SlideShare a Scribd company logo
1 of 57
Mona mohamed ragheb
Routing protocols in WSN
Agenda
2
 Introduction
 Routing challenges in WSN
 Flat Routing
 Hierarchical Routing
 Location-based Routing
 Routing Protocols Based on Protocol Operation
 some Routing protocols
 Conclusion
 References
3
 Routing is a process of selecting paths in a
network along which to send data traffic
 First, it is not possible to build a global addressing
scheme for a large number of sensor nodes. Thus,
traditional IP-based protocols may not be applied to
WSNs. In WSNs, sometimes getting the data is more
important than knowing the IDs of which nodes sent the
data.
 Second, in contrast to typical communication networks,
almost all applications of sensor networks require the
flow of sensed data from multiple sources to a particular
Introduction
4
 Routing protocols in WSNs Differ depending on the
application and network architecture
 sensor nodes are tightly constrained in terms of energy,
processing, and storage capacities. Thus, they require carefully
resource management.
 position awareness of sensor nodes is important since data
collection is normally based on the location.
 data collected by many sensors in WSNs is typically based
on common phenomena, hence there is a high probability
that this data has some redundancy
 Trade-offs between energy and communication overhead
savings
Routing challenges and design
issues
5
 Node deployment
 Energy consumption without losing accuracy
 Data reporting method
 Node/link heterogeneity
 Scalability
 Data aggregation
 Quality of service
Routing challenges and design
issues
6
 Node deployment
 Manual deployment
 Sensors are manually deployed
 Data is routed through predetermined path
 Random deployment
 Optimal clustering is necessary to allow connectivity &
energy-efficiency
 Multi-hop routing
Routing challenges and design
issues
7
 Data reporting method
Application-specific:
• Time-driven: Periodic monitoring
• Event-driven: Respond to sudden changes
• Query-driven: Respond to queries
• Hybrid (combination of delivery models)
Routing challenges and design
issues
8
 Node/link heterogeneity
 Depending on the application, a sensor node can
have a different role or capability such as relaying,
sensing and aggregation
 three functionalities at the same time on a node
might quickly drain the energy of that node.
 Combining these capabilities on one node raises a
challenge for routing protocols.
 For example, hierarchical protocols designate a
cluster head node
Routing challenges and design
issues
9
 Fault tolerance
 The failure of sensor nodes should not affect the
overall task of the sensor network
Routing challenges and design
issues
10
Network dynamics
 Routing messages from or to moving nodes is
more challenging since route and topology
stability become important issues
 Moreover, the phenomenon can be mobile
(e.g., a target detection/ tracking application).
Routing challenges and design
issues
11
 Connectivity
High density  high connectivity
Some sensors may die after consuming their
battery power
Connectivity depends on possibly random
deployment
Routing challenges and design
issues
12
 Coverage
 An individual sensor’s view is limited
 Area coverage is an important design factor
 Data aggregation Since sensor nodes may generate
significant redundant data, similar packets from
multiple nodes can be aggregated to reduce the
number of transmissions.
 Data aggregation is the combination of data from
different sources according to a certain
aggregation function.
 Quality of Service
 Bounded delay
 Energy efficiency for longer network lifetime
13
Routing Protocols in WSNs: A
taxonomy
14
 Proactive protocols :compute all the routes before they
are really needed and then store these routes in a
routing table in each node. When a route changes, the
change has to be propagated throughout the network.
Since a WSN could consist of thousands of nodes, the
routing table that each node would have to keep could
be huge and therefore proactive protocols are not suited
to WSNs.
 Reactive protocols compute routes only when they are
needed.
 Hybrid protocols use a combination of these two ideas.
Routing protocol survey
15
 Traditional technique
 Flooding
 Gossiping
 Current routing technique
 Flat-routing
 Hierarchical-routing
 Location-based routing
[1]Ian F. Akyildiz, Weilian Su, Yogesh Sankarasubramaniam, and Erdal Cayirci Georgia Institute of Technology” A Survey on Sensor Networks” IEEE
Communications Magazine • August 2002
Flooding(1/4)
16
• Flooding is the classic approach for dissemination
without the need for any routing algorithms and
topology maintenance
• Source node sends data to all neighbors
• Receiving node stores and sends data to all its
neighbors
• Disseminate data quickly
 drawbacks:
• Implosion
• Overlap
• Resource blindness
Implosion(2/4)
1
7
Node
The direction
of data sending
The connect
between nodes
A
CB
D
x
x x
x
Overlap(3/4)
1
8
q
r
s
(q, r) (s, r)
Node
The direction
of data sending
The connect
between nodes
The searching
range of the
node
A B
C
Resource blindness(4/4)
1
9
 In flooding, nodes do not modify their activities
based on the amount of energy available to them.
 A network of embedded sensors can be
resource-aware and adapt its communication
and computation to the state of its energy
resource.
Gossiping
20
 A slightly enhanced version of flooding where
the receiving node sends the packet to a
randomly selected neighbor which picks
another neighbor to forward the packet to and
so on.
Advantage: avoid the implosion
Drawback: Transmission delay
Router protocol survey
21
 Traditional routing technique
Flooding
Gossiping
 Current routing technique[1]
Flat-routing
Hierarchical-routing
Location-based routing
[1]JAMAL N. AL-KARAKI, AHMED E. KAMAL,” ROUTING TECHNIQUES IN WIRELESS SENSOR NETWORKS: A SURVEY”,
IEEE Wireless Communications • December 2004
22
 Each node plays the same role (Each node needs to
know only its neighbors)
 Data-centric routing
In data-centric routing, the sink sends queries to certain
regions and waits for data from the sensors located in
the selected regions.
 Save energy through data negotiation and elimination of
redundant data
 Protocols
 SPIN (Sensor Protocols for Information via Negotiation)
 DD (Directed diffusion)
 Rumor routing
Flat-routing (Data centric )
Sensor protocols for information via
negotiation (SPIN)
23
 Features
 Negotiation
 Before transmitting data, nodes negotiate with each other to
overcome implosion and overlap
 Only useful information will be transferred
 Observed data must be described using a meta-data
 Resource adaptation
 Each sensor node has resource manager
 monitoring their own energy resources may reduce certain
activities when energy is low
To extend the operating lifetime of the system
 SPIN Message
 ADV – new data advertisement
 REQ – request for ADV data
 DATA – actual data message Contain actual sensor data with a
meta-data header
 ADV, REQ messages contain only meta-data
Sensor protocols for information via
negotiation (SPIN)
24
• Operation process
Step1
ADV
Step3
DATA
Step2
REQ
Step4
ADV
Step5
REQ
Step6
DATA
Sensor protocols for information via
negotiation (SPIN)
25
 Resource adaptive algorithm
 When energy is plentiful
 Communicate using the 3-stage handshake protocol
 When energy is approaching a low-energy threshold
 If a node receives ADV, it does not send out REQ
 Energy is reserved to sensing the event
 Advantage
 Each node only needs to know its one-hop neighbors
 Significantly reduce energy consumption compared to flooding
 Drawback
- If the node interested in the data are far from the source, data will not
be delivered
- Large overhead
 Data broadcasting
-cannot guarantee delivery of data.
Flat-routing
26
 SPIN (Sensor Protocols for Information via
Negotiation)
 DD (Directed diffusion)
 Rumor routing
Directed Diffusion (DD) Feature
 Data-centric routing protocol
 A path is established between sink node and source
node
 Localized interactions
 The propagation and aggregation procedures are
all based on local information
 Four elements
 Interest
 A task description which is named by a list of
attribute-value pairs that describe a task
 Gradient
 Path direction, data transmission rate
 Data message
 Reinforcement
 To select a single path from multiple paths
27
Directed Diffusion (DD)
28
 Basic scheme
SinkSource
Step 1 : Interest propagation
Interests
Event
SinkSource
Step 2 : Initial gradients setup
Gradients
Event
Low rate
SinkSource
Step 3 : Data delivery along reinforced path
Event
High rate
Directed Diffusion (DD)
29
 Advantage
 Small delay
 Always transmit the data through shortest path
 Robust to failed path
 Drawback
 Imbalance of node lifetime
 The energy of node on shortest path is drained faster than
another
 Time synchronization technique
 To implement data aggregation
 Matching data to queries might require some extra overhead
Rumor Routing
Variation of directed diffusion
 Don’t flood interests (or queries)
 Flood events when the number of events is small
but the number of queries large
 Route the query to the nodes that have observed
a particular event
 Long-lived packets, called agents(Set up path by
random walk, Aggregate paths), flood events
through the network
 When a node detects an event, it adds the event
to its events table, and generates an agent
 Agents travel the network to propagate info about
local events
 An agent is associated with TTL (Time-To-Live) 30
Rumor Routing
31
 Basic scheme
 Each node maintain
 A lists of neighbors
 An event table
 When a node detects an event
 Generate an agent
 Let it travel on a random path
 The visited node form a gradient to the
event
 When a sink needs an event
 Transmit a query
 a node knowing the route to a
corresponding event can respond by
looking up its events table
When a node receives query  checks
its table and returns source –
destination path
Rumor Routing
32
 No need for query flooding 
 Only one path between the source and sink  
 Rumor routing works well only when the number of events is
small 
 Cost of maintaining a large number of agents and large event
tables will be prohibitive 
 Heuristic for defining the route of an event agent highly affects
the performance of next-hop selection 
Router protocol survey
33
 Traditional routing technique
 Flooding
 Gossiping
 Current routing technique
 Flat-routing
 Hierarchical-routing
 Location-based routing
Hierarchical-routing
34
 LEACH (Low Energy Adaptive Clustering
Hierarchy)
 PEGASIS (Power-Efficient Gathering in Sensor
Information Systems)
 TEEN(APTEEN) (Threshold-Sensitive Energy
Efficient Protocols)
LEACH (Low Energy Clustering Hierarchy)
35
 Cluster-based protocol
 Each node randomly decides to become a cluster heads (CH)
 CH chooses the code to be used in its cluster
 CDMA between clusters
 CH broadcasts Adv; Each node decides to which cluster it belongs
based on the received signal strength of Adv
 Nodes can sleep when its not their turn to xmit
 CH compresses data received from the nodes in the cluster and
sends the aggregated data to BS
 CH is rotated randomly
LEACH
36
 Advantages
 Increases the lifetime of the network
 Even drain of energy
 Energy saving due to aggregation by CHs
 Disadvantages
 LEACH assumes all nodes can transmit with enough power
to reach BS if necessary (e.g., elected as CHs)
 Each node should support both TDMA & CDMA
 Need to do time synchronization
 Nodes use single-hop communication
Comparison between SPIN, LEACH &
Directed Diffusion
SPIN LEACH Directed
Diffusion
Optimal
Route
No No Yes
Network
Lifetime
Good Very good Good
Resource
Awareness
Yes Yes Yes
Use of
meta-data
Yes No Yes
37
Power-Efficient Gathering in Sensor
Information Systems (PEGASIS)
38
 Only one node transmits to BS
 When a node dies, the chain is reconstructed in the same
manner to bypass the dead node.
• Data aggregation in the chain  one node sends the data to
the base station
 Performance
 PEGASIS Outperforms LEACH
 By eliminating the overhead of dynamic cluster formation
 By minimizing the total sum of transmission distances
 Decrease the delay for the packets during transmission to the base
station
 Problem
 the single leader can become a bottleneck.
 Scalability problem
 Excessive delay for distant nodes in the chain
The TEEN Protocol
39
 Threshold sensitive Energy Efficient sensor Network
protocol.
 Proactive Protocols (LEACH)
 The nodes in this network periodically switch on their sensors
and transmitters, sense the environment and transmit the data
of interest.
 Reactive Protocols (TEEN)
 The nodes react immediately to sudden and drastic changes
in the value of a sensed attribute.
Multi-level hierarchical clustering in TEEN
& APTEEN
40
TEEN - Functioning
41
 the cluster-head broadcasts two thresholds to
its members:
 Hard Threshold (HT)
 This is a threshold value for the sensed attribute.
 It is the absolute value of the attribute beyond which, the
node sensing this value must switch on its transmitter and
report to its cluster head.
 Soft Threshold (ST)
 This is a small change in the value of the sensed attribute
which triggers the node to switch on its transmitter and
transmit.
TEEN - Hard Threshold
42
 The first time a parameter from the attribute set
reaches its hard threshold value, the node
switches on its transmitter and sends the sensed
data.
 The sensed value is stored in an internal variable
in the node, called the sensed value (SV).
TEEN - Soft Threshold
43
 The nodes will next transmit data in the current
cluster period, only when both the following
conditions are true:
 The current value of the sensed attribute is greater
than the hard threshold.
 The current value of the sensed attribute differs
from SV by an amount equal to or greater than the
soft threshold.
TEEN
44
Good for time-critical applications 
If the thresholds are not reached, the user will
not get any data from the network at all and
will not come to know even if all the nodes die.

This scheme practical implementation would
have to ensure that there are no collisions in
the cluster. 
APTEEN (Adaptive Threshold sensitive
Energy Efficient Network protocol)
45
 APTEEN has been proposed just as an improvement
to TEEN in order to overcome its limitations and
shortcomings.
 APTEEN guarantees lower energy dissipation and a
helps in ensuring a larger number of sensors alive.
 Compared to LEACH, TEEN & APTEEN consumes
less energy (TEEN consumes the least)
 Network lifetime: TEEN ≥ APTEEN ≥ LEACH
Router protocol survey
46
 Traditional routing technique
Flooding
Gossiping
 Current routing technique
Flat-routing
Hierarchical-routing
Location-based routing
Location-based routing
47
 GEAR (Geographic and Energy Aware Routing)
Geographic and Energy Aware Routing
48
Geographic and Energy Aware Routing
 Routing based on a cost function depending on the
distance to the target and the remaining energy.
 A node N receive from a neighbor Ni its cost function
and then updates its own cost function:
H(N,T) = H( Ni , T) + C(N , Ni)
 If no cost function received from the node, then
compute a default cost function:C(N,T)= αd(N,T) + (1- α) Er
Geographic and Energy Aware
Routing
49
 Suppose α = 1
 S is sending a packet to T
 C is the closer neighbor to
T
 S receive new learned cost
function from C.
 Now, B’s cost function is
less than C
T
B C
S
S Sends the packet
through C
 Next packet will be sent
through B
Routing Protocols Based on Protocol
Operation
50
 Multipath Routing Protocols
 Query-Based Routing
 Negotiation-Based Routing Protocols
 QoS-based Routing
 Coherent and Noncoherent Processing
Multipath Routing Protocols
51
 Use multiple paths in order to enhance network
performance
Fault tolerance
Balance energy consumption
Energy-efficient
Reliability
Query-Based Routing
52
Destination nodes propagate a query for data
Usually theses queries are described in
natural language or high-level query language
E.g.
Directed diffusion
Rumor routing protocol
Negotiation-Based Routing Protocols
53
Use high-level data descriptors in order to
eliminate redundant data transmissions
through negotiation
Communication decisions are also made
based on the resources available to them
 E.g.
 SPIN
QoS-based Routing
54
 Has to balance between energy consumption and
data quality
 E.g.
 SPEED (congestion avoidance)
Conclusion
55
 based on the network structure divide three
categories: flat, hierarchical, and location-based
routing protocols.
 The advantages and disadvantages of each
routing technique
 In general hierarchical routing are outperform
than flat routing
reference
56
 I. Akyildiz et al., “A Survey on Sensor Networks,” IEEE Commun.
Mag., vol. 40, no. 8, Aug. 2002, pp. 102–14.
 W. Heinzelman, A. Chandrakasan and H. Balakrishnan,“Energy-
Efficient Communication Protocol for Wireless Microsensor
Networks,” Proc. 33rd Hawaii Int’l. Conf. Sys. Sci., Jan. 2000.
 F. Ye et al., “A Two-Tier Data Dissemination Model for Large-
Scale Wireless S. Hedetniemi and A. Liestman, “A Survey of
Gossiping and broadcasting in Communication Networks,” IEEE
Network, vol. 18, no. 4, 1988, pp. 319–49.
reference
57
 C. Intanagonwiwat, R. Govindan, and D. Estrin, “Directed
Diffusion: a Scalable and Robust Communication Paradigm
for Sensor Networks,” Proc. ACM Mobi- Com 2000, Boston,
MA, 2000, pp. 56–67.
 D. Braginsky and D. Estrin, “Rumor Routing Algorithm for
Sensor Networks,” Proc. 1st Wksp. Sensor Networks and
Apps., Atlanta, GA, Oct. 2002.
 C. Schurgers and M.B. Srivastava, “Energy Efficient Routing
in Wireless Sensor Networks,” MILCOM Proc. Commun. for
Network-Centric Ops.: Creating the Info. Force, McLean, VA,
2001.
 M. Chu, H. Haussecker, and F. Zhao, “Scalable Information
Driven Sensor Querying and Routing for Ad Hoc
Heterogeneous Sensor Networks,” Int’l. J. High Perf. Comp.
Apps., vol. 16, no. 3, Aug. 2002.

More Related Content

What's hot

CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSKathirvel Ayyaswamy
 
Leach-Protocol
Leach-ProtocolLeach-Protocol
Leach-Protocolzhendong
 
Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDNVenkata Naga Ravi
 
Network connectivity devices
Network connectivity devicesNetwork connectivity devices
Network connectivity devicesNumaan Tole
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitecturePeriyanayagiS
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingArunChokkalingam
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Divya Tiwari
 
Basic concepts of wireless communication system
Basic concepts of wireless communication systemBasic concepts of wireless communication system
Basic concepts of wireless communication systemBogs De Castro
 
T mac protocol
T mac protocolT mac protocol
T mac protocolR Islam
 
Network on chip by shoeb
Network on chip by shoebNetwork on chip by shoeb
Network on chip by shoebShoeb Ahmed
 
Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02Ali Habeeb
 
Modulation techniques
Modulation techniquesModulation techniques
Modulation techniquesSathish Kumar
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSNYara Ali
 
100 Technical Interview Questions on Wireless communication, LTE and 5G.
100 Technical Interview Questions on Wireless communication, LTE and 5G.100 Technical Interview Questions on Wireless communication, LTE and 5G.
100 Technical Interview Questions on Wireless communication, LTE and 5G.Pavithra Nagaraj
 
Node level simulators
Node level simulatorsNode level simulators
Node level simulatorsSyedAhamed44
 
Report on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORKReport on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORKNishant Bhardwaj
 
Common channel Signalling System No 7 ppt
Common channel Signalling System No 7 pptCommon channel Signalling System No 7 ppt
Common channel Signalling System No 7 pptSrashti Vyas
 

What's hot (20)

Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & Pegasis
 
Sensor Network
Sensor NetworkSensor Network
Sensor Network
 
CS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKSCS6003 AD HOC AND SENSOR NETWORKS
CS6003 AD HOC AND SENSOR NETWORKS
 
Leach-Protocol
Leach-ProtocolLeach-Protocol
Leach-Protocol
 
Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDN
 
Network connectivity devices
Network connectivity devicesNetwork connectivity devices
Network connectivity devices
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient Routing
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
Basic concepts of wireless communication system
Basic concepts of wireless communication systemBasic concepts of wireless communication system
Basic concepts of wireless communication system
 
T mac protocol
T mac protocolT mac protocol
T mac protocol
 
Network on chip by shoeb
Network on chip by shoebNetwork on chip by shoeb
Network on chip by shoeb
 
Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02Adhoc and Sensor Networks - Chapter 02
Adhoc and Sensor Networks - Chapter 02
 
Modulation techniques
Modulation techniquesModulation techniques
Modulation techniques
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
100 Technical Interview Questions on Wireless communication, LTE and 5G.
100 Technical Interview Questions on Wireless communication, LTE and 5G.100 Technical Interview Questions on Wireless communication, LTE and 5G.
100 Technical Interview Questions on Wireless communication, LTE and 5G.
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 
Node level simulators
Node level simulatorsNode level simulators
Node level simulators
 
Report on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORKReport on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORK
 
Common channel Signalling System No 7 ppt
Common channel Signalling System No 7 pptCommon channel Signalling System No 7 ppt
Common channel Signalling System No 7 ppt
 

Viewers also liked

Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingHabibur Rahman
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor networkshashankcsnits
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
 
Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2Rushin Shah
 
Tổng quan,ứng dụng mạng cảm biến không dây
Tổng quan,ứng dụng mạng cảm biến không dâyTổng quan,ứng dụng mạng cảm biến không dây
Tổng quan,ứng dụng mạng cảm biến không dâyTien Quan
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyAli Habeeb
 

Viewers also liked (10)

Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2Wireless sensors networks protocols part 2
Wireless sensors networks protocols part 2
 
Research Issues on WSN
Research Issues on WSNResearch Issues on WSN
Research Issues on WSN
 
Tổng quan,ứng dụng mạng cảm biến không dây
Tổng quan,ứng dụng mạng cảm biến không dâyTổng quan,ứng dụng mạng cảm biến không dây
Tổng quan,ứng dụng mạng cảm biến không dây
 
Presentation1
Presentation1Presentation1
Presentation1
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 

Similar to Routing

WSN_Chapter 4 Routing Protocols-I.pptx
WSN_Chapter 4 Routing Protocols-I.pptxWSN_Chapter 4 Routing Protocols-I.pptx
WSN_Chapter 4 Routing Protocols-I.pptxRamprakashSingaravel1
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsVirendra Thakur
 
A review of routing protocols in wsn
A review of routing protocols in wsnA review of routing protocols in wsn
A review of routing protocols in wsnAyman Adel
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Energy efficient neighbour selection for flat wireless sensor networks
Energy efficient neighbour selection for flat wireless sensor networksEnergy efficient neighbour selection for flat wireless sensor networks
Energy efficient neighbour selection for flat wireless sensor networkscsandit
 
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKIMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKEditor IJMTER
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNijsrd.com
 
kuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptxkuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptxIrawanAbiyantoro1
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networkspijans
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksEditor IJCATR
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksEditor IJCATR
 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksIRJET Journal
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkijwmn
 
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...ijasuc
 
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...ijasuc
 
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...ijasuc
 

Similar to Routing (20)

WSN_Chapter 4 Routing Protocols-I.pptx
WSN_Chapter 4 Routing Protocols-I.pptxWSN_Chapter 4 Routing Protocols-I.pptx
WSN_Chapter 4 Routing Protocols-I.pptx
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
A review of routing protocols in wsn
A review of routing protocols in wsnA review of routing protocols in wsn
A review of routing protocols in wsn
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
 
3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx
 
Energy efficient neighbour selection for flat wireless sensor networks
Energy efficient neighbour selection for flat wireless sensor networksEnergy efficient neighbour selection for flat wireless sensor networks
Energy efficient neighbour selection for flat wireless sensor networks
 
Thesis-Final-slide
Thesis-Final-slideThesis-Final-slide
Thesis-Final-slide
 
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKIMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
IMPROVING THE PERFORMACE OF DATA AGGREGATION IN WIRELESS SENSOR NETWORK
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
 
kuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptxkuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptx
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor Networks
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor Networks
 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
 
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
 
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
 
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
A FASTER ROUTING SCHEME FOR STATIONARY WIRELESS SENSOR NETWORKS - A HYBRID AP...
 
Rmdtn ppt
Rmdtn pptRmdtn ppt
Rmdtn ppt
 

More from ahmad abdelhafeez

Surveying cross layer protocols in ws ns
Surveying cross layer protocols in ws nsSurveying cross layer protocols in ws ns
Surveying cross layer protocols in ws nsahmad abdelhafeez
 
Energy harvesting sensor nodes
Energy harvesting sensor nodes   Energy harvesting sensor nodes
Energy harvesting sensor nodes ahmad abdelhafeez
 
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...ahmad abdelhafeez
 
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...ahmad abdelhafeez
 
Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networksahmad abdelhafeez
 
Sdn pres v2-Software-defined networks
Sdn pres v2-Software-defined networksSdn pres v2-Software-defined networks
Sdn pres v2-Software-defined networksahmad abdelhafeez
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emamahmad abdelhafeez
 
Malewareanalysis presentation
Malewareanalysis presentationMalewareanalysis presentation
Malewareanalysis presentationahmad abdelhafeez
 

More from ahmad abdelhafeez (20)

Surveying cross layer protocols in ws ns
Surveying cross layer protocols in ws nsSurveying cross layer protocols in ws ns
Surveying cross layer protocols in ws ns
 
Service level management
Service level managementService level management
Service level management
 
Energy harvesting sensor nodes
Energy harvesting sensor nodes   Energy harvesting sensor nodes
Energy harvesting sensor nodes
 
V5I3_IJERTV5IS031157
V5I3_IJERTV5IS031157V5I3_IJERTV5IS031157
V5I3_IJERTV5IS031157
 
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
 
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-Classif...
 
Energy conservation in wireless sensor networks
Energy conservation in wireless sensor networksEnergy conservation in wireless sensor networks
Energy conservation in wireless sensor networks
 
Localization in wsn
Localization in wsnLocalization in wsn
Localization in wsn
 
Wsn security issues
Wsn security issuesWsn security issues
Wsn security issues
 
Trusted systems
Trusted systemsTrusted systems
Trusted systems
 
opnet
opnetopnet
opnet
 
Wsn security issues
Wsn security issuesWsn security issues
Wsn security issues
 
Sdn pres v2-Software-defined networks
Sdn pres v2-Software-defined networksSdn pres v2-Software-defined networks
Sdn pres v2-Software-defined networks
 
Intrusion prevension
Intrusion prevensionIntrusion prevension
Intrusion prevension
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emam
 
Digital forensics.abdallah
Digital forensics.abdallahDigital forensics.abdallah
Digital forensics.abdallah
 
Cloud computing final show
Cloud computing final   showCloud computing final   show
Cloud computing final show
 
Incident handling.final
Incident handling.finalIncident handling.final
Incident handling.final
 
Malewareanalysis presentation
Malewareanalysis presentationMalewareanalysis presentation
Malewareanalysis presentation
 
pentration testing
pentration testingpentration testing
pentration testing
 

Recently uploaded

Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniquesugginaramesh
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 

Recently uploaded (20)

9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 

Routing

  • 1. Mona mohamed ragheb Routing protocols in WSN
  • 2. Agenda 2  Introduction  Routing challenges in WSN  Flat Routing  Hierarchical Routing  Location-based Routing  Routing Protocols Based on Protocol Operation  some Routing protocols  Conclusion  References
  • 3. 3  Routing is a process of selecting paths in a network along which to send data traffic  First, it is not possible to build a global addressing scheme for a large number of sensor nodes. Thus, traditional IP-based protocols may not be applied to WSNs. In WSNs, sometimes getting the data is more important than knowing the IDs of which nodes sent the data.  Second, in contrast to typical communication networks, almost all applications of sensor networks require the flow of sensed data from multiple sources to a particular Introduction
  • 4. 4  Routing protocols in WSNs Differ depending on the application and network architecture  sensor nodes are tightly constrained in terms of energy, processing, and storage capacities. Thus, they require carefully resource management.  position awareness of sensor nodes is important since data collection is normally based on the location.  data collected by many sensors in WSNs is typically based on common phenomena, hence there is a high probability that this data has some redundancy  Trade-offs between energy and communication overhead savings
  • 5. Routing challenges and design issues 5  Node deployment  Energy consumption without losing accuracy  Data reporting method  Node/link heterogeneity  Scalability  Data aggregation  Quality of service
  • 6. Routing challenges and design issues 6  Node deployment  Manual deployment  Sensors are manually deployed  Data is routed through predetermined path  Random deployment  Optimal clustering is necessary to allow connectivity & energy-efficiency  Multi-hop routing
  • 7. Routing challenges and design issues 7  Data reporting method Application-specific: • Time-driven: Periodic monitoring • Event-driven: Respond to sudden changes • Query-driven: Respond to queries • Hybrid (combination of delivery models)
  • 8. Routing challenges and design issues 8  Node/link heterogeneity  Depending on the application, a sensor node can have a different role or capability such as relaying, sensing and aggregation  three functionalities at the same time on a node might quickly drain the energy of that node.  Combining these capabilities on one node raises a challenge for routing protocols.  For example, hierarchical protocols designate a cluster head node
  • 9. Routing challenges and design issues 9  Fault tolerance  The failure of sensor nodes should not affect the overall task of the sensor network
  • 10. Routing challenges and design issues 10 Network dynamics  Routing messages from or to moving nodes is more challenging since route and topology stability become important issues  Moreover, the phenomenon can be mobile (e.g., a target detection/ tracking application).
  • 11. Routing challenges and design issues 11  Connectivity High density  high connectivity Some sensors may die after consuming their battery power Connectivity depends on possibly random deployment
  • 12. Routing challenges and design issues 12  Coverage  An individual sensor’s view is limited  Area coverage is an important design factor  Data aggregation Since sensor nodes may generate significant redundant data, similar packets from multiple nodes can be aggregated to reduce the number of transmissions.  Data aggregation is the combination of data from different sources according to a certain aggregation function.  Quality of Service  Bounded delay  Energy efficiency for longer network lifetime
  • 13. 13 Routing Protocols in WSNs: A taxonomy
  • 14. 14  Proactive protocols :compute all the routes before they are really needed and then store these routes in a routing table in each node. When a route changes, the change has to be propagated throughout the network. Since a WSN could consist of thousands of nodes, the routing table that each node would have to keep could be huge and therefore proactive protocols are not suited to WSNs.  Reactive protocols compute routes only when they are needed.  Hybrid protocols use a combination of these two ideas.
  • 15. Routing protocol survey 15  Traditional technique  Flooding  Gossiping  Current routing technique  Flat-routing  Hierarchical-routing  Location-based routing [1]Ian F. Akyildiz, Weilian Su, Yogesh Sankarasubramaniam, and Erdal Cayirci Georgia Institute of Technology” A Survey on Sensor Networks” IEEE Communications Magazine • August 2002
  • 16. Flooding(1/4) 16 • Flooding is the classic approach for dissemination without the need for any routing algorithms and topology maintenance • Source node sends data to all neighbors • Receiving node stores and sends data to all its neighbors • Disseminate data quickly  drawbacks: • Implosion • Overlap • Resource blindness
  • 17. Implosion(2/4) 1 7 Node The direction of data sending The connect between nodes A CB D x x x x
  • 18. Overlap(3/4) 1 8 q r s (q, r) (s, r) Node The direction of data sending The connect between nodes The searching range of the node A B C
  • 19. Resource blindness(4/4) 1 9  In flooding, nodes do not modify their activities based on the amount of energy available to them.  A network of embedded sensors can be resource-aware and adapt its communication and computation to the state of its energy resource.
  • 20. Gossiping 20  A slightly enhanced version of flooding where the receiving node sends the packet to a randomly selected neighbor which picks another neighbor to forward the packet to and so on. Advantage: avoid the implosion Drawback: Transmission delay
  • 21. Router protocol survey 21  Traditional routing technique Flooding Gossiping  Current routing technique[1] Flat-routing Hierarchical-routing Location-based routing [1]JAMAL N. AL-KARAKI, AHMED E. KAMAL,” ROUTING TECHNIQUES IN WIRELESS SENSOR NETWORKS: A SURVEY”, IEEE Wireless Communications • December 2004
  • 22. 22  Each node plays the same role (Each node needs to know only its neighbors)  Data-centric routing In data-centric routing, the sink sends queries to certain regions and waits for data from the sensors located in the selected regions.  Save energy through data negotiation and elimination of redundant data  Protocols  SPIN (Sensor Protocols for Information via Negotiation)  DD (Directed diffusion)  Rumor routing Flat-routing (Data centric )
  • 23. Sensor protocols for information via negotiation (SPIN) 23  Features  Negotiation  Before transmitting data, nodes negotiate with each other to overcome implosion and overlap  Only useful information will be transferred  Observed data must be described using a meta-data  Resource adaptation  Each sensor node has resource manager  monitoring their own energy resources may reduce certain activities when energy is low To extend the operating lifetime of the system  SPIN Message  ADV – new data advertisement  REQ – request for ADV data  DATA – actual data message Contain actual sensor data with a meta-data header  ADV, REQ messages contain only meta-data
  • 24. Sensor protocols for information via negotiation (SPIN) 24 • Operation process Step1 ADV Step3 DATA Step2 REQ Step4 ADV Step5 REQ Step6 DATA
  • 25. Sensor protocols for information via negotiation (SPIN) 25  Resource adaptive algorithm  When energy is plentiful  Communicate using the 3-stage handshake protocol  When energy is approaching a low-energy threshold  If a node receives ADV, it does not send out REQ  Energy is reserved to sensing the event  Advantage  Each node only needs to know its one-hop neighbors  Significantly reduce energy consumption compared to flooding  Drawback - If the node interested in the data are far from the source, data will not be delivered - Large overhead  Data broadcasting -cannot guarantee delivery of data.
  • 26. Flat-routing 26  SPIN (Sensor Protocols for Information via Negotiation)  DD (Directed diffusion)  Rumor routing
  • 27. Directed Diffusion (DD) Feature  Data-centric routing protocol  A path is established between sink node and source node  Localized interactions  The propagation and aggregation procedures are all based on local information  Four elements  Interest  A task description which is named by a list of attribute-value pairs that describe a task  Gradient  Path direction, data transmission rate  Data message  Reinforcement  To select a single path from multiple paths 27
  • 28. Directed Diffusion (DD) 28  Basic scheme SinkSource Step 1 : Interest propagation Interests Event SinkSource Step 2 : Initial gradients setup Gradients Event Low rate SinkSource Step 3 : Data delivery along reinforced path Event High rate
  • 29. Directed Diffusion (DD) 29  Advantage  Small delay  Always transmit the data through shortest path  Robust to failed path  Drawback  Imbalance of node lifetime  The energy of node on shortest path is drained faster than another  Time synchronization technique  To implement data aggregation  Matching data to queries might require some extra overhead
  • 30. Rumor Routing Variation of directed diffusion  Don’t flood interests (or queries)  Flood events when the number of events is small but the number of queries large  Route the query to the nodes that have observed a particular event  Long-lived packets, called agents(Set up path by random walk, Aggregate paths), flood events through the network  When a node detects an event, it adds the event to its events table, and generates an agent  Agents travel the network to propagate info about local events  An agent is associated with TTL (Time-To-Live) 30
  • 31. Rumor Routing 31  Basic scheme  Each node maintain  A lists of neighbors  An event table  When a node detects an event  Generate an agent  Let it travel on a random path  The visited node form a gradient to the event  When a sink needs an event  Transmit a query  a node knowing the route to a corresponding event can respond by looking up its events table When a node receives query  checks its table and returns source – destination path
  • 32. Rumor Routing 32  No need for query flooding   Only one path between the source and sink    Rumor routing works well only when the number of events is small   Cost of maintaining a large number of agents and large event tables will be prohibitive   Heuristic for defining the route of an event agent highly affects the performance of next-hop selection 
  • 33. Router protocol survey 33  Traditional routing technique  Flooding  Gossiping  Current routing technique  Flat-routing  Hierarchical-routing  Location-based routing
  • 34. Hierarchical-routing 34  LEACH (Low Energy Adaptive Clustering Hierarchy)  PEGASIS (Power-Efficient Gathering in Sensor Information Systems)  TEEN(APTEEN) (Threshold-Sensitive Energy Efficient Protocols)
  • 35. LEACH (Low Energy Clustering Hierarchy) 35  Cluster-based protocol  Each node randomly decides to become a cluster heads (CH)  CH chooses the code to be used in its cluster  CDMA between clusters  CH broadcasts Adv; Each node decides to which cluster it belongs based on the received signal strength of Adv  Nodes can sleep when its not their turn to xmit  CH compresses data received from the nodes in the cluster and sends the aggregated data to BS  CH is rotated randomly
  • 36. LEACH 36  Advantages  Increases the lifetime of the network  Even drain of energy  Energy saving due to aggregation by CHs  Disadvantages  LEACH assumes all nodes can transmit with enough power to reach BS if necessary (e.g., elected as CHs)  Each node should support both TDMA & CDMA  Need to do time synchronization  Nodes use single-hop communication
  • 37. Comparison between SPIN, LEACH & Directed Diffusion SPIN LEACH Directed Diffusion Optimal Route No No Yes Network Lifetime Good Very good Good Resource Awareness Yes Yes Yes Use of meta-data Yes No Yes 37
  • 38. Power-Efficient Gathering in Sensor Information Systems (PEGASIS) 38  Only one node transmits to BS  When a node dies, the chain is reconstructed in the same manner to bypass the dead node. • Data aggregation in the chain  one node sends the data to the base station  Performance  PEGASIS Outperforms LEACH  By eliminating the overhead of dynamic cluster formation  By minimizing the total sum of transmission distances  Decrease the delay for the packets during transmission to the base station  Problem  the single leader can become a bottleneck.  Scalability problem  Excessive delay for distant nodes in the chain
  • 39. The TEEN Protocol 39  Threshold sensitive Energy Efficient sensor Network protocol.  Proactive Protocols (LEACH)  The nodes in this network periodically switch on their sensors and transmitters, sense the environment and transmit the data of interest.  Reactive Protocols (TEEN)  The nodes react immediately to sudden and drastic changes in the value of a sensed attribute.
  • 40. Multi-level hierarchical clustering in TEEN & APTEEN 40
  • 41. TEEN - Functioning 41  the cluster-head broadcasts two thresholds to its members:  Hard Threshold (HT)  This is a threshold value for the sensed attribute.  It is the absolute value of the attribute beyond which, the node sensing this value must switch on its transmitter and report to its cluster head.  Soft Threshold (ST)  This is a small change in the value of the sensed attribute which triggers the node to switch on its transmitter and transmit.
  • 42. TEEN - Hard Threshold 42  The first time a parameter from the attribute set reaches its hard threshold value, the node switches on its transmitter and sends the sensed data.  The sensed value is stored in an internal variable in the node, called the sensed value (SV).
  • 43. TEEN - Soft Threshold 43  The nodes will next transmit data in the current cluster period, only when both the following conditions are true:  The current value of the sensed attribute is greater than the hard threshold.  The current value of the sensed attribute differs from SV by an amount equal to or greater than the soft threshold.
  • 44. TEEN 44 Good for time-critical applications  If the thresholds are not reached, the user will not get any data from the network at all and will not come to know even if all the nodes die.  This scheme practical implementation would have to ensure that there are no collisions in the cluster. 
  • 45. APTEEN (Adaptive Threshold sensitive Energy Efficient Network protocol) 45  APTEEN has been proposed just as an improvement to TEEN in order to overcome its limitations and shortcomings.  APTEEN guarantees lower energy dissipation and a helps in ensuring a larger number of sensors alive.  Compared to LEACH, TEEN & APTEEN consumes less energy (TEEN consumes the least)  Network lifetime: TEEN ≥ APTEEN ≥ LEACH
  • 46. Router protocol survey 46  Traditional routing technique Flooding Gossiping  Current routing technique Flat-routing Hierarchical-routing Location-based routing
  • 47. Location-based routing 47  GEAR (Geographic and Energy Aware Routing)
  • 48. Geographic and Energy Aware Routing 48 Geographic and Energy Aware Routing  Routing based on a cost function depending on the distance to the target and the remaining energy.  A node N receive from a neighbor Ni its cost function and then updates its own cost function: H(N,T) = H( Ni , T) + C(N , Ni)  If no cost function received from the node, then compute a default cost function:C(N,T)= αd(N,T) + (1- α) Er
  • 49. Geographic and Energy Aware Routing 49  Suppose α = 1  S is sending a packet to T  C is the closer neighbor to T  S receive new learned cost function from C.  Now, B’s cost function is less than C T B C S S Sends the packet through C  Next packet will be sent through B
  • 50. Routing Protocols Based on Protocol Operation 50  Multipath Routing Protocols  Query-Based Routing  Negotiation-Based Routing Protocols  QoS-based Routing  Coherent and Noncoherent Processing
  • 51. Multipath Routing Protocols 51  Use multiple paths in order to enhance network performance Fault tolerance Balance energy consumption Energy-efficient Reliability
  • 52. Query-Based Routing 52 Destination nodes propagate a query for data Usually theses queries are described in natural language or high-level query language E.g. Directed diffusion Rumor routing protocol
  • 53. Negotiation-Based Routing Protocols 53 Use high-level data descriptors in order to eliminate redundant data transmissions through negotiation Communication decisions are also made based on the resources available to them  E.g.  SPIN
  • 54. QoS-based Routing 54  Has to balance between energy consumption and data quality  E.g.  SPEED (congestion avoidance)
  • 55. Conclusion 55  based on the network structure divide three categories: flat, hierarchical, and location-based routing protocols.  The advantages and disadvantages of each routing technique  In general hierarchical routing are outperform than flat routing
  • 56. reference 56  I. Akyildiz et al., “A Survey on Sensor Networks,” IEEE Commun. Mag., vol. 40, no. 8, Aug. 2002, pp. 102–14.  W. Heinzelman, A. Chandrakasan and H. Balakrishnan,“Energy- Efficient Communication Protocol for Wireless Microsensor Networks,” Proc. 33rd Hawaii Int’l. Conf. Sys. Sci., Jan. 2000.  F. Ye et al., “A Two-Tier Data Dissemination Model for Large- Scale Wireless S. Hedetniemi and A. Liestman, “A Survey of Gossiping and broadcasting in Communication Networks,” IEEE Network, vol. 18, no. 4, 1988, pp. 319–49.
  • 57. reference 57  C. Intanagonwiwat, R. Govindan, and D. Estrin, “Directed Diffusion: a Scalable and Robust Communication Paradigm for Sensor Networks,” Proc. ACM Mobi- Com 2000, Boston, MA, 2000, pp. 56–67.  D. Braginsky and D. Estrin, “Rumor Routing Algorithm for Sensor Networks,” Proc. 1st Wksp. Sensor Networks and Apps., Atlanta, GA, Oct. 2002.  C. Schurgers and M.B. Srivastava, “Energy Efficient Routing in Wireless Sensor Networks,” MILCOM Proc. Commun. for Network-Centric Ops.: Creating the Info. Force, McLean, VA, 2001.  M. Chu, H. Haussecker, and F. Zhao, “Scalable Information Driven Sensor Querying and Routing for Ad Hoc Heterogeneous Sensor Networks,” Int’l. J. High Perf. Comp. Apps., vol. 16, no. 3, Aug. 2002.