SlideShare a Scribd company logo
1 of 17
Implementation and analysis of
WSN Routing Based Protocol
Pawan Kumar Tiwari
Class MCA
Sem 4th
The Definition of WSN
consist of large amount of sensor nodes
Multi-hop, self-organize
wireless communication
cooperative sensing, collection, process
Send to observe.
A wireless sensor network (WSN) is a wireless network consisting of
spatially distributed autonomous devices using sensors to monitor physical or
environmental conditions. A WSN system incorporates a gateway that
provides wireless connectivity back to the wired world and distributed nodes
OBJECTIVE
 Understand about the basics of Ad hoc network, various standards and different
routing protocols including proactive and reactive
 Analyze the trace file and they can check the entire time duration of the simulation
 Determine the best possible path in terms of minimizing the number of hops (path
length), delay, packet loss, cost
 Energy-aware routing increase the lifetime of the network.
 Minimum cost forwarding.
The difference between WSN and
Ad hoc
The number of nodes
Sensor nodes are densely deployed
Sensor nodes are prone to failures
The topology of a sensor network changes very frequently
WSN broadcast but ad hoc point-to point
Sensor node are limited in power computation capacities and memory
 Sensor nodes may not have global identification
What is network simulator
•A network simulator is software that predicts the behavior of
a computer network. Since communication Networks have
become too complex for traditional analytical methods to
provide an accurate understanding of system behavior network
simulator are used.
•In simulators, the computer network is typically modeled with
devices, links, applications etc. and the performance is analysed.
Simulators typically come with support for the most popular
technologies and networks in use today.
Reasons to use NS2 as a platform
•Real time Implementation
•Discrete - Event Simulation
•Plumbing makes NS2 a powerful tool
•Event Scheduler
•Time Synchronization
•Cost effective
•Object Oriented
Routing protocol survey
•Traditional technique
Flooding
Gossiping
•Current routing technique
Flat-routing
Hierarchical-routing
Location-based routing
Flooding
•A classical mechanisms to relay data in sensor
networks without the need for any routing
algorithms and topology maintenance.
•Drawbacks:
•Implosion
•Overlap
•Resource blindness
Gossiping
•A slightly enhanced version of flooding where the
receiving node sends the packet to a randomly selected
neighbor which picks another neighbor to forward the
packet to and so on.
Advantage: avoid the implosion
Drawback: Transmission delay
Routing Challenges and Design Issues
in WSNs
The design of routing protocols in WSNs is influenced by many
challenging factors. These factors must be overcome before efficient
communication can be achieved in WSNs.
Node deployment
Energy considerations
Data delivery model
Node/link heterogeneity
Fault tolerance
Scalability
Network dynamics
Transmission media
Connectivity
Quality of service
ADVANTAGES
WSN offers several advantages over traditional circuit switching
networks. These includes-
Avoids a lot of wiring
Can accommodate new devices at any time
Flexible to go through physical partitions
It can be accessed through a centralized monitor
Infrastructure
Wireless node
Transmission of Packets
FUTURE SCOPE
 More research work needs to be done in future.
 Needs to be implemented in a wireless sensor network with mobile
nodes.
 The effects of very large node densities need to be investigated.
 The feasibility of using the clustering technique and data aggregation
needs to be tested in the same wireless sensor network.
Application of WSN
Defense Advanced Research Projects Agency (DARPA)
 Monitoring friendly forces, equipment and ammunition.
 Battlefield surveillance
 Nuclear, biological and chemical attack detection and reconnaissance etc.
Environmental applications
 Forest fire detection
 Flood detection
Health applications
 Telemonitoring of human physiological data
 Tracking and monitoring patients and doctors inside a hospital
Home applications
 Home automation
 Smart environment
REFERENCES
COMPUTR NETWORKS fourth edition (Andrew S. Tanenbaum)
Websites:
http://www.isi.edu/nsnam/ns/tutorial/index.html
www.webopedia.com
www.wikipedia.com
http://slogix.in/ns2-wireless-sample-programs/index.html
 wsn routing protocol

More Related Content

What's hot

What's hot (20)

Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
 
EC8702 adhoc and wireless sensor networks iv ece
EC8702 adhoc and wireless sensor networks iv eceEC8702 adhoc and wireless sensor networks iv ece
EC8702 adhoc and wireless sensor networks iv ece
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocols
 
Leach protocol
Leach protocolLeach protocol
Leach protocol
 
Medium access control unit 3-33
Medium access control  unit 3-33Medium access control  unit 3-33
Medium access control unit 3-33
 
Design Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDesign Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC Protocol
 
Wireless sensor network applications
Wireless sensor network applicationsWireless sensor network applications
Wireless sensor network applications
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
 
QoS (quality of service)
QoS (quality of service)QoS (quality of service)
QoS (quality of service)
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocol
 
localization in wsn
localization in wsnlocalization in wsn
localization in wsn
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-ppt
 
Schedule Based MAC Protocol
Schedule Based MAC ProtocolSchedule Based MAC Protocol
Schedule Based MAC Protocol
 
Mac
MacMac
Mac
 

Similar to wsn routing protocol

A Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkA Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkIJMER
 
Chapter 2.pptx
Chapter 2.pptxChapter 2.pptx
Chapter 2.pptxsameernsn1
 
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Vinayak Kulkarni
 
kuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptxkuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptxIrawanAbiyantoro1
 
Enhancing the Performance of WSN
Enhancing the Performance of WSNEnhancing the Performance of WSN
Enhancing the Performance of WSNDheeraj Kumar
 
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxAd hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxGomathi454280
 
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxAd hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxGomathi454280
 
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxAd hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxGeetha336913
 
performanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdfperformanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdfABYTHOMAS46
 
Veltech university.pptx
Veltech university.pptxVeltech university.pptx
Veltech university.pptxsundar602496
 
Unit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptxUnit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptxABYTHOMAS46
 
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEYROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEYijscai
 
Chapter 6 WSN.ppt
Chapter 6 WSN.pptChapter 6 WSN.ppt
Chapter 6 WSN.pptTekle12
 
SensorSensorSensorSensorSensorSensor.ppt
SensorSensorSensorSensorSensorSensor.pptSensorSensorSensorSensorSensorSensor.ppt
SensorSensorSensorSensorSensorSensor.pptDEEPAK948083
 
Sensor networks a survey
Sensor networks a surveySensor networks a survey
Sensor networks a surveywsnapple
 

Similar to wsn routing protocol (20)

A Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkA Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor Network
 
Chapter 2.pptx
Chapter 2.pptxChapter 2.pptx
Chapter 2.pptx
 
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
Focal Design Issues Affecting The Deployment Of Wireless Sensor Networks For ...
 
kuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptxkuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptx
 
Enhancing the Performance of WSN
Enhancing the Performance of WSNEnhancing the Performance of WSN
Enhancing the Performance of WSN
 
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxAd hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
 
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxAd hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
 
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxAd hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
 
performanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdfperformanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdf
 
Performance and traffic management for WSNs
Performance and traffic management for WSNsPerformance and traffic management for WSNs
Performance and traffic management for WSNs
 
Veltech university.pptx
Veltech university.pptxVeltech university.pptx
Veltech university.pptx
 
Unit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptxUnit 5-Performance and Trafficmanagement.pptx
Unit 5-Performance and Trafficmanagement.pptx
 
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEYROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 
Chapter 6 WSN.ppt
Chapter 6 WSN.pptChapter 6 WSN.ppt
Chapter 6 WSN.ppt
 
Presentation1
Presentation1Presentation1
Presentation1
 
Sensor.ppt
Sensor.pptSensor.ppt
Sensor.ppt
 
Sensor
SensorSensor
Sensor
 
SensorSensorSensorSensorSensorSensor.ppt
SensorSensorSensorSensorSensorSensor.pptSensorSensorSensorSensorSensorSensor.ppt
SensorSensorSensorSensorSensorSensor.ppt
 
Sensor networks a survey
Sensor networks a surveySensor networks a survey
Sensor networks a survey
 

More from Pawan Kumar Tiwari

Opinion Mining Techniques in Tourisms Part -2
Opinion Mining Techniques in Tourisms  Part -2Opinion Mining Techniques in Tourisms  Part -2
Opinion Mining Techniques in Tourisms Part -2Pawan Kumar Tiwari
 
Opinion Mining Techniques in Tourisms
Opinion Mining Techniques in TourismsOpinion Mining Techniques in Tourisms
Opinion Mining Techniques in TourismsPawan Kumar Tiwari
 
Opinion mining techniques in tourisms
Opinion mining techniques in tourismsOpinion mining techniques in tourisms
Opinion mining techniques in tourismsPawan Kumar Tiwari
 
Review And Evaluations Of Shortest Path Algorithms
Review And Evaluations Of Shortest Path AlgorithmsReview And Evaluations Of Shortest Path Algorithms
Review And Evaluations Of Shortest Path AlgorithmsPawan Kumar Tiwari
 
Review and evaluations of shortest path algorithms
Review and evaluations of shortest path algorithmsReview and evaluations of shortest path algorithms
Review and evaluations of shortest path algorithmsPawan Kumar Tiwari
 

More from Pawan Kumar Tiwari (10)

Mail portal
Mail portalMail portal
Mail portal
 
BIT Error Rate
BIT Error RateBIT Error Rate
BIT Error Rate
 
Opinion Mining Techniques in Tourisms Part -2
Opinion Mining Techniques in Tourisms  Part -2Opinion Mining Techniques in Tourisms  Part -2
Opinion Mining Techniques in Tourisms Part -2
 
Opinion Mining Techniques in Tourisms
Opinion Mining Techniques in TourismsOpinion Mining Techniques in Tourisms
Opinion Mining Techniques in Tourisms
 
Opinion mining techniques in tourisms
Opinion mining techniques in tourismsOpinion mining techniques in tourisms
Opinion mining techniques in tourisms
 
Design Pattern
Design PatternDesign Pattern
Design Pattern
 
Pawan( WSN routing Protocol)
Pawan( WSN routing Protocol)Pawan( WSN routing Protocol)
Pawan( WSN routing Protocol)
 
Review And Evaluations Of Shortest Path Algorithms
Review And Evaluations Of Shortest Path AlgorithmsReview And Evaluations Of Shortest Path Algorithms
Review And Evaluations Of Shortest Path Algorithms
 
Design pattern
Design patternDesign pattern
Design pattern
 
Review and evaluations of shortest path algorithms
Review and evaluations of shortest path algorithmsReview and evaluations of shortest path algorithms
Review and evaluations of shortest path algorithms
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

wsn routing protocol

  • 1. Implementation and analysis of WSN Routing Based Protocol Pawan Kumar Tiwari Class MCA Sem 4th
  • 2. The Definition of WSN consist of large amount of sensor nodes Multi-hop, self-organize wireless communication cooperative sensing, collection, process Send to observe. A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions. A WSN system incorporates a gateway that provides wireless connectivity back to the wired world and distributed nodes
  • 3. OBJECTIVE  Understand about the basics of Ad hoc network, various standards and different routing protocols including proactive and reactive  Analyze the trace file and they can check the entire time duration of the simulation  Determine the best possible path in terms of minimizing the number of hops (path length), delay, packet loss, cost  Energy-aware routing increase the lifetime of the network.  Minimum cost forwarding.
  • 4. The difference between WSN and Ad hoc The number of nodes Sensor nodes are densely deployed Sensor nodes are prone to failures The topology of a sensor network changes very frequently WSN broadcast but ad hoc point-to point Sensor node are limited in power computation capacities and memory  Sensor nodes may not have global identification
  • 5. What is network simulator •A network simulator is software that predicts the behavior of a computer network. Since communication Networks have become too complex for traditional analytical methods to provide an accurate understanding of system behavior network simulator are used. •In simulators, the computer network is typically modeled with devices, links, applications etc. and the performance is analysed. Simulators typically come with support for the most popular technologies and networks in use today.
  • 6. Reasons to use NS2 as a platform •Real time Implementation •Discrete - Event Simulation •Plumbing makes NS2 a powerful tool •Event Scheduler •Time Synchronization •Cost effective •Object Oriented
  • 7. Routing protocol survey •Traditional technique Flooding Gossiping •Current routing technique Flat-routing Hierarchical-routing Location-based routing
  • 8. Flooding •A classical mechanisms to relay data in sensor networks without the need for any routing algorithms and topology maintenance. •Drawbacks: •Implosion •Overlap •Resource blindness
  • 9. Gossiping •A slightly enhanced version of flooding where the receiving node sends the packet to a randomly selected neighbor which picks another neighbor to forward the packet to and so on. Advantage: avoid the implosion Drawback: Transmission delay
  • 10. Routing Challenges and Design Issues in WSNs The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before efficient communication can be achieved in WSNs. Node deployment Energy considerations Data delivery model Node/link heterogeneity Fault tolerance Scalability Network dynamics Transmission media Connectivity Quality of service
  • 11. ADVANTAGES WSN offers several advantages over traditional circuit switching networks. These includes- Avoids a lot of wiring Can accommodate new devices at any time Flexible to go through physical partitions It can be accessed through a centralized monitor Infrastructure
  • 14. FUTURE SCOPE  More research work needs to be done in future.  Needs to be implemented in a wireless sensor network with mobile nodes.  The effects of very large node densities need to be investigated.  The feasibility of using the clustering technique and data aggregation needs to be tested in the same wireless sensor network.
  • 15. Application of WSN Defense Advanced Research Projects Agency (DARPA)  Monitoring friendly forces, equipment and ammunition.  Battlefield surveillance  Nuclear, biological and chemical attack detection and reconnaissance etc. Environmental applications  Forest fire detection  Flood detection Health applications  Telemonitoring of human physiological data  Tracking and monitoring patients and doctors inside a hospital Home applications  Home automation  Smart environment
  • 16. REFERENCES COMPUTR NETWORKS fourth edition (Andrew S. Tanenbaum) Websites: http://www.isi.edu/nsnam/ns/tutorial/index.html www.webopedia.com www.wikipedia.com http://slogix.in/ns2-wireless-sample-programs/index.html

Editor's Notes

  1. 7