SlideShare a Scribd company logo
ROUTING IN
SENSOR NETWORKS
TEAM MEMBERS:
PALLAVI MEHARIA
AARTHI RAGHAVENDRA
ABHYUDAYA UPADHAYAY
OUTLINE
 Introduction
 Challenges and Design issues
 LEACH
 Rumor Routing
 Conclusion
Introduction
 Routing protocols differ in WSN based on the application and network
architecture.
 Based on the network structure, routing protocols are classified into three:
 Flat Routing – Same role is assigned to all the nodes
 Hierarchical Routing – Different roles are assigned to nodes
 Location based Routing – Position of the nodes are exploited to route
the data.
 Further classified into multipath-based, query-based, negotiation-based,
QoS-based, and coherent-based depending on the protocol operation.
 Trade off exists between energy consumption and communication
overhead.
Challenges and design issues
 Node deployment
 Manual Deployment
 Random Deployment
 Data routing methods
 Application-specific
 Time-driven: Periodic monitoring
 Event-driven: Respond to sudden changes
 Query-driven: Respond to queries
 Hybrid
Challenges and design issues
 Node link/ heterogeneity
 Homogeneous sensors
 Heterogeneous sensors
 Fault tolerance
 Transmission media
 Connectivity
 Coverage
 Data aggregation
 Quality of Service
Leach - Low Energy Adaptive Clustering
Hierarchy
 It is a hierarchical routing protocol that
suggests both hierarchical and
centralized schemes.
 Self-Organizing, adaptive clustering
protocol.
 Minimal setup time, even distribution of
energy load among the sensors thus
enhancing the lifetime of the network.
 Dynamic cluster formation.
 Randomized rotation of cluster heads
after each round.
 Cluster-heads communicate data with
the base station.
 Application-specific data processing,
such as data aggregation.
leach
 Each LEACH round consists of two phases:
 Set-up Phase
 Cluster head selection
 Cluster formation
 Steady-State Phase
 Cluster head maintenance
 Data transmission between nodes
Leach – Set up phase
 At the beginning of each round, each node advertises it probability to be the
Cluster Head, to all other nodes.
 Probability for each node i to be the Cluster-head at time t
where Ci(t) = determines whether node i has been a Cluster head in the most
recent rounds
 Higher the probability better are the chances to be chosen as the Cluster Head.
Leach – Set up phase
 Cluster Head broadcasts an advertisement message (ADV) using CSMA
MAC protocol.
 Based on the received signal strength of the ADV message, each non-
cluster head node decides its Cluster Head for that round.
 Each node transmits a join-request message (Join-REQ) back to its chosen
Cluster Head.
 Cluster Head node sets up the TDMA schedule for coordinating data
transmission with the cluster.
 Using TDMA schedule has two advantages:
 Avoid collision of data packets from different nodes within a cluster.
 Conserve energy in the non-cluster head nodes.
Leach – steady state phase
 Node uses the time slot assigned to it to transfer data to the cluster head.
 Cluster head aggregates the data received from all the nodes of the
cluster.
 Communication is via direct-sequence spread spectrum (DSSS) and each
cluster uses a unique spreading code to reduce inter-cluster interference.
 Intra-cluster communication uses TDMA and Inter-cluster communication
uses CDMA.
Rumor routing
 It is a flat routing protocol.
 Ensures network longevity, robustness in handling node failures.
 Intended to fill the region between query flooding and event
flooding.
 Transmits data packets through random paths rather than shortest
path.
 Event – Abstraction of a localized phenomena occurring in a fixed
region of space.
 Query – Information of interest to be retrieved.
Rumor routing
 Each node maintains a list of neighbors and its event table.
 When a node witnesses an event, it adds it to its event table with
distance zero and generates an agent simultaneously.
 An agent is a long-lived packet, which travels the network,
propagating information about local events to distant nodes.
 Any node can generate a query, then forward the query in a
random direction to find the path. The query keep going until its TTL
expires or it intersects with the agent path leading it to the
destination event.
 If the node that originated the query determines the query died, it
can retransmit, give up or flood the query.
Rumor routing
 Basic scheme
 Each node maintain
 A lists of neighbors
 An event table
 When a node detects an event
 Generate an agent
 Let it travel on a random path
 The visited node form a gradient to
the event
 When a sink needs an event
 Transmit a query
 The query meets some node which
lies on the gradient
 Route establishment
Agent
• Set up path by
random walk.
• Aggregate paths.
• Optimize paths in the
network.
Agent
 Each agent carries a list of all
the events it encountered
along with the number of hops
to that event.
 Each node among the path
maintains a table of events,
the number of hops to that
event and the next node in the
path toward the event.
Agent
 A straightening algorithm is used when determining the agent’s next hop
 Agent maintains a list of recently seen nodes. When it decides the next
hop, it tries the nodes not in the list. When it passes a node, the node’s
neighbors are added to the list.
 A node that witnessed an event would generate an agent at a fixed
probability in the simulation
 The future work can do better by generating agents according to
number of events, event size and node density.
 For applications where events are temporal, the event table may have
an expiration timestamp associated with each event
Query
 A query can be generated at any time by any node.
 Before reaching the path, nodes forward queries using the same
straightening algorithm – keep a list of recently seen nodes and
avoid visiting them.
 Each query has a TTL to avoid looping routes. If the query dies, the
node originating the query detects the failure and decide to
retransmit it or flood the query.
References
1. Rumor Routing Algorithm for Sensor Networks
http://research.cens.ucla.edu/people/estrin/resources/conferences/2
002sept-Brainsky-Etrin-Rumor.pdf
2. Energy- Efficient Communication Protocol for Wireless Microsensor
Networks
http://pdos.csail.mit.edu/decouto/papers/heinzelman00.pdf
3. Introduction to Wireless and Mobile Systems by Dharma Prakash
Agarwal and Qing-An Zeng.
THANK YOU !
QUERIES ?

More Related Content

What's hot

Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor Networks
Darpan Dekivadiya
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
Chandra Meena
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
Habibur Rahman
 

What's hot (20)

Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc Networks
 
Mobile Radio Propagations
Mobile Radio PropagationsMobile Radio Propagations
Mobile Radio Propagations
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Ad Hoc Wireless Network
Ad Hoc Wireless NetworkAd Hoc Wireless Network
Ad Hoc Wireless Network
 
clustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHclustering protocol in WSN:LEACH
clustering protocol in WSN:LEACH
 
Energy efficient routing protocol
Energy efficient routing protocolEnergy efficient routing protocol
Energy efficient routing protocol
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocol
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 
Thesis-Final-slide
Thesis-Final-slideThesis-Final-slide
Thesis-Final-slide
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocols
 
Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)Mobile ad hoc networks (manets)
Mobile ad hoc networks (manets)
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor Networks
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 
Routing in Mobile Ad hoc Networks
Routing in Mobile Ad hoc NetworksRouting in Mobile Ad hoc Networks
Routing in Mobile Ad hoc Networks
 
AODV routing protocol
AODV routing protocolAODV routing protocol
AODV routing protocol
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
 
Routing protocols in ad hoc network
Routing protocols in ad hoc networkRouting protocols in ad hoc network
Routing protocols in ad hoc network
 
Study of Leach Protocol- A Review
Study of Leach Protocol- A ReviewStudy of Leach Protocol- A Review
Study of Leach Protocol- A Review
 
Slide 02 - Asynchronous Transfer Mode (ATM).pdf
Slide 02 - Asynchronous Transfer Mode (ATM).pdfSlide 02 - Asynchronous Transfer Mode (ATM).pdf
Slide 02 - Asynchronous Transfer Mode (ATM).pdf
 

Viewers also liked

Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
Maha Saad
 

Viewers also liked (8)

Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor Network
 
Issues of Wireless Sensor Networks
Issues of Wireless Sensor NetworksIssues of Wireless Sensor Networks
Issues of Wireless Sensor Networks
 
Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networks
 
Chapter
ChapterChapter
Chapter
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
Power Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor NetworksPower Saving in Wireless Sensor Networks
Power Saving in Wireless Sensor Networks
 

Similar to Routing in Wireless Sensor Network

Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
IJERA Editor
 
Iaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme in
Iaetsd Iaetsd
 

Similar to Routing in Wireless Sensor Network (20)

Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkAnalysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
 
Unit8 tgb
Unit8 tgbUnit8 tgb
Unit8 tgb
 
A New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware RoutingA New Theoretical Approach to Location Based Power Aware Routing
A New Theoretical Approach to Location Based Power Aware Routing
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
Comparative Analysis of MANET Routing Protocols and Cluster Head Selection Te...
 
ROUTING STRATEGIES IN DTN
ROUTING STRATEGIES IN DTNROUTING STRATEGIES IN DTN
ROUTING STRATEGIES IN DTN
 
Network layer new
Network layer newNetwork layer new
Network layer new
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
 
Computer networks network layer,routing
Computer networks network layer,routingComputer networks network layer,routing
Computer networks network layer,routing
 
A04560105
A04560105A04560105
A04560105
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
UNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptxUNIT-3 Adhoc.pptx
UNIT-3 Adhoc.pptx
 
Iaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme in
 
Improved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDVImproved routing scheme with ACO in WSN in comparison to DSDV
Improved routing scheme with ACO in WSN in comparison to DSDV
 
Optimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack PreventionOptimised Proactive Link State Routing For DOS Attack Prevention
Optimised Proactive Link State Routing For DOS Attack Prevention
 
A novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetA novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manet
 
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANETTHE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
THE IMPACT OF NODE MISBEHAVIOR ON THE PERFORMANCE OF ROUTING PROTOCOLS IN MANET
 
Hybrid networking and distribution
Hybrid networking and distribution Hybrid networking and distribution
Hybrid networking and distribution
 
ICICCE0367
ICICCE0367ICICCE0367
ICICCE0367
 

Recently uploaded

Hall booking system project report .pdf
Hall booking system project report  .pdfHall booking system project report  .pdf
Hall booking system project report .pdf
Kamal Acharya
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Fruit shop management system project report.pdf
Fruit shop management system project report.pdfFruit shop management system project report.pdf
Fruit shop management system project report.pdf
Kamal Acharya
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 

Recently uploaded (20)

ENERGY STORAGE DEVICES INTRODUCTION UNIT-I
ENERGY STORAGE DEVICES  INTRODUCTION UNIT-IENERGY STORAGE DEVICES  INTRODUCTION UNIT-I
ENERGY STORAGE DEVICES INTRODUCTION UNIT-I
 
Hall booking system project report .pdf
Hall booking system project report  .pdfHall booking system project report  .pdf
Hall booking system project report .pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Top 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering ScientistTop 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering Scientist
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
Fruit shop management system project report.pdf
Fruit shop management system project report.pdfFruit shop management system project report.pdf
Fruit shop management system project report.pdf
 
Scaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageScaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltage
 
Online resume builder management system project report.pdf
Online resume builder management system project report.pdfOnline resume builder management system project report.pdf
Online resume builder management system project report.pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
The Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docx
The Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docxThe Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docx
The Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docx
 
Toll tax management system project report..pdf
Toll tax management system project report..pdfToll tax management system project report..pdf
Toll tax management system project report..pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Explosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdfExplosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdf
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edge2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edge
 

Routing in Wireless Sensor Network

  • 1. ROUTING IN SENSOR NETWORKS TEAM MEMBERS: PALLAVI MEHARIA AARTHI RAGHAVENDRA ABHYUDAYA UPADHAYAY
  • 2. OUTLINE  Introduction  Challenges and Design issues  LEACH  Rumor Routing  Conclusion
  • 3. Introduction  Routing protocols differ in WSN based on the application and network architecture.  Based on the network structure, routing protocols are classified into three:  Flat Routing – Same role is assigned to all the nodes  Hierarchical Routing – Different roles are assigned to nodes  Location based Routing – Position of the nodes are exploited to route the data.  Further classified into multipath-based, query-based, negotiation-based, QoS-based, and coherent-based depending on the protocol operation.  Trade off exists between energy consumption and communication overhead.
  • 4. Challenges and design issues  Node deployment  Manual Deployment  Random Deployment  Data routing methods  Application-specific  Time-driven: Periodic monitoring  Event-driven: Respond to sudden changes  Query-driven: Respond to queries  Hybrid
  • 5. Challenges and design issues  Node link/ heterogeneity  Homogeneous sensors  Heterogeneous sensors  Fault tolerance  Transmission media  Connectivity  Coverage  Data aggregation  Quality of Service
  • 6. Leach - Low Energy Adaptive Clustering Hierarchy  It is a hierarchical routing protocol that suggests both hierarchical and centralized schemes.  Self-Organizing, adaptive clustering protocol.  Minimal setup time, even distribution of energy load among the sensors thus enhancing the lifetime of the network.  Dynamic cluster formation.  Randomized rotation of cluster heads after each round.  Cluster-heads communicate data with the base station.  Application-specific data processing, such as data aggregation.
  • 7. leach  Each LEACH round consists of two phases:  Set-up Phase  Cluster head selection  Cluster formation  Steady-State Phase  Cluster head maintenance  Data transmission between nodes
  • 8. Leach – Set up phase  At the beginning of each round, each node advertises it probability to be the Cluster Head, to all other nodes.  Probability for each node i to be the Cluster-head at time t where Ci(t) = determines whether node i has been a Cluster head in the most recent rounds  Higher the probability better are the chances to be chosen as the Cluster Head.
  • 9. Leach – Set up phase  Cluster Head broadcasts an advertisement message (ADV) using CSMA MAC protocol.  Based on the received signal strength of the ADV message, each non- cluster head node decides its Cluster Head for that round.  Each node transmits a join-request message (Join-REQ) back to its chosen Cluster Head.  Cluster Head node sets up the TDMA schedule for coordinating data transmission with the cluster.  Using TDMA schedule has two advantages:  Avoid collision of data packets from different nodes within a cluster.  Conserve energy in the non-cluster head nodes.
  • 10. Leach – steady state phase  Node uses the time slot assigned to it to transfer data to the cluster head.  Cluster head aggregates the data received from all the nodes of the cluster.  Communication is via direct-sequence spread spectrum (DSSS) and each cluster uses a unique spreading code to reduce inter-cluster interference.  Intra-cluster communication uses TDMA and Inter-cluster communication uses CDMA.
  • 11. Rumor routing  It is a flat routing protocol.  Ensures network longevity, robustness in handling node failures.  Intended to fill the region between query flooding and event flooding.  Transmits data packets through random paths rather than shortest path.  Event – Abstraction of a localized phenomena occurring in a fixed region of space.  Query – Information of interest to be retrieved.
  • 12. Rumor routing  Each node maintains a list of neighbors and its event table.  When a node witnesses an event, it adds it to its event table with distance zero and generates an agent simultaneously.  An agent is a long-lived packet, which travels the network, propagating information about local events to distant nodes.  Any node can generate a query, then forward the query in a random direction to find the path. The query keep going until its TTL expires or it intersects with the agent path leading it to the destination event.  If the node that originated the query determines the query died, it can retransmit, give up or flood the query.
  • 13. Rumor routing  Basic scheme  Each node maintain  A lists of neighbors  An event table  When a node detects an event  Generate an agent  Let it travel on a random path  The visited node form a gradient to the event  When a sink needs an event  Transmit a query  The query meets some node which lies on the gradient  Route establishment
  • 14. Agent • Set up path by random walk. • Aggregate paths. • Optimize paths in the network.
  • 15. Agent  Each agent carries a list of all the events it encountered along with the number of hops to that event.  Each node among the path maintains a table of events, the number of hops to that event and the next node in the path toward the event.
  • 16. Agent  A straightening algorithm is used when determining the agent’s next hop  Agent maintains a list of recently seen nodes. When it decides the next hop, it tries the nodes not in the list. When it passes a node, the node’s neighbors are added to the list.  A node that witnessed an event would generate an agent at a fixed probability in the simulation  The future work can do better by generating agents according to number of events, event size and node density.  For applications where events are temporal, the event table may have an expiration timestamp associated with each event
  • 17. Query  A query can be generated at any time by any node.  Before reaching the path, nodes forward queries using the same straightening algorithm – keep a list of recently seen nodes and avoid visiting them.  Each query has a TTL to avoid looping routes. If the query dies, the node originating the query detects the failure and decide to retransmit it or flood the query.
  • 18. References 1. Rumor Routing Algorithm for Sensor Networks http://research.cens.ucla.edu/people/estrin/resources/conferences/2 002sept-Brainsky-Etrin-Rumor.pdf 2. Energy- Efficient Communication Protocol for Wireless Microsensor Networks http://pdos.csail.mit.edu/decouto/papers/heinzelman00.pdf 3. Introduction to Wireless and Mobile Systems by Dharma Prakash Agarwal and Qing-An Zeng.