SlideShare a Scribd company logo
Router protocol on wireless sensor network Yuping SUN  155169552@163.com SOFTWARE ENGINEERING LABORATORY Department of Computer Science, Sun Yat-Sen University
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The definition of WSN ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
the nodes of  WSN
The difference between WSN and Ad hoc (1/2)[1] ,[object Object],[object Object],[object Object],[object Object],[1]Ian F. Akyildiz, Weilian Su, Yogesh Sankarasubramaniam, and Erdal Cayirci Georgia Institute of Technology” A Survey on Sensor Networks” IEEE Communications Magazine • August 2002
The difference between WSN and Ad hoc (2/2)[1] ,[object Object],[object Object],[object Object]
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Routing protocol survey ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[1]Ian F. Akyildiz, Weilian Su, Yogesh Sankarasubramaniam, and Erdal Cayirci Georgia Institute of Technology” A Survey on Sensor Networks” IEEE Communications Magazine • August 2002
Flooding(1/2) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Flooding(2/2)
Gossiping ,[object Object],[object Object],[object Object]
Router protocol survey ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[1]JAMAL N. AL-KARAKI, AHMED E. KAMAL,”   ROUTING TECHNIQUES IN WIRELESS SENSOR NETWORKS: A SURVEY ”,  IEEE Wireless Communications • December 2004
Flat-routing ,[object Object],[object Object],[object Object]
SPIN(1/3)[1] ,[object Object],[object Object],[object Object],[1]W. Heinzelman, J. Kulik, and H. Balakrishnan, “Adaptive Protocols for Information Dissemination in Wireless Sensor Networks,”  Proc. 5 th ACM/IEEE Mobicom , Seattle, WA, Aug. 1999. pp. 174–85.
SPIN(2/3)
SPIN(3/3) ,[object Object],[object Object],[object Object]
Flat-routing ,[object Object],[object Object],[object Object]
DD(1/3)[1] ,[object Object],[object Object],[object Object],[1]C. Intanagonwiwat, R. Govindan, and D. Estrin, “Directed Diffusion: a Scalable and Robust Communication Paradigm for Sensor Networks,”  Proc. ACM Mobi- Com 2000 , Boston, MA, 2000, pp.56–67.
DD(2/3)
DD(3/3) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Flat-routing ,[object Object],[object Object],[object Object]
Rumor routing[1] ,[object Object],[object Object],[object Object],[1]D. Braginsky and D. Estrin, “Rumor Routing  Algorithm for Sensor Networks,”  Proc. 1st Wksp. Sensor Networks and Apps. , Atlanta, GA, Oct. 2002.
Rumor routing
Router protocol survey ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Hierarchical-routing ,[object Object],[object Object],[object Object]
LEACH(1/3)[1] ,[object Object],[object Object],[object Object],[1]. Heinzelman, A. Chandrakasan and H. Balakrishnan, “Energy-Efficient Communication  Protocol for Wireless Microsensor Networks,”  Proc. 33rd Hawaii Int’l. Conf. Sys. Sci. , Jan. 2000.
LEACH(2/3)
LEACH(3/3)[1] ,[object Object],[object Object],[object Object],[object Object]
Comparison between SPIN LEACH and directed diffusion[1] [1]W. Heinzelman, A. Chandrakasan and H. Balakrishnan, “Energy-Efficient Communication Protocol for Wireless Microsensor Networks,”  Proc. 33rd Hawaii Int’l. Conf. Sys. Sci. , Jan. 2000.
Hierarchical-routing ,[object Object],[object Object],[object Object]
PEGASIS(1/2)[1] ,[object Object],[object Object],[object Object],[1]S. Lindsey and C. Raghavendra, “PEGASIS: Power-Efficient Gathering in Sensor Information Systems,”  IEEE Aerospace Conf. Proc. , 2002, vol. 3, 9–16, pp. 1125–30.
PEGASIS(2/2) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Comparison between PEGASIS and SPIN ,[object Object],[object Object],[object Object],[object Object]
 
Hierarchical-routing ,[object Object],[object Object],[object Object]
TEEN[1] ,[object Object],[object Object],[object Object],[object Object],[1]A. Manjeshwar and D. P. Agarwal, “TEEN: a Routing  Protocol for Enhanced  Efficiency in Wireless Sensor Networks,”  1st Int’l. Wksp. on Parallel and Distrib. Comp. Issues in WirelessNetworks and Mobile Comp. , April 2001.
Comparison of between TEEN and LEACH ,[object Object]
Hierarchical vs. flat topologies routing.[1] [1]JAMAL N. AL-KARAKI, AHMED E. KAMAL,”   ROUTING TECHNIQUES IN WIRELESS SENSOR NETWORKS: A SURVEY ”,  IEEE Wireless Communications • December 2004
Router protocol survey ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Location-based routing ,[object Object],[object Object]
GEAR(1/3)[1] ,[object Object],[object Object],[1]Y. Yu, D. Estrin, and R. Govindan, “Geographical and Energy-Aware Routing:A Recursive Data Dissemination Protocol  for Wireless Sensor Networks,” UCLA Comp. Sci. Dept. tech. rep., UCLA-CSD TR-010023, May 2001.
GEAR(2/3)
GEAR(3/3)
Comparison between  GPSR  and GEAR ,[object Object],[object Object],[object Object],[object Object],[object Object]
GEM(1/2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
GEM(2/2) ,[object Object]
Conclusion ,[object Object],[object Object],[object Object]
reference ,[object Object],[object Object],[object Object]
reference ,[object Object],[object Object],[object Object],[object Object]
reference ,[object Object],[object Object],[object Object],[object Object]
Thank You!

More Related Content

What's hot

wireless sensor network ppt
wireless sensor network pptwireless sensor network ppt
wireless sensor network ppt
Pramod Kuruvatti
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
Divya Tiwari
 
SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLS
juno susi
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks
DEBABRATASINGH3
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
ArunChokkalingam
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-ppt
Swathi Ch
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingHabibur Rahman
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
Virendra Thakur
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
A. Shamel
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
AneeshGKumar
 
Performance and traffic management for WSNs
Performance and traffic management for WSNsPerformance and traffic management for WSNs
Performance and traffic management for WSNs
University of Technology - Iraq
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsnElham Hormozi
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocol
SuganthiN2
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
Menaga Selvaraj
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
PeriyanayagiS
 
Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02
Ali Habeeb
 
Sensor node hardware and network architecture
Sensor node hardware and network architectureSensor node hardware and network architecture
Sensor node hardware and network architecture
Vidhi603146
 

What's hot (20)

wireless sensor network ppt
wireless sensor network pptwireless sensor network ppt
wireless sensor network ppt
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks Mac protocols for ad hoc wireless networks
Mac protocols for ad hoc wireless networks
 
SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLS
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-ppt
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Performance and traffic management for WSNs
Performance and traffic management for WSNsPerformance and traffic management for WSNs
Performance and traffic management for WSNs
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocol
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
 
Leach protocol
Leach protocolLeach protocol
Leach protocol
 
Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02
 
Sensor node hardware and network architecture
Sensor node hardware and network architectureSensor node hardware and network architecture
Sensor node hardware and network architecture
 

Similar to Routing protocol on wireless sensor network

11.comparative analysis of qo s aware routing protocols for
11.comparative analysis of qo s aware routing protocols for11.comparative analysis of qo s aware routing protocols for
11.comparative analysis of qo s aware routing protocols forAlexander Decker
 
11.[1 5]comparative analysis of qo s-aware routing protocols for
11.[1 5]comparative analysis of qo s-aware routing protocols for11.[1 5]comparative analysis of qo s-aware routing protocols for
11.[1 5]comparative analysis of qo s-aware routing protocols for
Alexander Decker
 
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKSA NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
IJCNCJournal
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
ijsrd.com
 
Chapter 2 wireless sensor
Chapter 2 wireless sensorChapter 2 wireless sensor
Chapter 2 wireless sensor
Ahmed Tememe
 
Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network
dilip pareek
 
A Review Paper On Communication Protocols For Wireless Sensor Networks
A Review Paper On Communication Protocols For Wireless Sensor NetworksA Review Paper On Communication Protocols For Wireless Sensor Networks
A Review Paper On Communication Protocols For Wireless Sensor Networks
Bria Davis
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
ijwmn
 
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
ijwmn
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
Iasir Journals
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
theijes
 
J031101064069
J031101064069J031101064069
J031101064069theijes
 
Paper id 28201419
Paper id 28201419Paper id 28201419
Paper id 28201419
IJRAT
 
Ttacca
TtaccaTtacca
Ttacca
csandit
 
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
cscpconf
 
5.a robust frame of wsn utilizing localization technique 36-46
5.a robust frame of wsn utilizing localization technique  36-465.a robust frame of wsn utilizing localization technique  36-46
5.a robust frame of wsn utilizing localization technique 36-46
Alexander Decker
 
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...Alexander Decker
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocol
ijtsrd
 
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor NetworkA QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
ijassn
 
D010332935
D010332935D010332935
D010332935
IOSR Journals
 

Similar to Routing protocol on wireless sensor network (20)

11.comparative analysis of qo s aware routing protocols for
11.comparative analysis of qo s aware routing protocols for11.comparative analysis of qo s aware routing protocols for
11.comparative analysis of qo s aware routing protocols for
 
11.[1 5]comparative analysis of qo s-aware routing protocols for
11.[1 5]comparative analysis of qo s-aware routing protocols for11.[1 5]comparative analysis of qo s-aware routing protocols for
11.[1 5]comparative analysis of qo s-aware routing protocols for
 
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKSA NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
 
Chapter 2 wireless sensor
Chapter 2 wireless sensorChapter 2 wireless sensor
Chapter 2 wireless sensor
 
Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network
 
A Review Paper On Communication Protocols For Wireless Sensor Networks
A Review Paper On Communication Protocols For Wireless Sensor NetworksA Review Paper On Communication Protocols For Wireless Sensor Networks
A Review Paper On Communication Protocols For Wireless Sensor Networks
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
 
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
 
J031101064069
J031101064069J031101064069
J031101064069
 
Paper id 28201419
Paper id 28201419Paper id 28201419
Paper id 28201419
 
Ttacca
TtaccaTtacca
Ttacca
 
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
TTACCA: TWO-HOP BASED TRAFFIC AWARE CONGESTION CONTROL ALGORITHM FOR WIRELESS...
 
5.a robust frame of wsn utilizing localization technique 36-46
5.a robust frame of wsn utilizing localization technique  36-465.a robust frame of wsn utilizing localization technique  36-46
5.a robust frame of wsn utilizing localization technique 36-46
 
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...
11.0005www.iiste.org call for paper.a robust frame of wsn utilizing localizat...
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocol
 
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor NetworkA QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
 
D010332935
D010332935D010332935
D010332935
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 

Routing protocol on wireless sensor network

  • 1. Router protocol on wireless sensor network Yuping SUN 155169552@163.com SOFTWARE ENGINEERING LABORATORY Department of Computer Science, Sun Yat-Sen University
  • 2.
  • 3.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 11.
  • 12.
  • 13.
  • 14.
  • 16.
  • 17.
  • 18.
  • 20.
  • 21.
  • 22.
  • 24.
  • 25.
  • 26.
  • 28.
  • 29. Comparison between SPIN LEACH and directed diffusion[1] [1]W. Heinzelman, A. Chandrakasan and H. Balakrishnan, “Energy-Efficient Communication Protocol for Wireless Microsensor Networks,” Proc. 33rd Hawaii Int’l. Conf. Sys. Sci. , Jan. 2000.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.  
  • 35.
  • 36.
  • 37.
  • 38. Hierarchical vs. flat topologies routing.[1] [1]JAMAL N. AL-KARAKI, AHMED E. KAMAL,” ROUTING TECHNIQUES IN WIRELESS SENSOR NETWORKS: A SURVEY ”, IEEE Wireless Communications • December 2004
  • 39.
  • 40.
  • 41.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.

Editor's Notes

  1. 1.Suvery on Routing Protocols of Wireless Sensor Networks Yuping SUN. 注意写法 . 文件名 : Y.P. Sun S.Y.Ping 是不正规的 2. 51 页可能太多 , 明天把握节奏 . 一般 30 页能讲一个下午 . 3. 请在参考文献列于当页页尾
  2. introduction 不要花太多时间
  3. aggresion --> aggregation? 如果要给出定义 , 你可以 : 1. 引经据典 , 不然自己的定义是不具有说服力 . 2, 讲清楚为什么要这样定义 . 3. 这几点有内在的逻辑关系吗 ? 4. 这几点能把 WSN 的全貌都表达出来了吗 ?
  4. 这一页可以不用介绍了 , 已经被介绍过很多次 .
  5. [1] Ad Hoc 网络是一种没有有线基础设施支持的移动网络,网络中的节点均由移动主机构成。 Ad Hoc 网络最初应用于军事领域,它的研究起源于战场环境下分组无线网数据通信项目 MANET(mobile ad hoc networks) 是一种可以根据需要随时快速搭建的无线网络 , 不需要任何基础设施的支持 .
  6. 请指明引用出处
  7. introduction 不要花太多时间
  8. 不需要考虑网络拓扑结构和路由计算
  9. 估计看到这一页的时候 , 李老师会问如下问题 : 这种分类全面吗 ? 是谁来分的 ? 是根据什么来分的 . 他们之间的关系是什么 . 你能否用简短的几句话解释一下 Flat-routing, hierarchical-routing 和 location-based routing 三者的不同和联系 . 接下来 , 你介绍了很多很多算法 . 你要关注到听众的兴趣和智力 . 你需要想想如何把这个演讲组织得有逻辑一点 , 并且让听众听得懂 , 又不觉得烦 . 首先你就不能把每个 PROTOCOL 都详细讲 . 请在适当地方加入小结 . 请在 PPT 最后加入 conclusion 和 reference