SlideShare a Scribd company logo
1 of 34
Classification of WSN routing
protocols
Introduction
Generally, WSN protocols can classified into:
1-Homogenous:
All nodes are of identical types in size, shape, hardware configuration, the mode of
energy supply, transmission power (range), transmission data rate and processing
capability, the same reliability and security
2-Hetrogeneous:
All nodes are of different types in the sense of size, shape, hardware configuration,
processing capability and the mode of energy supply.
3-Clustered protocols
The different nodes are grouped to form clusters and data from nodes belonging to a
single cluster are combined (aggregated).
The clustering protocols have several advantages like scalable, energy efficient in
finding routes and easy to manage.
4-Non –clustered:
There is no need to form a cluster of nodes which each and every node is free to send
data to the Base station on its own.
Introduction cont.
A-Homogenous Clustered Routing Protocol
LEACH: (Low-Energy Adaptive Clustering Hierarchy)
 Clustering-based protocol using randomized rotation of cluster-
heads
 Cluster heads: collect data and applies process and aggregation on
data before forwarding it to base station.
 The three important features of LEACH are:
Localized co-ordination and control for cluster setup.
Randomized cluster head rotation.
Local compression to reduce global data communication.
 The energy usage is low within the cluster but drains the energy for
the cluster head.
 LEACH randomly selects a few sensor nodes as cluster-heads (CHs)
among the different sensor nodes and periodically changes the role
of cluster-heads
 However, data collection is centralized and is performed
periodically.
LEACH CONT.
 This protocol proves to be the most appropriate and suitable when constant
monitoring is needed by the sensor network.
 In this situation it may be possible that a user may not need all the data
immediately (waste of energy).
 The operation of LEACH protocol has been divided into two phases:
 setup phase, the clusters are organized and CHs are selected.
 steady state phase, the actual data transfer to the base station takes place.
 The duration of the steady state phase is longer than the duration of the setup
phase.
 During the setup phase, a predetermined fraction of nodes, p, elect themselves as
CHs as follows.
 A sensor node chooses a random number, v, between 0 and 1.
 If this random number is less than a threshold value, T(n), the node becomes a
cluster-head for the current round.
LEACH CONT.
 The threshold value is given by:
Where:
G - It is the set of nodes that are involved in the CH election.
T (n) - a threshold value
p- Predetermined fraction of nodes
r - Current round
 Each elected CH broadcasts an advertisement message to the rest of the nodes in the
network that they are the new cluster-heads.
 All the non-cluster head nodes, after receiving this advertisement, decide on the cluster to
which they want to belong to.
 This decision is taken based on the signal strength of the advertisement.
 The non-cluster-head nodes inform the appropriate cluster-heads that they will be a member
of the cluster.
LEACH CONT.
 After receiving all the messages, the cluster-head node creates a TDMA (Time
Division Multiple Access) schedule (which is broadcast to all the nodes in the
cluster) and assigns each node a time slot when it can transmit.
 During the steady state phase, the sensor nodes can begin sensing and
transmitting data to the cluster-heads.
 The cluster-head node, after receiving all the data, aggregates it before sending it
to the base-station.
 After a certain time the network goes back into the setup phase again and enters
another round of selecting new CH.
 Each cluster communicates using different CDMA codes to reduce interference
from nodes belonging to other clusters.
A-Homogenous Clustered Routing Protocol
A-LEACH (Advanced LEACH):
 LEACH protocol suffers with the problem that Cluster Head node spends the more
energy in comparison to others.
 ALEACH improves system life time and energy efficiency in terms of different
simulation performance metrics.
 ALEACH proposes a new cluster head selection algorithms that enables selecting
best suited node for cluster head, algorithms for adaptive clusters and rotating
cluster head positions.
 ALEACH improves the threshold equation of LEACH by introducing two terms:
 General probability (Gp)
 Current State probability (CSp).
• Where:
• k = Expected number of CH/round
• N = Total number of nodes
• r = Current round
• E current = Current energy
• En−max = Initial energy.
A-Homogenous Clustered Routing Protocol
MR-LEACH: Multi-hop routing- Low energy adaptive clustering hierarchy
 It partitions the network into different layers of clusters.
 Cluster heads in each layer collaborates ‫يتعاون‬with the adjacent ‫مجاور‬ layers to
transmit sensors' data to the base station.
 Ordinary sensor nodes join cluster heads based on the Received Signal Strength
Indicator (RSSI).
 The transmission of nodes is controlled by a Base Station (BS) that defines the
Time Division Multiple Access (TDMA) schedule for each cluster-head.
 BS selects the upper layers cluster heads to act as super cluster heads for lower
layer cluster heads.
 It follows multi-hop routing from cluster-heads to a base station to conserve
energy, unlike the LEACH protocol to achieve significant improvement in the LEACH
protocol and provides energy efficient routing for WSN.
A-Homogenous Clustered Routing Protocol
MR-LEACH:
A-Homogenous Clustered Routing Protocol
PEGASIS: PEGASIS (Power-Efficient Gathering in Sensor Information Systems)
 It is considered an optimization of the LEACH algorithm.
 The key idea in PEGASIS is to form a chain among the sensor nodes so that each
node will receive from and transmit to a close neighbor.
 The data moves from node to node, get fused, until designated node transmits to
the BS.
 Nodes take turns transmitting to the BS (energy is reduced).
 Working of PEGASIS:
 For a network running PEGASIS, it is required to form a chain that contains all
nodes.
 The chain construction starts with the farthest node from the base station to the
closest.
 This process is repeated until
the closest node to the base
station is chosen as the
other end of the chain.
A-Homogenous Clustered Routing Protocol
PEGASIS cont.
 When some node dies, this chain will be reconstructed.
 In each round, the end of one side of the chain sends data to its neighbor on the
chain which fuses received data with its local data, and sends the result to its other
neighbor on the chain (So does the other side to the leader of the chain).
 This process is repeated until the data reach the leader.
 The leader received data and fuses it with its own data, and sends them to the
base station.
Features of PEGASIS:
 It forms chains using greedy approach instead of forming a cluster.
 In the local gathering, the distances that most of the nodes transmit are much less
compared to transmitting to a cluster-head in LEACH.
 The amount of data for the leader to receive is much less compared to a cluster-
head in LEACH.
 PEGASIS introduces excessive delay for distant node on the chain.
 It still requires dynamic topology adjustment since sensors' energy is not tracked.
For example, every sensor needs to be aware of the status of its neighbor so that it
knows where to route that data.
A-Homogenous Clustered Routing Protocol
TEEN: (Threshold Sensitive Energy Efficient Sensor Network Protocol)
 It is a hierarchical clustering protocol which groups nodes into clusters with each
having a cluster-head (CH).
 The job of the sensors within a cluster is to send their sensed data to their
respective CH.
 The CH now sends the aggregated data to higher level CH until the data reaches
the sink.
 TEEN enables CHs to impose a constraint on when the sensor should report their
sensed data.
 After the clusters are formed, the CH broadcasts two thresholds to the nodes
namely:
 Hard threshold (HT) , and Soft threshold (ST).
 Hard threshold is the minimum possible value of an attribute, beyond which a
sensor should turn its transmitter ON to report its sensed data to its CH.
 soft threshold is a small change in the value of the sensed attribute and triggers a
sensor to send its sensed data to the CH.
A-Homogenous Clustered Routing Protocol
TEEN cont.
 So, soft threshold will further reduce the number of transmissions
for sensed data if there is little or no change in the value of sensed
attribute.
 The sensors will send only change with respect to the previously
reported data (more energy savings).
 One can adjust both hard and soft threshold values (very carefully )
in order to control the number of packet transmissions.
 Advantages:
 Controlling the trade-off between energy efficiency, data accuracy,
and response time.
 It is suitable for time critical sensing applications.
 Disadvantages: ‫ديه‬ ‫حلوة‬
 TEEN is not suitable for sensing applications where periodic reports
are needed since the user may not get any data at all if the
thresholds are not reached.
A-Homogenous Clustered Routing Protocol
Re-Cluster-LEACH:
 It considers the density of nodes inside the cluster and adopts the mechanisms
(like the cluster-based data fusion, the selection of cluster head and appropriate
multi-hop algorithm) to optimize the protocol.
 It makes relatively big improvements to the LEACH protocol in terms of cluster
head selection and cluster structure.
 The data transmission still uses TDMA and CDMA.
LEACH-F: Fixed number of Cluster- Low energy adaptive clustering hierarchy
 It is an algorithm in which the number of clusters will be fixed throughout the
network lifetime and the cluster heads rotated within its clusters.
 Steady state phase of LEACH-F is identical to that of LEACH.
 It may or may not be provided energy saving and this protocol does not provide
the flexibility to sensor nodes mobility or sensor nodes being removed or added
from the sensor networks.
A-Homogenous Clustered Routing Protocol
LEACH-B: Balanced- Low energy adaptive clustering hierarchy
 The sensor node only knows about own position and position of final receiver and
not the position of all sensor nodes.
 It operates in following phases:
Cluster head selection algorithm,
Cluster formation
Data transmission with multiple accesses.
 Each sensor node chooses its cluster head by evaluating the energy dissipated in
the path between final receiver and itself (better energy efficiency than LEACH).
B- Homogen. Non-Clustered Routing Protocol
ACQUIRE: (Active Query forwarding In sensor networks)
 The operation of ACQUIRE can be described as follows:
 The BS node sends a query, which is then forwarded by each node receiving the
query.
 During this, each node tries to respond to the query partially by using its
information and then forward it to another sensor node.
 If the pre-cached information is not up-to-date, the nodes gather information from
their neighbors.
 Once the query is being resolved completely, it is sent back through either the
reverse or shortest-path to the BS.
 So, ACQUIRE can deal with complex queries by allowing many nodes to send
responses.
B- Homogen. Non-Clustered Routing Protocol
Sensor Protocols for Information via Negotiation (SPIN):
 The SPIN family of protocols uses data negotiation and resource-adaptive
algorithms.
 SPIN efficiently disseminates ‫ينشر‬ information among sensors in an energy-
constrained wireless sensor network.
 Nodes running a SPIN protocol name their data using high-level data descriptors,
called meta-data.
 They use meta-data negotiations to eliminate the transmission of redundant data
throughout the network.
 These protocols work in a time-driven approach and distribute the information all
over the network
 There are three messages defined in SPIN to exchange data between nodes. These
are:
 a) ADV message to allow a sensor to advertise a particular meta-data,
 b) REQ message to request the specific data and
 c) DATA message that carry the actual data.
B- Homogen. Non-Clustered Routing Protocol
Spin cont.
 There are two protocols in the SPIN: SPIN-l (or SPIN-PP) and SPIN-2 (or SPIN-EC) .
 to reduce the consumption, SPIN-l uses a negotiation mechanism and SPIN-2 uses
a resource-aware mechanism.
 SPIN-l is a three-stage handshake protocol by which the sensors can disseminate
their data.
 This protocol applies for those networks using point-to-point transmission media
(two sensors can communicate with each other without interfering with other).
 It is a three-stage handshake protocol for broadcast transmission media, where the
sensors in a network communicate with each other using a single shared channel.
 SPIN-2 differs from SPIN-l in that it takes into account the residual energy of
sensors (if the sensors have plenty of energy, SPIN-2 is identical to SPIN-l).
 when a sensor has low residual energy, it controls its participation in a data
dissemination process.
B- Homogen. Non-Clustered Routing Protocol
Spin cont.
Advantages of SPIN:
 Topological changes are localized since each node needs to know only its single-
hop neighbors.
 SPIN is less than flooding for energy dissipation
 Meta-data negotiation almost halves the redundant data.
Disadvantages of SPIN:
 Data advertisement mechanism cannot ensure permanently the delivery of data.
 If the nodes that are interested in the data are far away from the source node and
the nodes between source and destination are not interested in that data, such
data will not be delivered to the destination at all.
 SPIN is not a good choice for applications such as intrusion ‫تطفل‬ detection, which
require reliable delivery of data packets over regular intervals.
B- Homogen. Non-Clustered Routing Protocol
SPEED (Stateless Protocol for End-to-End Delay):
 It is an example of QoS routing protocol for sensor networks that provides soft
real-time end-to-end guarantees.
 This protocol requires each node to maintain information about its neighbors and
uses geographic forwarding technique to find the paths.
 SPEED tries to ensure a certain speed for each packet in the network so that each
application can roughly calculate the end-to-end delay for the packets (distance
/speed ).
 SPEED maintains a desired speed across sensor networks by regulating packets
sent to the MAC layer.
 So, real-time applications can estimate‫يقدر‬ end-to-end delay before making
admission decisions.
 The routing module in SPEED is called Stateless Non-Deterministic Geographic
forwarding (SNGF) and works with four other modules at the network layer.
 The beacon exchange mechanism collects information about the nodes and their
location.
B- Homogen. Non-Clustered Routing Protocol
SPEED (Stateless Protocol for End-to-End Delay):
 By looking at the delay values, SNGF selects the node that meets the speed
requirement.
 SPEED does not consider any further energy metric in its routing protocol.
 Therefore, for more realistic understanding of SPEED‟s energy consumption, there
is a need for comparing it to a routing protocol, which is energy-aware.
B- Homogen. Non-Clustered Routing Protocol
 Geographic and Energy-Aware Routing (GEAR):
 GEAR is an energy-efficient routing protocol which has been proposed for routing
queries to target regions in a sensor field.
 The sensors are supposed to have localization hardware equipped with it a GPS
unit or a localization system.
 The sensors are aware of their residual energy as well as the locations and residual
energy of each of their neighbors.
 It uses energy aware mechanism that is based on geographical information to
select sensors to forward a packet towards its destination region.
 There are two phases in the algorithm designed for GEAR:
1- Forwarding packets towards the target region: As soon as a node receives a packet,
it checks its neighbors to see if there is any neighbor, which is closer to the target
region than itself.
 If there is more than one, the nearest neighbor to the target region is selected as
the next hop.
 If they are all further than the node itself, this means there is a hole.
 In this case, one of the neighbors is picked to forward the packet based on the
learning cost function.
B- Homogen. Non-Clustered Routing Protocol
GEAR cont.
2-Forwarding the packets within the region:
 If the packet has reached the region, it can be diffused in that region by either
recursive geographic forwarding or restricted flooding.
 Restricted flooding is good when the sensors are not densely‫عالية‬ ‫كثافة‬ ‫مافيش‬
deployed.
 In case of high density of sensors, recursive geographic flooding is used which is
more energy efficient than restricted flooding. In that case, the region is divided
into four sub regions and four copies of the packets are created.
 This splitting and forwarding process continues until the regions are left where
there is only one node.
B- Homogen. Non-Clustered Routing Protocol
Geographic Adaptive Fidelity (GAF):
 GAF Is an energy-aware routing protocol which has been mainly proposed for
MANETs, but can also be used for WSNs because it deals with energy conservation.
 Considers energy consumption due to the reception and transmission of packets
as well as idle‫خامل‬ (or listening) time, when the radio of a sensor is to detect the
presence of incoming packets.
 GAF is based on mechanism of turning off unnecessary sensors while keeping a
constant level of routing fidelity (or uninterrupted connectivity between
communicating sensors).
 It has three types of states in GAF: a)Discovery state, b) Active state and c)
Sleeping state .
 GAF uses discovery messages to learn about other sensors in the same grid.
 Even in the active state, a sensor periodically broadcasts its discovery message to
inform equivalent sensors about its state.
 The time spent in each of these states can be tuned depending on needs and
sensor mobility.
B- Homogen. Non-Clustered Routing Protocol
GAF cont.
 GAF aims to maximize the network lifetime by reaching a state where each grid
has only one active sensor based on sensor ranking rules.
 The ranking of sensors is based on their residual energy levels.
 A sensor with a higher rank will be able to handle routing within their
corresponding grids.
 A sensor in the active state has a higher rank (longer lifetime ) than a sensor in the
discovery state.
B- Homogen. Non-Clustered Routing Protocol
Directed Diffusion:
 Data-centric paradigm.
 Data generated by sensor nodes is named by attribute-value pairs.
 A node that demands the data, generates a request where an interest is specified
 The sink usually injects an interest in the network for each application task.
 The nodes update an internal interest cache with the interest messages received.
 On receiving this message, the nodes establish a reply link to the originator of the
interest.
 This link is called gradient and it is characterized by the data rate, duration and
expiration time.
 Additionally, the node activates its sensors to collect the intended data.
 The reception of an interest message makes the node establish multiple gradients
(or first hop in a route) to the sink.
 This algorithm works with two types of gradients: exploratory and data gradients.
 Exploratory gradients are intended for route set-up and repair whereas data
gradients are used for sending real data.
C. Heterogeneous Clustered Routing Protocol
 Self-Organizing Protocol (SOP):
 t is heterogeneity based routing protocol (hierarchical architecture ) which some
sensors sense the environment and forward the data to a designated set of nodes
that act as routers.
 Router nodes are stationary and form a backbone for communication.
 Sensing nodes can be identified through the address of the router node they are
connected to.
 Local Markov Loops (LML) algorithm, which performs a random walk on spanning
trees of a graph, is used to support fault tolerance and as a medium for
broadcasting.
 Here sensor nodes can be addressed individually, and so it is suitable for
applications where communication to a particular node is required.
 The algorithm consists of four phases:
C. Heterogeneous Clustered Routing Protocol
SOP cont.
 Discovery phase: The nodes in the neighborhood of each sensor are discovered.
 Organization phase: Groups are formed. Each node is allocated an address based
on its position in the hierarchy and Routing tables are created for each node.
Broadcast trees that span all the nodes are constructed.
 Maintenance phase: Updating of routing tables and energy levels of nodes is
made in this phase. Each node informs the neighbors about its routing table and
energy level.
 Self-reorganization phase: In case of partition or node failures, group
reorganizations are performed.
 The proposed algorithm utilizes the router nodes to keep all the sensors connected
by forming a dominating set.
 The major advantage of using the algorithm is the small cost of maintaining
routing tables and keeping routing balanced.
C. Heterogeneous Clustered Routing Protocol
Cluster-Head Relay Routing (CHR)
 It uses two types of sensors to form a heterogeneous network with a single sink: a
large number of low-end sensors (L-sensors) and a small number of powerful high-
end sensors (H-sensors).
 The L- and H-sensors are uniformly and randomly distributed in the sensor field
and also Both types of sensors are static and aware of their locations.
 Within a cluster, the L-sensors sense the underlying environment and forwarding
data packets towards their cluster head.
 The H-sensors are responsible for data fusion within their own clusters and
forwarding aggregated data packets toward the sink using only cluster heads.
 While L-sensors use short-range data transmission to their neighboring H-sensors
within the same cluster, H-sensors perform long-range data communication to
other neighboring H-sensors and the sink.
C. Heterogeneous Clustered Routing Protocol
Information-driven sensor querying (IDSQ)
 It is heterogeneity based routing protocol which is used in real world application.
 It aim to maximizing information gain and minimizing detection latency and energy
consumption for target localization and tracking through dynamic sensor querying
and data routing.
 To improve tracking accuracy and reduce detection latency, communication
between sensors is necessary and consumes significant energy.
 In order to conserve power, only a subset of sensors needs to be active when there
are interesting events.
 The algorithm is as follows:
1. The nodes sit in idle mode but wake up to sense any change in the environment.
2. If a change is detected then a leader node is elected (the one with the best sense of
the change detected).
3. The leader node creates a “belief state” which contains the best known information
at the time.
4. The leader node creates a group of nodes to collaborate with and disables other
nodes from becoming leader.
5. The leader node propagates the belief state to the next best node and passes
“leadership” status to it.
C. Heterogeneous Clustered Routing Protocol
Heterogeneous- Low energy adaptive clustering hierarchy
 It is an energy efficient cluster head election method and using the improved Prim
algorithm to construct an inter-cluster routing in the heterogeneous WSN.
 It considered three types of sensor nodes having different energy resources.
 It uses the minimum spanning tree algorithm to construct an inter-cluster routing.
 LEACH-HPR is more efficient to reduce and balance energy consumption and
hence enhance the lifetime of WSN
D. Heterogen Non-Clustered Routing Protocol
CADR: Constrained An-isotropic diffusion routing

 It is a general form of Directed Diffusion which deploys two types of nodes, namely
line-powered sensors (no energy constraint) and the battery-powered sensors
(limited lifetime).

 CADR diffuses queries by using a set of information criteria to select which sensors
can get the data.

 This is achieved by activating only the sensors that are close to a particular event
and dynamically adjusting data routes.

 Since CADR diffuses queries by using a set of information criteria to select which
sensors to get the data, simulation results confirmed that it is more energy
efficient than Directed Diffusion where queries are diffused in an isotropic fashion,
reaching nearest neighbors first.
Routing protocols of wsn

More Related Content

What's hot

localization in wsn
localization in wsnlocalization in wsn
localization in wsnnehabsairam
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...ArunChokkalingam
 
Multicast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksMulticast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksPradeep Kumar TS
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocolSuganthiN2
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksMd Waresul Islam
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networksPiyush Mittal
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Divya Tiwari
 
Data retrieval in sensor networks
Data retrieval in sensor networksData retrieval in sensor networks
Data retrieval in sensor networksAcad
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitecturePeriyanayagiS
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSNMahbubur Rahman
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolArunChokkalingam
 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Darwin Nesakumar
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSNYara Ali
 
Mac protocols
Mac protocolsMac protocols
Mac protocolsjuno susi
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksKhushbooGupta145
 

What's hot (20)

localization in wsn
localization in wsnlocalization in wsn
localization in wsn
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Multicast routing protocols in adhoc networks
Multicast routing protocols in adhoc networksMulticast routing protocols in adhoc networks
Multicast routing protocols in adhoc networks
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocol
 
Localization in wsn
Localization in wsnLocalization in wsn
Localization in wsn
 
Mobile Ad hoc network
Mobile Ad hoc networkMobile Ad hoc network
Mobile Ad hoc network
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networks
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
Data retrieval in sensor networks
Data retrieval in sensor networksData retrieval in sensor networks
Data retrieval in sensor networks
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 
WSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC ProtocolWSN-IEEE 802.15.4 -MAC Protocol
WSN-IEEE 802.15.4 -MAC Protocol
 
Unit 33-routing protocols for wsn
Unit 33-routing protocols for wsnUnit 33-routing protocols for wsn
Unit 33-routing protocols for wsn
 
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...Unit  4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
 
Introduction of VANET
Introduction of VANETIntroduction of VANET
Introduction of VANET
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Design Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor NetworksDesign Issues and Challenges in Wireless Sensor Networks
Design Issues and Challenges in Wireless Sensor Networks
 

Viewers also liked

Energy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksEnergy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksSpandan Spandy
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor networkshashankcsnits
 
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...divya_prabha
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor NetworksKarthik
 
A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network IJORCS
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn     a surveyFeatures of wsn and various routing techniques for wsn     a survey
Features of wsn and various routing techniques for wsn a surveyeSAT Journals
 
A seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networksA seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networkspraveen369
 
Performance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksPerformance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksDarpan Dekivadiya
 
Leach-Protocol
Leach-ProtocolLeach-Protocol
Leach-Protocolzhendong
 
Comparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOCComparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOCAmitoj Kaur
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networkssashar86
 
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkMuhammad Kaife Uddin
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksDarpan Dekivadiya
 

Viewers also liked (20)

Energy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksEnergy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networks
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
 
Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & Pegasis
 
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network
 
Features of wsn and various routing techniques for wsn a survey
Features of wsn and various routing techniques for wsn     a surveyFeatures of wsn and various routing techniques for wsn     a survey
Features of wsn and various routing techniques for wsn a survey
 
Kianoosh&sajjad
Kianoosh&sajjadKianoosh&sajjad
Kianoosh&sajjad
 
eeca
eecaeeca
eeca
 
Leach
Leach Leach
Leach
 
A seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networksA seminar report on data aggregation in wireless sensor networks
A seminar report on data aggregation in wireless sensor networks
 
Performance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksPerformance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor Networks
 
Leach-Protocol
Leach-ProtocolLeach-Protocol
Leach-Protocol
 
Comparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOCComparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOC
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networks
 
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor Network
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor Networks
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 

Similar to Routing protocols of wsn

Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkJamia Hamdard
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN RoutingAn Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routingijsrd.com
 
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor NetworkEnhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor NetworkIJERD Editor
 
9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...Chính Cao
 
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH ProtocolUniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH Protocolidescitation
 
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Alexander Decker
 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolIJTET Journal
 
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORKIMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORKIAEME Publication
 
Scalability in wireless sensor networks
Scalability in wireless sensor networksScalability in wireless sensor networks
Scalability in wireless sensor networkssourabhshivtiwari
 
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...IJERD Editor
 
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...ijsrd.com
 
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...IJCNCJournal
 
Cluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor NetworksCluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor Networkseditor1knowledgecuddle
 

Similar to Routing protocols of wsn (20)

Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN RoutingAn Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routing
 
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor NetworkEnhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
 
9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...
 
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH ProtocolUniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
 
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...
 
Thesis-Final-slide
Thesis-Final-slideThesis-Final-slide
Thesis-Final-slide
 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
 
C04501027035
C04501027035C04501027035
C04501027035
 
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORKIMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
 
Leach protocol
Leach protocolLeach protocol
Leach protocol
 
A04560105
A04560105A04560105
A04560105
 
Scalability in wireless sensor networks
Scalability in wireless sensor networksScalability in wireless sensor networks
Scalability in wireless sensor networks
 
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
 
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
 
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
 
Cluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor NetworksCluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor Networks
 

Recently uploaded

main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 

Recently uploaded (20)

Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 

Routing protocols of wsn

  • 1. Classification of WSN routing protocols
  • 2. Introduction Generally, WSN protocols can classified into: 1-Homogenous: All nodes are of identical types in size, shape, hardware configuration, the mode of energy supply, transmission power (range), transmission data rate and processing capability, the same reliability and security 2-Hetrogeneous: All nodes are of different types in the sense of size, shape, hardware configuration, processing capability and the mode of energy supply. 3-Clustered protocols The different nodes are grouped to form clusters and data from nodes belonging to a single cluster are combined (aggregated). The clustering protocols have several advantages like scalable, energy efficient in finding routes and easy to manage. 4-Non –clustered: There is no need to form a cluster of nodes which each and every node is free to send data to the Base station on its own.
  • 4. A-Homogenous Clustered Routing Protocol LEACH: (Low-Energy Adaptive Clustering Hierarchy)  Clustering-based protocol using randomized rotation of cluster- heads  Cluster heads: collect data and applies process and aggregation on data before forwarding it to base station.  The three important features of LEACH are: Localized co-ordination and control for cluster setup. Randomized cluster head rotation. Local compression to reduce global data communication.  The energy usage is low within the cluster but drains the energy for the cluster head.  LEACH randomly selects a few sensor nodes as cluster-heads (CHs) among the different sensor nodes and periodically changes the role of cluster-heads  However, data collection is centralized and is performed periodically.
  • 5. LEACH CONT.  This protocol proves to be the most appropriate and suitable when constant monitoring is needed by the sensor network.  In this situation it may be possible that a user may not need all the data immediately (waste of energy).  The operation of LEACH protocol has been divided into two phases:  setup phase, the clusters are organized and CHs are selected.  steady state phase, the actual data transfer to the base station takes place.  The duration of the steady state phase is longer than the duration of the setup phase.  During the setup phase, a predetermined fraction of nodes, p, elect themselves as CHs as follows.  A sensor node chooses a random number, v, between 0 and 1.  If this random number is less than a threshold value, T(n), the node becomes a cluster-head for the current round.
  • 6. LEACH CONT.  The threshold value is given by: Where: G - It is the set of nodes that are involved in the CH election. T (n) - a threshold value p- Predetermined fraction of nodes r - Current round  Each elected CH broadcasts an advertisement message to the rest of the nodes in the network that they are the new cluster-heads.  All the non-cluster head nodes, after receiving this advertisement, decide on the cluster to which they want to belong to.  This decision is taken based on the signal strength of the advertisement.  The non-cluster-head nodes inform the appropriate cluster-heads that they will be a member of the cluster.
  • 7. LEACH CONT.  After receiving all the messages, the cluster-head node creates a TDMA (Time Division Multiple Access) schedule (which is broadcast to all the nodes in the cluster) and assigns each node a time slot when it can transmit.  During the steady state phase, the sensor nodes can begin sensing and transmitting data to the cluster-heads.  The cluster-head node, after receiving all the data, aggregates it before sending it to the base-station.  After a certain time the network goes back into the setup phase again and enters another round of selecting new CH.  Each cluster communicates using different CDMA codes to reduce interference from nodes belonging to other clusters.
  • 8. A-Homogenous Clustered Routing Protocol A-LEACH (Advanced LEACH):  LEACH protocol suffers with the problem that Cluster Head node spends the more energy in comparison to others.  ALEACH improves system life time and energy efficiency in terms of different simulation performance metrics.  ALEACH proposes a new cluster head selection algorithms that enables selecting best suited node for cluster head, algorithms for adaptive clusters and rotating cluster head positions.  ALEACH improves the threshold equation of LEACH by introducing two terms:  General probability (Gp)  Current State probability (CSp). • Where: • k = Expected number of CH/round • N = Total number of nodes • r = Current round • E current = Current energy • En−max = Initial energy.
  • 9. A-Homogenous Clustered Routing Protocol MR-LEACH: Multi-hop routing- Low energy adaptive clustering hierarchy  It partitions the network into different layers of clusters.  Cluster heads in each layer collaborates ‫يتعاون‬with the adjacent ‫مجاور‬ layers to transmit sensors' data to the base station.  Ordinary sensor nodes join cluster heads based on the Received Signal Strength Indicator (RSSI).  The transmission of nodes is controlled by a Base Station (BS) that defines the Time Division Multiple Access (TDMA) schedule for each cluster-head.  BS selects the upper layers cluster heads to act as super cluster heads for lower layer cluster heads.  It follows multi-hop routing from cluster-heads to a base station to conserve energy, unlike the LEACH protocol to achieve significant improvement in the LEACH protocol and provides energy efficient routing for WSN.
  • 10. A-Homogenous Clustered Routing Protocol MR-LEACH:
  • 11. A-Homogenous Clustered Routing Protocol PEGASIS: PEGASIS (Power-Efficient Gathering in Sensor Information Systems)  It is considered an optimization of the LEACH algorithm.  The key idea in PEGASIS is to form a chain among the sensor nodes so that each node will receive from and transmit to a close neighbor.  The data moves from node to node, get fused, until designated node transmits to the BS.  Nodes take turns transmitting to the BS (energy is reduced).  Working of PEGASIS:  For a network running PEGASIS, it is required to form a chain that contains all nodes.  The chain construction starts with the farthest node from the base station to the closest.  This process is repeated until the closest node to the base station is chosen as the other end of the chain.
  • 12. A-Homogenous Clustered Routing Protocol PEGASIS cont.  When some node dies, this chain will be reconstructed.  In each round, the end of one side of the chain sends data to its neighbor on the chain which fuses received data with its local data, and sends the result to its other neighbor on the chain (So does the other side to the leader of the chain).  This process is repeated until the data reach the leader.  The leader received data and fuses it with its own data, and sends them to the base station. Features of PEGASIS:  It forms chains using greedy approach instead of forming a cluster.  In the local gathering, the distances that most of the nodes transmit are much less compared to transmitting to a cluster-head in LEACH.  The amount of data for the leader to receive is much less compared to a cluster- head in LEACH.  PEGASIS introduces excessive delay for distant node on the chain.  It still requires dynamic topology adjustment since sensors' energy is not tracked. For example, every sensor needs to be aware of the status of its neighbor so that it knows where to route that data.
  • 13. A-Homogenous Clustered Routing Protocol TEEN: (Threshold Sensitive Energy Efficient Sensor Network Protocol)  It is a hierarchical clustering protocol which groups nodes into clusters with each having a cluster-head (CH).  The job of the sensors within a cluster is to send their sensed data to their respective CH.  The CH now sends the aggregated data to higher level CH until the data reaches the sink.  TEEN enables CHs to impose a constraint on when the sensor should report their sensed data.  After the clusters are formed, the CH broadcasts two thresholds to the nodes namely:  Hard threshold (HT) , and Soft threshold (ST).  Hard threshold is the minimum possible value of an attribute, beyond which a sensor should turn its transmitter ON to report its sensed data to its CH.  soft threshold is a small change in the value of the sensed attribute and triggers a sensor to send its sensed data to the CH.
  • 14. A-Homogenous Clustered Routing Protocol TEEN cont.  So, soft threshold will further reduce the number of transmissions for sensed data if there is little or no change in the value of sensed attribute.  The sensors will send only change with respect to the previously reported data (more energy savings).  One can adjust both hard and soft threshold values (very carefully ) in order to control the number of packet transmissions.  Advantages:  Controlling the trade-off between energy efficiency, data accuracy, and response time.  It is suitable for time critical sensing applications.  Disadvantages: ‫ديه‬ ‫حلوة‬  TEEN is not suitable for sensing applications where periodic reports are needed since the user may not get any data at all if the thresholds are not reached.
  • 15. A-Homogenous Clustered Routing Protocol Re-Cluster-LEACH:  It considers the density of nodes inside the cluster and adopts the mechanisms (like the cluster-based data fusion, the selection of cluster head and appropriate multi-hop algorithm) to optimize the protocol.  It makes relatively big improvements to the LEACH protocol in terms of cluster head selection and cluster structure.  The data transmission still uses TDMA and CDMA. LEACH-F: Fixed number of Cluster- Low energy adaptive clustering hierarchy  It is an algorithm in which the number of clusters will be fixed throughout the network lifetime and the cluster heads rotated within its clusters.  Steady state phase of LEACH-F is identical to that of LEACH.  It may or may not be provided energy saving and this protocol does not provide the flexibility to sensor nodes mobility or sensor nodes being removed or added from the sensor networks.
  • 16. A-Homogenous Clustered Routing Protocol LEACH-B: Balanced- Low energy adaptive clustering hierarchy  The sensor node only knows about own position and position of final receiver and not the position of all sensor nodes.  It operates in following phases: Cluster head selection algorithm, Cluster formation Data transmission with multiple accesses.  Each sensor node chooses its cluster head by evaluating the energy dissipated in the path between final receiver and itself (better energy efficiency than LEACH).
  • 17. B- Homogen. Non-Clustered Routing Protocol ACQUIRE: (Active Query forwarding In sensor networks)  The operation of ACQUIRE can be described as follows:  The BS node sends a query, which is then forwarded by each node receiving the query.  During this, each node tries to respond to the query partially by using its information and then forward it to another sensor node.  If the pre-cached information is not up-to-date, the nodes gather information from their neighbors.  Once the query is being resolved completely, it is sent back through either the reverse or shortest-path to the BS.  So, ACQUIRE can deal with complex queries by allowing many nodes to send responses.
  • 18. B- Homogen. Non-Clustered Routing Protocol Sensor Protocols for Information via Negotiation (SPIN):  The SPIN family of protocols uses data negotiation and resource-adaptive algorithms.  SPIN efficiently disseminates ‫ينشر‬ information among sensors in an energy- constrained wireless sensor network.  Nodes running a SPIN protocol name their data using high-level data descriptors, called meta-data.  They use meta-data negotiations to eliminate the transmission of redundant data throughout the network.  These protocols work in a time-driven approach and distribute the information all over the network  There are three messages defined in SPIN to exchange data between nodes. These are:  a) ADV message to allow a sensor to advertise a particular meta-data,  b) REQ message to request the specific data and  c) DATA message that carry the actual data.
  • 19. B- Homogen. Non-Clustered Routing Protocol Spin cont.  There are two protocols in the SPIN: SPIN-l (or SPIN-PP) and SPIN-2 (or SPIN-EC) .  to reduce the consumption, SPIN-l uses a negotiation mechanism and SPIN-2 uses a resource-aware mechanism.  SPIN-l is a three-stage handshake protocol by which the sensors can disseminate their data.  This protocol applies for those networks using point-to-point transmission media (two sensors can communicate with each other without interfering with other).  It is a three-stage handshake protocol for broadcast transmission media, where the sensors in a network communicate with each other using a single shared channel.  SPIN-2 differs from SPIN-l in that it takes into account the residual energy of sensors (if the sensors have plenty of energy, SPIN-2 is identical to SPIN-l).  when a sensor has low residual energy, it controls its participation in a data dissemination process.
  • 20. B- Homogen. Non-Clustered Routing Protocol Spin cont. Advantages of SPIN:  Topological changes are localized since each node needs to know only its single- hop neighbors.  SPIN is less than flooding for energy dissipation  Meta-data negotiation almost halves the redundant data. Disadvantages of SPIN:  Data advertisement mechanism cannot ensure permanently the delivery of data.  If the nodes that are interested in the data are far away from the source node and the nodes between source and destination are not interested in that data, such data will not be delivered to the destination at all.  SPIN is not a good choice for applications such as intrusion ‫تطفل‬ detection, which require reliable delivery of data packets over regular intervals.
  • 21. B- Homogen. Non-Clustered Routing Protocol SPEED (Stateless Protocol for End-to-End Delay):  It is an example of QoS routing protocol for sensor networks that provides soft real-time end-to-end guarantees.  This protocol requires each node to maintain information about its neighbors and uses geographic forwarding technique to find the paths.  SPEED tries to ensure a certain speed for each packet in the network so that each application can roughly calculate the end-to-end delay for the packets (distance /speed ).  SPEED maintains a desired speed across sensor networks by regulating packets sent to the MAC layer.  So, real-time applications can estimate‫يقدر‬ end-to-end delay before making admission decisions.  The routing module in SPEED is called Stateless Non-Deterministic Geographic forwarding (SNGF) and works with four other modules at the network layer.  The beacon exchange mechanism collects information about the nodes and their location.
  • 22. B- Homogen. Non-Clustered Routing Protocol SPEED (Stateless Protocol for End-to-End Delay):  By looking at the delay values, SNGF selects the node that meets the speed requirement.  SPEED does not consider any further energy metric in its routing protocol.  Therefore, for more realistic understanding of SPEED‟s energy consumption, there is a need for comparing it to a routing protocol, which is energy-aware.
  • 23. B- Homogen. Non-Clustered Routing Protocol  Geographic and Energy-Aware Routing (GEAR):  GEAR is an energy-efficient routing protocol which has been proposed for routing queries to target regions in a sensor field.  The sensors are supposed to have localization hardware equipped with it a GPS unit or a localization system.  The sensors are aware of their residual energy as well as the locations and residual energy of each of their neighbors.  It uses energy aware mechanism that is based on geographical information to select sensors to forward a packet towards its destination region.  There are two phases in the algorithm designed for GEAR: 1- Forwarding packets towards the target region: As soon as a node receives a packet, it checks its neighbors to see if there is any neighbor, which is closer to the target region than itself.  If there is more than one, the nearest neighbor to the target region is selected as the next hop.  If they are all further than the node itself, this means there is a hole.  In this case, one of the neighbors is picked to forward the packet based on the learning cost function.
  • 24. B- Homogen. Non-Clustered Routing Protocol GEAR cont. 2-Forwarding the packets within the region:  If the packet has reached the region, it can be diffused in that region by either recursive geographic forwarding or restricted flooding.  Restricted flooding is good when the sensors are not densely‫عالية‬ ‫كثافة‬ ‫مافيش‬ deployed.  In case of high density of sensors, recursive geographic flooding is used which is more energy efficient than restricted flooding. In that case, the region is divided into four sub regions and four copies of the packets are created.  This splitting and forwarding process continues until the regions are left where there is only one node.
  • 25. B- Homogen. Non-Clustered Routing Protocol Geographic Adaptive Fidelity (GAF):  GAF Is an energy-aware routing protocol which has been mainly proposed for MANETs, but can also be used for WSNs because it deals with energy conservation.  Considers energy consumption due to the reception and transmission of packets as well as idle‫خامل‬ (or listening) time, when the radio of a sensor is to detect the presence of incoming packets.  GAF is based on mechanism of turning off unnecessary sensors while keeping a constant level of routing fidelity (or uninterrupted connectivity between communicating sensors).  It has three types of states in GAF: a)Discovery state, b) Active state and c) Sleeping state .  GAF uses discovery messages to learn about other sensors in the same grid.  Even in the active state, a sensor periodically broadcasts its discovery message to inform equivalent sensors about its state.  The time spent in each of these states can be tuned depending on needs and sensor mobility.
  • 26. B- Homogen. Non-Clustered Routing Protocol GAF cont.  GAF aims to maximize the network lifetime by reaching a state where each grid has only one active sensor based on sensor ranking rules.  The ranking of sensors is based on their residual energy levels.  A sensor with a higher rank will be able to handle routing within their corresponding grids.  A sensor in the active state has a higher rank (longer lifetime ) than a sensor in the discovery state.
  • 27. B- Homogen. Non-Clustered Routing Protocol Directed Diffusion:  Data-centric paradigm.  Data generated by sensor nodes is named by attribute-value pairs.  A node that demands the data, generates a request where an interest is specified  The sink usually injects an interest in the network for each application task.  The nodes update an internal interest cache with the interest messages received.  On receiving this message, the nodes establish a reply link to the originator of the interest.  This link is called gradient and it is characterized by the data rate, duration and expiration time.  Additionally, the node activates its sensors to collect the intended data.  The reception of an interest message makes the node establish multiple gradients (or first hop in a route) to the sink.  This algorithm works with two types of gradients: exploratory and data gradients.  Exploratory gradients are intended for route set-up and repair whereas data gradients are used for sending real data.
  • 28. C. Heterogeneous Clustered Routing Protocol  Self-Organizing Protocol (SOP):  t is heterogeneity based routing protocol (hierarchical architecture ) which some sensors sense the environment and forward the data to a designated set of nodes that act as routers.  Router nodes are stationary and form a backbone for communication.  Sensing nodes can be identified through the address of the router node they are connected to.  Local Markov Loops (LML) algorithm, which performs a random walk on spanning trees of a graph, is used to support fault tolerance and as a medium for broadcasting.  Here sensor nodes can be addressed individually, and so it is suitable for applications where communication to a particular node is required.  The algorithm consists of four phases:
  • 29. C. Heterogeneous Clustered Routing Protocol SOP cont.  Discovery phase: The nodes in the neighborhood of each sensor are discovered.  Organization phase: Groups are formed. Each node is allocated an address based on its position in the hierarchy and Routing tables are created for each node. Broadcast trees that span all the nodes are constructed.  Maintenance phase: Updating of routing tables and energy levels of nodes is made in this phase. Each node informs the neighbors about its routing table and energy level.  Self-reorganization phase: In case of partition or node failures, group reorganizations are performed.  The proposed algorithm utilizes the router nodes to keep all the sensors connected by forming a dominating set.  The major advantage of using the algorithm is the small cost of maintaining routing tables and keeping routing balanced.
  • 30. C. Heterogeneous Clustered Routing Protocol Cluster-Head Relay Routing (CHR)  It uses two types of sensors to form a heterogeneous network with a single sink: a large number of low-end sensors (L-sensors) and a small number of powerful high- end sensors (H-sensors).  The L- and H-sensors are uniformly and randomly distributed in the sensor field and also Both types of sensors are static and aware of their locations.  Within a cluster, the L-sensors sense the underlying environment and forwarding data packets towards their cluster head.  The H-sensors are responsible for data fusion within their own clusters and forwarding aggregated data packets toward the sink using only cluster heads.  While L-sensors use short-range data transmission to their neighboring H-sensors within the same cluster, H-sensors perform long-range data communication to other neighboring H-sensors and the sink.
  • 31. C. Heterogeneous Clustered Routing Protocol Information-driven sensor querying (IDSQ)  It is heterogeneity based routing protocol which is used in real world application.  It aim to maximizing information gain and minimizing detection latency and energy consumption for target localization and tracking through dynamic sensor querying and data routing.  To improve tracking accuracy and reduce detection latency, communication between sensors is necessary and consumes significant energy.  In order to conserve power, only a subset of sensors needs to be active when there are interesting events.  The algorithm is as follows: 1. The nodes sit in idle mode but wake up to sense any change in the environment. 2. If a change is detected then a leader node is elected (the one with the best sense of the change detected). 3. The leader node creates a “belief state” which contains the best known information at the time. 4. The leader node creates a group of nodes to collaborate with and disables other nodes from becoming leader. 5. The leader node propagates the belief state to the next best node and passes “leadership” status to it.
  • 32. C. Heterogeneous Clustered Routing Protocol Heterogeneous- Low energy adaptive clustering hierarchy  It is an energy efficient cluster head election method and using the improved Prim algorithm to construct an inter-cluster routing in the heterogeneous WSN.  It considered three types of sensor nodes having different energy resources.  It uses the minimum spanning tree algorithm to construct an inter-cluster routing.  LEACH-HPR is more efficient to reduce and balance energy consumption and hence enhance the lifetime of WSN
  • 33. D. Heterogen Non-Clustered Routing Protocol CADR: Constrained An-isotropic diffusion routing   It is a general form of Directed Diffusion which deploys two types of nodes, namely line-powered sensors (no energy constraint) and the battery-powered sensors (limited lifetime).   CADR diffuses queries by using a set of information criteria to select which sensors can get the data.   This is achieved by activating only the sensors that are close to a particular event and dynamically adjusting data routes.   Since CADR diffuses queries by using a set of information criteria to select which sensors to get the data, simulation results confirmed that it is more energy efficient than Directed Diffusion where queries are diffused in an isotropic fashion, reaching nearest neighbors first.