4 Routing Protocols-I.pptx
WSN_Chapter 4 Routing Protocols-I.pptxWSN_Chapter 4 Routing Protocols-I.pptx
WSN_Chapter 4 Routing Protocols-I.pptx
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
A review of routing protocols in wsn
A review of routing protocols in wsnA review of routing protocols in wsn
A review of routing protocols in wsn
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
 
3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx
 
Energy efficient neighbour selection for flat wireless sensor networks
Energy efficient neighbour selection for flat wireless sensor networksEnergy efficient neighbour selection for flat wireless sensor networks
Energy efficient neighbour selection for flat wireless sensor networks
 
Thesis-Final-slide
Thesis-Final-slideThesis-Final-slide
Thesis-Final-slide
 
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKIMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
 
kuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptxkuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptx
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor Networks
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor Networks
 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
 
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
 
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
 
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
 
Rmdtn ppt
Rmdtn pptRmdtn ppt
Rmdtn ppt
 

More from ahmad abdelhafeez

Surveying cross layer protocols in ws ns
Surveying cross layer protocols in ws nsSurveying cross layer protocols in ws ns
Surveying cross layer protocols in ws ns
ahmad abdelhafeez
 
Service level management
Service level managementService level management
Service level management
ahmad abdelhafeez
 
Energy harvesting sensor nodes
Energy harvesting sensor nodes   Energy harvesting sensor nodes
Energy harvesting sensor nodes
ahmad abdelhafeez
 
V5I3_IJERTV5IS031157
V5I3_IJERTV5IS031157V5I3_IJERTV5IS031157
V5I3_IJERTV5IS031157
ahmad abdelhafeez
 
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
ahmad abdelhafeez
 
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
ahmad abdelhafeez
 
Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networks
ahmad abdelhafeez
 
Localization in wsn
Localization in wsnLocalization in wsn
Localization in wsn
ahmad abdelhafeez
 
Wsn security issues
Wsn security issuesWsn security issues
Wsn security issues
ahmad abdelhafeez
 
Trusted systems
Trusted systemsTrusted systems
Trusted systems
ahmad abdelhafeez
 
opnet
opnetopnet
Wsn security issues
Wsn security issuesWsn security issues
Wsn security issues
ahmad abdelhafeez
 
Sdn pres v2-Software-defined networks
Sdn pres v2-Software-defined networksSdn pres v2-Software-defined networks
Sdn pres v2-Software-defined networks
ahmad abdelhafeez
 
Intrusion prevension
Intrusion prevensionIntrusion prevension
Intrusion prevension
ahmad abdelhafeez
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emam
ahmad abdelhafeez
 
Digital forensics.abdallah
Digital forensics.abdallahDigital forensics.abdallah
Digital forensics.abdallah
ahmad abdelhafeez
 
Cloud computing final show
Cloud computing final   showCloud computing final   show
Cloud computing final show
ahmad abdelhafeez
 
Incident handling.final
Incident handling.finalIncident handling.final
Incident handling.final
ahmad abdelhafeez
 
Malewareanalysis presentation
Malewareanalysis presentationMalewareanalysis presentation
Malewareanalysis presentation
ahmad abdelhafeez
 
pentration testing
pentration testingpentration testing
pentration testing
ahmad abdelhafeez
 

More from ahmad abdelhafeez (20)

Surveying cross layer protocols in ws ns
Surveying cross layer protocols in ws nsSurveying cross layer protocols in ws ns
Surveying cross layer protocols in ws ns
 
Service level management
Service level managementService level management
Service level management
 
Energy harvesting sensor nodes
Energy harvesting sensor nodes   Energy harvesting sensor nodes
Energy harvesting sensor nodes
 
V5I3_IJERTV5IS031157
V5I3_IJERTV5IS031157V5I3_IJERTV5IS031157
V5I3_IJERTV5IS031157
 
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
 
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
 
Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networks
 
Localization in wsn
Localization in wsnLocalization in wsn
Localization in wsn
 
Wsn security issues
Wsn security issuesWsn security issues
Wsn security issues
 
Trusted systems
Trusted systemsTrusted systems
Trusted systems
 
opnet
opnetopnet
opnet
 
Wsn security issues
Wsn security issuesWsn security issues
Wsn security issues
 
Sdn pres v2-Software-defined networks
Sdn pres v2-Software-defined networksSdn pres v2-Software-defined networks
Sdn pres v2-Software-defined networks
 
Intrusion prevension
Intrusion prevensionIntrusion prevension
Intrusion prevension
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emam
 
Digital forensics.abdallah
Digital forensics.abdallahDigital forensics.abdallah
Digital forensics.abdallah
 
Cloud computing final show
Cloud computing final   showCloud computing final   show
Cloud computing final show
 
Incident handling.final
Incident handling.finalIncident handling.final
Incident handling.final
 
Malewareanalysis presentation
Malewareanalysis presentationMalewareanalysis presentation
Malewareanalysis presentation
 
pentration testing
pentration testingpentration testing
pentration testing
 

Recently uploaded

Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
Prakhyath Rai
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
Mahmoud Morsy
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
PKavitha10
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
TaghreedAltamimi
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
shadow0702a
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
GauravCar
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
21UME003TUSHARDEB
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
ElakkiaU
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
ecqow
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
Data Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptxData Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptx
ramrag33
 

Recently uploaded (20)

Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...Software Engineering and Project Management - Introduction, Modeling Concepts...
Software Engineering and Project Management - Introduction, Modeling Concepts...
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Mechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdfMechanical Engineering on AAI Summer Training Report-003.pdf
Mechanical Engineering on AAI Summer Training Report-003.pdf
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
An Introduction to the Compiler Designss
An Introduction to the Compiler DesignssAn Introduction to the Compiler Designss
An Introduction to the Compiler Designss
 
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
一比一原版(CalArts毕业证)加利福尼亚艺术学院毕业证如何办理
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
Data Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptxData Control Language.pptx Data Control Language.pptx
Data Control Language.pptx Data Control Language.pptx
 

Routing

  • 1. Mona mohamed ragheb Routing protocols in WSN
  • 2. Agenda 2  Introduction  Routing challenges in WSN  Flat Routing  Hierarchical Routing  Location-based Routing  Routing Protocols Based on Protocol Operation  some Routing protocols  Conclusion  References
  • 3. 3  Routing is a process of selecting paths in a network along which to send data traffic  First, it is not possible to build a global addressing scheme for a large number of sensor nodes. Thus, traditional IP-based protocols may not be applied to WSNs. In WSNs, sometimes getting the data is more important than knowing the IDs of which nodes sent the data.  Second, in contrast to typical communication networks, almost all applications of sensor networks require the flow of sensed data from multiple sources to a particular Introduction
  • 4. 4  Routing protocols in WSNs Differ depending on the application and network architecture  sensor nodes are tightly constrained in terms of energy, processing, and storage capacities. Thus, they require carefully resource management.  position awareness of sensor nodes is important since data collection is normally based on the location.  data collected by many sensors in WSNs is typically based on common phenomena, hence there is a high probability that this data has some redundancy  Trade-offs between energy and communication overhead savings
  • 5. Routing challenges and design issues 5  Node deployment  Energy consumption without losing accuracy  Data reporting method  Node/link heterogeneity  Scalability  Data aggregation  Quality of service
  • 6. Routing challenges and design issues 6  Node deployment  Manual deployment  Sensors are manually deployed  Data is routed through predetermined path  Random deployment  Optimal clustering is necessary to allow connectivity & energy-efficiency  Multi-hop routing
  • 7. Routing challenges and design issues 7  Data reporting method Application-specific: • Time-driven: Periodic monitoring • Event-driven: Respond to sudden changes • Query-driven: Respond to queries • Hybrid (combination of delivery models)
  • 8. Routing challenges and design issues 8  Node/link heterogeneity  Depending on the application, a sensor node can have a different role or capability such as relaying, sensing and aggregation  three functionalities at the same time on a node might quickly drain the energy of that node.  Combining these capabilities on one node raises a challenge for routing protocols.  For example, hierarchical protocols designate a cluster head node
  • 9. Routing challenges and design issues 9  Fault tolerance  The failure of sensor nodes should not affect the overall task of the sensor network
  • 10. Routing challenges and design issues 10 Network dynamics  Routing messages from or to moving nodes is more challenging since route and topology stability become important issues  Moreover, the phenomenon can be mobile (e.g., a target detection/ tracking application).
  • 11. Routing challenges and design issues 11  Connectivity High density  high connectivity Some sensors may die after consuming their battery power Connectivity depends on possibly random deployment
  • 12. Routing challenges and design issues 12  Coverage  An individual sensor’s view is limited  Area coverage is an important design factor  Data aggregation Since sensor nodes may generate significant redundant data, similar packets from multiple nodes can be aggregated to reduce the number of transmissions.  Data aggregation is the combination of data from different sources according to a certain aggregation function.  Quality of Service  Bounded delay  Energy efficiency for longer network lifetime
  • 13. 13 Routing Protocols in WSNs: A taxonomy
  • 14. 14  Proactive protocols :compute all the routes before they are really needed and then store these routes in a routing table in each node. When a route changes, the change has to be propagated throughout the network. Since a WSN could consist of thousands of nodes, the routing table that each node would have to keep could be huge and therefore proactive protocols are not suited to WSNs.  Reactive protocols compute routes only when they are needed.  Hybrid protocols use a combination of these two ideas.
  • 15. Routing protocol survey 15  Traditional technique  Flooding  Gossiping  Current routing technique  Flat-routing  Hierarchical-routing  Location-based routing [1]Ian F. Akyildiz, Weilian Su, Yogesh Sankarasubramaniam, and Erdal Cayirci Georgia Institute of Technology” A Survey on Sensor Networks” IEEE Communications Magazine • August 2002
  • 16. Flooding(1/4) 16 • Flooding is the classic approach for dissemination without the need for any routing algorithms and topology maintenance • Source node sends data to all neighbors • Receiving node stores and sends data to all its neighbors • Disseminate data quickly  drawbacks: • Implosion • Overlap • Resource blindness
  • 17. Implosion(2/4) 1 7 Node The direction of data sending The connect between nodes A CB D x x x x
  • 18. Overlap(3/4) 1 8 q r s (q, r) (s, r) Node The direction of data sending The connect between nodes The searching range of the node A B C
  • 19. Resource blindness(4/4) 1 9  In flooding, nodes do not modify their activities based on the amount of energy available to them.  A network of embedded sensors can be resource-aware and adapt its communication and computation to the state of its energy resource.
  • 20. Gossiping 20  A slightly enhanced version of flooding where the receiving node sends the packet to a randomly selected neighbor which picks another neighbor to forward the packet to and so on. Advantage: avoid the implosion Drawback: Transmission delay
  • 21. Router protocol survey 21  Traditional routing technique Flooding Gossiping  Current routing technique[1] Flat-routing Hierarchical-routing Location-based routing [1]JAMAL N. AL-KARAKI, AHMED E. KAMAL,” ROUTING TECHNIQUES IN WIRELESS SENSOR NETWORKS: A SURVEY”, IEEE Wireless Communications • December 2004
  • 22. 22  Each node plays the same role (Each node needs to know only its neighbors)  Data-centric routing In data-centric routing, the sink sends queries to certain regions and waits for data from the sensors located in the selected regions.  Save energy through data negotiation and elimination of redundant data  Protocols  SPIN (Sensor Protocols for Information via Negotiation)  DD (Directed diffusion)  Rumor routing Flat-routing (Data centric )
  • 23. Sensor protocols for information via negotiation (SPIN) 23  Features  Negotiation  Before transmitting data, nodes negotiate with each other to overcome implosion and overlap  Only useful information will be transferred  Observed data must be described using a meta-data  Resource adaptation  Each sensor node has resource manager  monitoring their own energy resources may reduce certain activities when energy is low To extend the operating lifetime of the system  SPIN Message  ADV – new data advertisement  REQ – request for ADV data  DATA – actual data message Contain actual sensor data with a meta-data header  ADV, REQ messages contain only meta-data
  • 24. Sensor protocols for information via negotiation (SPIN) 24 • Operation process Step1 ADV Step3 DATA Step2 REQ Step4 ADV Step5 REQ Step6 DATA
  • 25. Sensor protocols for information via negotiation (SPIN) 25  Resource adaptive algorithm  When energy is plentiful  Communicate using the 3-stage handshake protocol  When energy is approaching a low-energy threshold  If a node receives ADV, it does not send out REQ  Energy is reserved to sensing the event  Advantage  Each node only needs to know its one-hop neighbors  Significantly reduce energy consumption compared to flooding  Drawback - If the node interested in the data are far from the source, data will not be delivered - Large overhead  Data broadcasting -cannot guarantee delivery of data.
  • 26. Flat-routing 26  SPIN (Sensor Protocols for Information via Negotiation)  DD (Directed diffusion)  Rumor routing
  • 27. Directed Diffusion (DD) Feature  Data-centric routing protocol  A path is established between sink node and source node  Localized interactions  The propagation and aggregation procedures are all based on local information  Four elements  Interest  A task description which is named by a list of attribute-value pairs that describe a task  Gradient  Path direction, data transmission rate  Data message  Reinforcement  To select a single path from multiple paths 27
  • 28. Directed Diffusion (DD) 28  Basic scheme SinkSource Step 1 : Interest propagation Interests Event SinkSource Step 2 : Initial gradients setup Gradients Event Low rate SinkSource Step 3 : Data delivery along reinforced path Event High rate
  • 29. Directed Diffusion (DD) 29  Advantage  Small delay  Always transmit the data through shortest path  Robust to failed path  Drawback  Imbalance of node lifetime  The energy of node on shortest path is drained faster than another  Time synchronization technique  To implement data aggregation  Matching data to queries might require some extra overhead
  • 30. Rumor Routing Variation of directed diffusion  Don’t flood interests (or queries)  Flood events when the number of events is small but the number of queries large  Route the query to the nodes that have observed a particular event  Long-lived packets, called agents(Set up path by random walk, Aggregate paths), flood events through the network  When a node detects an event, it adds the event to its events table, and generates an agent  Agents travel the network to propagate info about local events  An agent is associated with TTL (Time-To-Live) 30
  • 31. Rumor Routing 31  Basic scheme  Each node maintain  A lists of neighbors  An event table  When a node detects an event  Generate an agent  Let it travel on a random path  The visited node form a gradient to the event  When a sink needs an event  Transmit a query  a node knowing the route to a corresponding event can respond by looking up its events table When a node receives query  checks its table and returns source – destination path
  • 32. Rumor Routing 32  No need for query flooding   Only one path between the source and sink    Rumor routing works well only when the number of events is small   Cost of maintaining a large number of agents and large event tables will be prohibitive   Heuristic for defining the route of an event agent highly affects the performance of next-hop selection 
  • 33. Router protocol survey 33  Traditional routing technique  Flooding  Gossiping  Current routing technique  Flat-routing  Hierarchical-routing  Location-based routing
  • 34. Hierarchical-routing 34  LEACH (Low Energy Adaptive Clustering Hierarchy)  PEGASIS (Power-Efficient Gathering in Sensor Information Systems)  TEEN(APTEEN) (Threshold-Sensitive Energy Efficient Protocols)
  • 35. LEACH (Low Energy Clustering Hierarchy) 35  Cluster-based protocol  Each node randomly decides to become a cluster heads (CH)  CH chooses the code to be used in its cluster  CDMA between clusters  CH broadcasts Adv; Each node decides to which cluster it belongs based on the received signal strength of Adv  Nodes can sleep when its not their turn to xmit  CH compresses data received from the nodes in the cluster and sends the aggregated data to BS  CH is rotated randomly
  • 36. LEACH 36  Advantages  Increases the lifetime of the network  Even drain of energy  Energy saving due to aggregation by CHs  Disadvantages  LEACH assumes all nodes can transmit with enough power to reach BS if necessary (e.g., elected as CHs)  Each node should support both TDMA & CDMA  Need to do time synchronization  Nodes use single-hop communication
  • 37. Comparison between SPIN, LEACH & Directed Diffusion SPIN LEACH Directed Diffusion Optimal Route No No Yes Network Lifetime Good Very good Good Resource Awareness Yes Yes Yes Use of meta-data Yes No Yes 37
  • 38. Power-Efficient Gathering in Sensor Information Systems (PEGASIS) 38  Only one node transmits to BS  When a node dies, the chain is reconstructed in the same manner to bypass the dead node. • Data aggregation in the chain  one node sends the data to the base station  Performance  PEGASIS Outperforms LEACH  By eliminating the overhead of dynamic cluster formation  By minimizing the total sum of transmission distances  Decrease the delay for the packets during transmission to the base station  Problem  the single leader can become a bottleneck.  Scalability problem  Excessive delay for distant nodes in the chain
  • 39. The TEEN Protocol 39  Threshold sensitive Energy Efficient sensor Network protocol.  Proactive Protocols (LEACH)  The nodes in this network periodically switch on their sensors and transmitters, sense the environment and transmit the data of interest.  Reactive Protocols (TEEN)  The nodes react immediately to sudden and drastic changes in the value of a sensed attribute.
  • 40. Multi-level hierarchical clustering in TEEN & APTEEN 40
  • 41. TEEN - Functioning 41  the cluster-head broadcasts two thresholds to its members:  Hard Threshold (HT)  This is a threshold value for the sensed attribute.  It is the absolute value of the attribute beyond which, the node sensing this value must switch on its transmitter and report to its cluster head.  Soft Threshold (ST)  This is a small change in the value of the sensed attribute which triggers the node to switch on its transmitter and transmit.
  • 42. TEEN - Hard Threshold 42  The first time a parameter from the attribute set reaches its hard threshold value, the node switches on its transmitter and sends the sensed data.  The sensed value is stored in an internal variable in the node, called the sensed value (SV).
  • 43. TEEN - Soft Threshold 43  The nodes will next transmit data in the current cluster period, only when both the following conditions are true:  The current value of the sensed attribute is greater than the hard threshold.  The current value of the sensed attribute differs from SV by an amount equal to or greater than the soft threshold.
  • 44. TEEN 44 Good for time-critical applications  If the thresholds are not reached, the user will not get any data from the network at all and will not come to know even if all the nodes die.  This scheme practical implementation would have to ensure that there are no collisions in the cluster. 
  • 45. APTEEN (Adaptive Threshold sensitive Energy Efficient Network protocol) 45  APTEEN has been proposed just as an improvement to TEEN in order to overcome its limitations and shortcomings.  APTEEN guarantees lower energy dissipation and a helps in ensuring a larger number of sensors alive.  Compared to LEACH, TEEN & APTEEN consumes less energy (TEEN consumes the least)  Network lifetime: TEEN ≥ APTEEN ≥ LEACH
  • 46. Router protocol survey 46  Traditional routing technique Flooding Gossiping  Current routing technique Flat-routing Hierarchical-routing Location-based routing
  • 47. Location-based routing 47  GEAR (Geographic and Energy Aware Routing)
  • 48. Geographic and Energy Aware Routing 48 Geographic and Energy Aware Routing  Routing based on a cost function depending on the distance to the target and the remaining energy.  A node N receive from a neighbor Ni its cost function and then updates its own cost function: H(N,T) = H( Ni , T) + C(N , Ni)  If no cost function received from the node, then compute a default cost function:C(N,T)= αd(N,T) + (1- α) Er
  • 49. Geographic and Energy Aware Routing 49  Suppose α = 1  S is sending a packet to T  C is the closer neighbor to T  S receive new learned cost function from C.  Now, B’s cost function is less than C T B C S S Sends the packet through C  Next packet will be sent through B
  • 50. Routing Protocols Based on Protocol Operation 50  Multipath Routing Protocols  Query-Based Routing  Negotiation-Based Routing Protocols  QoS-based Routing  Coherent and Noncoherent Processing
  • 51. Multipath Routing Protocols 51  Use multiple paths in order to enhance network performance Fault tolerance Balance energy consumption Energy-efficient Reliability
  • 52. Query-Based Routing 52 Destination nodes propagate a query for data Usually theses queries are described in natural language or high-level query language E.g. Directed diffusion Rumor routing protocol
  • 53. Negotiation-Based Routing Protocols 53 Use high-level data descriptors in order to eliminate redundant data transmissions through negotiation Communication decisions are also made based on the resources available to them  E.g.  SPIN
  • 54. QoS-based Routing 54  Has to balance between energy consumption and data quality  E.g.  SPEED (congestion avoidance)
  • 55. Conclusion 55  based on the network structure divide three categories: flat, hierarchical, and location-based routing protocols.  The advantages and disadvantages of each routing technique  In general hierarchical routing are outperform than flat routing
  • 56. reference 56  I. Akyildiz et al., “A Survey on Sensor Networks,” IEEE Commun. Mag., vol. 40, no. 8, Aug. 2002, pp. 102–14.  W. Heinzelman, A. Chandrakasan and H. Balakrishnan,“Energy- Efficient Communication Protocol for Wireless Microsensor Networks,” Proc. 33rd Hawaii Int’l. Conf. Sys. Sci., Jan. 2000.  F. Ye et al., “A Two-Tier Data Dissemination Model for Large- Scale Wireless S. Hedetniemi and A. Liestman, “A Survey of Gossiping and broadcasting in Communication Networks,” IEEE Network, vol. 18, no. 4, 1988, pp. 319–49.
  • 57. reference 57  C. Intanagonwiwat, R. Govindan, and D. Estrin, “Directed Diffusion: a Scalable and Robust Communication Paradigm for Sensor Networks,” Proc. ACM Mobi- Com 2000, Boston, MA, 2000, pp. 56–67.  D. Braginsky and D. Estrin, “Rumor Routing Algorithm for Sensor Networks,” Proc. 1st Wksp. Sensor Networks and Apps., Atlanta, GA, Oct. 2002.  C. Schurgers and M.B. Srivastava, “Energy Efficient Routing in Wireless Sensor Networks,” MILCOM Proc. Commun. for Network-Centric Ops.: Creating the Info. Force, McLean, VA, 2001.  M. Chu, H. Haussecker, and F. Zhao, “Scalable Information Driven Sensor Querying and Routing for Ad Hoc Heterogeneous Sensor Networks,” Int’l. J. High Perf. Comp. Apps., vol. 16, no. 3, Aug. 2002.