SlideShare a Scribd company logo
1 of 34
RoutingProtocols
forWireless
SensorNetworks
By:
Murtadha S. Al-Sabbagh
Supervised By:
Dr. Muhammed Najm Al-Salam
Overview
• Introduction
• Data Dissemination and Gathering
• Routing Challenges and Issues
• Routing Strategies for wireless networks
• WSN routing techniques
• WSN routing protocols comparison
• Protocol Selection
INTRODUCTION
• The main task of wireless sensor nodes is to sense and collect
data from a target domain, process the data, and transmit the
information back to specific sites where the underlying
application resides.
• Achieving this task efficiently requires the development of an
energy-efficient routing protocol to set up paths between
sensor nodes and the data sink.
DATA DISSEMINATION AND
GATHERING
• Data dissemination is a process by which data and queries for
data are routed in the sensor network.
• In a scope of data dissemination, a source is the node that
generates the data and a node that is interested in data is called
sink.
• Data gathering is to transmit data that has been collected by
the sensor nodes to the base station.
ROUTINGCHALLENGESANDDESIGNISSUES
1.Network Scale and Time-Varying Characteristics:
• the densities of the WSNs may vary widely, ranging from very
sparse to very dense.
• in many applications, the sensor nodes numbering in the
hundreds if not thousands, are deployed in an ad hoc and often
unsupervised manner over wide coverage areas.
• In these networks, the behavior of sensor nodes is dynamic and
highly adaptive .
ROUTINGCHALLENGESANDDESIGNISSUES
2. Resource Constraints:
• Energy is a key concern in WSNs, which must achieve a long
lifetime while operating on limited battery reserves.
• Also the WSN nodes have low technical specifications that
must be taken into consideration when designing a WSN
routing protocol.
ROUTINGCHALLENGESANDDESIGNISSUES
3. Sensor Applications Data Models:
• The data model describes the flow of information between the
sensor nodes and the data sink.
• These models depends on the nature of the application.
• The need to support a variety of data models increases the
complexity of the routing design problem.
ROUTINGSTRATEGIESINWIRELESS
NETWORKS
• Mobile Wireless Networks :
• Ad-hoc networks.
• WSNs.
• Ad-hoc networks have several protocols like :
1. Proactive strategy relies on periodic dissemination of routing
information to maintain consistent and accurate routing
tables across all nodes of the network.
2. Reactive strategy :establish routes to a limited set of
destinations on demand..
3. Hybrid strategy.
ROUTINGSTRATEGIESINWIRELESS
NETWORKS
• Ad-hoc networks routing protocols are not suited for WSNs for the
following reasons:
1. Ad-hoc networks tend to exhibit their least desirable behavior under
highly dynamic conditions.
2. Routing protocol overhead typically increases dramatically with
increased network size and dynamics.
3. A large overhead can easily overwhelm network resources.
Furthermore.
4. Traditional routing protocols operating in large networks require
substantial internodal coordination, and in some cases global
flooding.
5. Capabilities of the ad-hoc network nodes are relatively high
compared to sensor nodes
• New routing strategies are therefore required for sensor networks.
WSNRoutingTechniques
1. flat network architecture protocols in which all nodes are
considered peers.
2. Data-centric routing protocols use attribute-based naming,
whereby a source node queries an attribute for the
phenomenon rather than an individual sensor node.
3. Hierarchical routing protocols imposes a structure on the
network.
4. Location based protocols where location information is
needed in order to calculate the distance between two
particular nodes so that energy consumption can be
estimated.
1.flatnetworkarchitecture
protocols
• all nodes are considered peers.
• A flat network architecture has several advantages, including
minimal overhead to maintain the infrastructure
• and the potential for the discovery of multiple routes between
communicating nodes for fault tolerance.
1.1Flooding And Gossiping
• In flooding, each sensor receiving a data packet broadcasts it
to all of its neighbors and this process continues until the
packet arrives at the destination or the maximum number of
hops for the packet is reached.
1.1Flooding And Gossiping
1.1Flooding And Gossiping
• Gossiping is a slightly enhanced version of flooding where the
receiving node sends the packet to a randomly selected
neighbor, which picks another random neighbor to forward the
packet to and so on.
• Gossiping avoids the implosion problem by limiting the
number of packets that each node sends to its neighbor to one
copy.
• The latency that a packet suffers on its way to the destination
may be excessive, particularly in a large network.
2.Data-centricProtocols
• A source node queries an attribute for the phenomenon rather
than an individual sensor node.
• The interest dissemination is achieved by assigning tasks to
sensor nodes and expressing queries to relative to specific
attributes.
• Different strategies can be used to communicate interests to
the sensor nodes, including broadcasting and attribute-based
multicasting.
2.1SPIN
• Sensor Protocols for Information via Negotiation.
• The main objective of SPIN is to overcome the
shortcomings of conventional protocols like flooding.
• The basic property of this family of protocols are data
negotiation and resource adaptation.
• data negotiation requires that nodes running SPIN
‘‘learn’’ about the content of the data before any data are
transmitted between network nodes.
2.1SPIN
• To carry out negotiation and data transmission, nodes
running SPIN use three types of messages:
• The first message type, ADV (advertise)
• The second message type, REQ (request)
• The third message type, DATA
2.1SPIN
• Basic operation of SPIN
2.1SPIN
• SPIN versions:
• SPIN-PP (Basic Handshake sequence)
• SPIN-EC (When a node energy level approaches the low
threshold, a node running SPIN-EC reduces its
participation in the protocol operations.)
2.1SPIN
• SPIN-BC (Is designed for broadcast networks where the ADV
signal will reach all the sensors in the coverage area of the
source)
• SPIN-RL (Enhance its reliability and overcome message
transmission errors caused by a lossy channel). by periodic
broadcasting of ADV and REQ)
2.2DirectedDiffusion
• Directed diffusion is a data - centric paradigm for sensor query
dissemination and processing that provides energy efficiency,
scalability, and robustness.
• In contrast to SPIN, in direct diffusion the sink is the node that
broadcast the request for a specific data throughout the
network in what is called an “ interest message”.
• A gradient can be thought of as a reply link pointing toward
the neighboring node from which the interest is received.
2.2DirectedDiffusion
3.HierarchicalProtocols
• The main aim of hierarchical routing is to efficiently maintain
the energy consumption of sensor nodes by:
• involving them in multi-hop communication within a
particular cluster.
• performing data aggregation and fusion in order to decrease
the number of transmitted messages to the sink.
3.1LEACH
• Low-energy adaptive clustering hierarchy (LEACH) is one of
the most popular hierarchical routing algorithms for sensor
networks.
• The idea is to form clusters of the sensor nodes based on the
received signal strength and use local cluster heads as routers
to the sink.
• The main objectives of LEACH are:
1. Extension of the network lifetime
2. Reduced energy consumption
3. Use of data aggregation to reduce the number
of communication messages
3.1LEACH
• Cluster heads change randomly over time in order to balance
the energy dissipation of nodes.
• The LEACH operation can be depicted by the following two
phases:
• 1.setup phase: In which the cluster head selection is performed.
• 2.steady-state phase: In which data collection, aggregation and
delivery to the base station happens.
3.2PEGASIS
• Power-efficient gathering in Sensor Information Systems
(PEGASIS) is an improvement of the LEACH protocol.
• Rather than using a tree or star hierarchy as in the LEACH
protocol , the PEGASIS protocol uses chain hierarchy.
• Data aggregation is carried out by :
• 1. The chain leader (3) issues a token to the right most node
telling it to send its sensing information, when the request
reaches node (7) it sends the information to node (6) where this
one aggregate its information to it and consequently until the
aggregated information reaches node (3)
• 2.Node (3) issues the same operation to the left most node and
after having all the information from the left and right sided
sends the aggregated information to the sink.
43 5 6210 7
3.2PEGASIS
• The sequential approach discussed before is not practical and
consumes time.
• A better approach would be using parallelism in aggregation.
• In this approach node can use CDMA to work simultaneously
and not interfere with each other.
• Starting from the bottom up in the figure:
• First each node send its date to the
neighbor odd node.
• Secondly each odd node sends its data.
• Last node 7 send its aggregated data to
Node 3.
7
4.Locationbasedprotocols
• The main objective of geographical routing is to use location
information to formulate an efficient route search toward the
destination.
• Geographical routing is very suitable to sensor networks,
where data aggregation is a useful technique to minimize the
number of transmissions toward the base station by eliminating
redundancy among packets from different sources.
4.1GeographicRouting
• A node knows its own location, the locations of its neighbors, and the
destination’s location (D)
• The destination’s location is included in the packet header
• Forwarding decision is based on local distance information
• Greedy Forwarding: achieve max progress towards D
x D
y
Greedy Forwarding
4.1GeographicRouting
• Greedy forwarding
• Next hop is the neighbor that gets the packet closest to destination
• Greedy forwarding can lead into a dead end, where there is no
neighbor closer to the destination.
destination
source
4.1GeographicRouting
• The solution is to use a combination of greedy routing with
what called (face routing), where the latter is a technique of
routing that rout packets on the faces of the path
• Figure below illustrates face routing .
WSNroutingprotocols
comparison
• LEACH, PEGASIS, SPIN, DD, Geographical routing
comparison below :
RoutingProtocolsSelectionfor
particularapplications
• LEACH, PEGASIS, SPIN, DD, Geographical routing
comparison below :
Thank you ^_~

More Related Content

What's hot

Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network YunusKhan38
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingArunChokkalingam
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocolSuganthiN2
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitecturePeriyanayagiS
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Divya Tiwari
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksChandra Meena
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 
Design Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDesign Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDushhyant Kumar
 
Umts system architecture
Umts system architectureUmts system architecture
Umts system architectureMidhun S
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks DEBABRATASINGH3
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Accessanushkashastri
 
Adhoc wireless networks and its issues
Adhoc wireless networks and its issuesAdhoc wireless networks and its issues
Adhoc wireless networks and its issuesMenaga Selvaraj
 
energy efficient unicast
energy efficient unicastenergy efficient unicast
energy efficient unicastAravindM170274
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSNYara Ali
 
Mac protocols
Mac protocolsMac protocols
Mac protocolsjuno susi
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingHabibur Rahman
 

What's hot (20)

Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network
 
WSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient RoutingWSN-Routing Protocols Energy Efficient Routing
WSN-Routing Protocols Energy Efficient Routing
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocol
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
 
Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks Routing protocols for ad hoc wireless networks
Routing protocols for ad hoc wireless networks
 
Lecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networksLecture 23 27. quality of services in ad hoc wireless networks
Lecture 23 27. quality of services in ad hoc wireless networks
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Design Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC ProtocolDesign Issues In Adhoc Wireless MAC Protocol
Design Issues In Adhoc Wireless MAC Protocol
 
AODV routing protocol
AODV routing protocolAODV routing protocol
AODV routing protocol
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
Umts system architecture
Umts system architectureUmts system architecture
Umts system architecture
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks
 
Demand Assigned Multiple Access
Demand Assigned Multiple AccessDemand Assigned Multiple Access
Demand Assigned Multiple Access
 
Adhoc wireless networks and its issues
Adhoc wireless networks and its issuesAdhoc wireless networks and its issues
Adhoc wireless networks and its issues
 
energy efficient unicast
energy efficient unicastenergy efficient unicast
energy efficient unicast
 
Channel Allocation.pptx
Channel Allocation.pptxChannel Allocation.pptx
Channel Allocation.pptx
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
 

Viewers also liked

Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsVirendra Thakur
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksDarpan Dekivadiya
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor networkdeawoo Kim
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksZaahir Salam
 
Libelium: IoT in the real world- wireless sensor networks and their endless a...
Libelium: IoT in the real world- wireless sensor networks and their endless a...Libelium: IoT in the real world- wireless sensor networks and their endless a...
Libelium: IoT in the real world- wireless sensor networks and their endless a...SIPRI
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networkssashar86
 
Geo-Cast Routing Protocol
Geo-Cast Routing ProtocolGeo-Cast Routing Protocol
Geo-Cast Routing Protocolchirag bhatt
 
clustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHclustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHJimit Rupani
 
Study of Leach Protocol- A Review
Study of Leach Protocol- A ReviewStudy of Leach Protocol- A Review
Study of Leach Protocol- A ReviewEditor IJMTER
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyAli Habeeb
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKTejas Wasule
 
Geographical routing presentation
Geographical routing presentationGeographical routing presentation
Geographical routing presentationApoorva Nagaraj
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor NetworksKarthik
 

Viewers also liked (20)

Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor Networks
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Libelium: IoT in the real world- wireless sensor networks and their endless a...
Libelium: IoT in the real world- wireless sensor networks and their endless a...Libelium: IoT in the real world- wireless sensor networks and their endless a...
Libelium: IoT in the real world- wireless sensor networks and their endless a...
 
wsn routing protocol
 wsn routing protocol wsn routing protocol
wsn routing protocol
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networks
 
Thesis-Final-slide
Thesis-Final-slideThesis-Final-slide
Thesis-Final-slide
 
Geo-Cast Routing Protocol
Geo-Cast Routing ProtocolGeo-Cast Routing Protocol
Geo-Cast Routing Protocol
 
clustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHclustering protocol in WSN:LEACH
clustering protocol in WSN:LEACH
 
Study of Leach Protocol- A Review
Study of Leach Protocol- A ReviewStudy of Leach Protocol- A Review
Study of Leach Protocol- A Review
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
Geographical routing presentation
Geographical routing presentationGeographical routing presentation
Geographical routing presentation
 
Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & Pegasis
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 

Similar to WSN Routing Protocols

A review of routing protocols in wsn
A review of routing protocols in wsnA review of routing protocols in wsn
A review of routing protocols in wsnAyman Adel
 
Chapter_13_Energy-Efficient_WSN_Slides.ppt
Chapter_13_Energy-Efficient_WSN_Slides.pptChapter_13_Energy-Efficient_WSN_Slides.ppt
Chapter_13_Energy-Efficient_WSN_Slides.pptAjayTiwari301041
 
Wireless Sensor Networks.pptx
Wireless Sensor Networks.pptxWireless Sensor Networks.pptx
Wireless Sensor Networks.pptxMunazza63
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsVirendra Thakur
 
Computational intelligence based data aggregation technique in clustered wsn
Computational intelligence based data aggregation technique in clustered wsnComputational intelligence based data aggregation technique in clustered wsn
Computational intelligence based data aggregation technique in clustered wsnTAIWAN
 
Chapter 6 WSN.ppt
Chapter 6 WSN.pptChapter 6 WSN.ppt
Chapter 6 WSN.pptTekle12
 
kuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptxkuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptxIrawanAbiyantoro1
 
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTINGUnit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTINGdevika g
 
Topology,Switching and Routing
Topology,Switching and RoutingTopology,Switching and Routing
Topology,Switching and RoutingAnushiya Ram
 
Routing and switching
Routing and switchingRouting and switching
Routing and switchingAashif Raza
 
MOBILE COMPUTING Unit 4.pptx
 MOBILE COMPUTING Unit 4.pptx MOBILE COMPUTING Unit 4.pptx
MOBILE COMPUTING Unit 4.pptxkarthiksmart21
 
MANET routing protocols Issues and Classifications
 MANET routing protocols Issues and Classifications MANET routing protocols Issues and Classifications
MANET routing protocols Issues and ClassificationsArunChokkalingam
 
Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...revathiyadavb
 
performanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdfperformanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdfABYTHOMAS46
 

Similar to WSN Routing Protocols (20)

A review of routing protocols in wsn
A review of routing protocols in wsnA review of routing protocols in wsn
A review of routing protocols in wsn
 
Chapter_13_Energy-Efficient_WSN_Slides.ppt
Chapter_13_Energy-Efficient_WSN_Slides.pptChapter_13_Energy-Efficient_WSN_Slides.ppt
Chapter_13_Energy-Efficient_WSN_Slides.ppt
 
Wireless Sensor Networks.pptx
Wireless Sensor Networks.pptxWireless Sensor Networks.pptx
Wireless Sensor Networks.pptx
 
3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx3. WIRELESS_PROTOCOLS.pptx
3. WIRELESS_PROTOCOLS.pptx
 
Unit 33-routing protocols for wsn
Unit 33-routing protocols for wsnUnit 33-routing protocols for wsn
Unit 33-routing protocols for wsn
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
Computational intelligence based data aggregation technique in clustered wsn
Computational intelligence based data aggregation technique in clustered wsnComputational intelligence based data aggregation technique in clustered wsn
Computational intelligence based data aggregation technique in clustered wsn
 
Chapter 6 WSN.ppt
Chapter 6 WSN.pptChapter 6 WSN.ppt
Chapter 6 WSN.ppt
 
Research Issues on WSN
Research Issues on WSNResearch Issues on WSN
Research Issues on WSN
 
kuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptxkuliah 02 network architecture for student .pptx
kuliah 02 network architecture for student .pptx
 
Ioe module 4
Ioe module 4Ioe module 4
Ioe module 4
 
Wsn protocols
Wsn protocolsWsn protocols
Wsn protocols
 
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTINGUnit 2 -1 ADHOC WIRELESS NETWORK  MOBILE COMPUTING
Unit 2 -1 ADHOC WIRELESS NETWORK MOBILE COMPUTING
 
Topology,Switching and Routing
Topology,Switching and RoutingTopology,Switching and Routing
Topology,Switching and Routing
 
Routing and switching
Routing and switchingRouting and switching
Routing and switching
 
MOBILE COMPUTING Unit 4.pptx
 MOBILE COMPUTING Unit 4.pptx MOBILE COMPUTING Unit 4.pptx
MOBILE COMPUTING Unit 4.pptx
 
MANET routing protocols Issues and Classifications
 MANET routing protocols Issues and Classifications MANET routing protocols Issues and Classifications
MANET routing protocols Issues and Classifications
 
Chapter 4
Chapter 4Chapter 4
Chapter 4
 
Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...
 
performanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdfperformanceandtrafficmanagement-160328180107.pdf
performanceandtrafficmanagement-160328180107.pdf
 

Recently uploaded

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 

Recently uploaded (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

WSN Routing Protocols

  • 2. Overview • Introduction • Data Dissemination and Gathering • Routing Challenges and Issues • Routing Strategies for wireless networks • WSN routing techniques • WSN routing protocols comparison • Protocol Selection
  • 3. INTRODUCTION • The main task of wireless sensor nodes is to sense and collect data from a target domain, process the data, and transmit the information back to specific sites where the underlying application resides. • Achieving this task efficiently requires the development of an energy-efficient routing protocol to set up paths between sensor nodes and the data sink.
  • 4. DATA DISSEMINATION AND GATHERING • Data dissemination is a process by which data and queries for data are routed in the sensor network. • In a scope of data dissemination, a source is the node that generates the data and a node that is interested in data is called sink. • Data gathering is to transmit data that has been collected by the sensor nodes to the base station.
  • 5. ROUTINGCHALLENGESANDDESIGNISSUES 1.Network Scale and Time-Varying Characteristics: • the densities of the WSNs may vary widely, ranging from very sparse to very dense. • in many applications, the sensor nodes numbering in the hundreds if not thousands, are deployed in an ad hoc and often unsupervised manner over wide coverage areas. • In these networks, the behavior of sensor nodes is dynamic and highly adaptive .
  • 6. ROUTINGCHALLENGESANDDESIGNISSUES 2. Resource Constraints: • Energy is a key concern in WSNs, which must achieve a long lifetime while operating on limited battery reserves. • Also the WSN nodes have low technical specifications that must be taken into consideration when designing a WSN routing protocol.
  • 7. ROUTINGCHALLENGESANDDESIGNISSUES 3. Sensor Applications Data Models: • The data model describes the flow of information between the sensor nodes and the data sink. • These models depends on the nature of the application. • The need to support a variety of data models increases the complexity of the routing design problem.
  • 8. ROUTINGSTRATEGIESINWIRELESS NETWORKS • Mobile Wireless Networks : • Ad-hoc networks. • WSNs. • Ad-hoc networks have several protocols like : 1. Proactive strategy relies on periodic dissemination of routing information to maintain consistent and accurate routing tables across all nodes of the network. 2. Reactive strategy :establish routes to a limited set of destinations on demand.. 3. Hybrid strategy.
  • 9. ROUTINGSTRATEGIESINWIRELESS NETWORKS • Ad-hoc networks routing protocols are not suited for WSNs for the following reasons: 1. Ad-hoc networks tend to exhibit their least desirable behavior under highly dynamic conditions. 2. Routing protocol overhead typically increases dramatically with increased network size and dynamics. 3. A large overhead can easily overwhelm network resources. Furthermore. 4. Traditional routing protocols operating in large networks require substantial internodal coordination, and in some cases global flooding. 5. Capabilities of the ad-hoc network nodes are relatively high compared to sensor nodes • New routing strategies are therefore required for sensor networks.
  • 10. WSNRoutingTechniques 1. flat network architecture protocols in which all nodes are considered peers. 2. Data-centric routing protocols use attribute-based naming, whereby a source node queries an attribute for the phenomenon rather than an individual sensor node. 3. Hierarchical routing protocols imposes a structure on the network. 4. Location based protocols where location information is needed in order to calculate the distance between two particular nodes so that energy consumption can be estimated.
  • 11. 1.flatnetworkarchitecture protocols • all nodes are considered peers. • A flat network architecture has several advantages, including minimal overhead to maintain the infrastructure • and the potential for the discovery of multiple routes between communicating nodes for fault tolerance.
  • 12. 1.1Flooding And Gossiping • In flooding, each sensor receiving a data packet broadcasts it to all of its neighbors and this process continues until the packet arrives at the destination or the maximum number of hops for the packet is reached.
  • 14. 1.1Flooding And Gossiping • Gossiping is a slightly enhanced version of flooding where the receiving node sends the packet to a randomly selected neighbor, which picks another random neighbor to forward the packet to and so on. • Gossiping avoids the implosion problem by limiting the number of packets that each node sends to its neighbor to one copy. • The latency that a packet suffers on its way to the destination may be excessive, particularly in a large network.
  • 15. 2.Data-centricProtocols • A source node queries an attribute for the phenomenon rather than an individual sensor node. • The interest dissemination is achieved by assigning tasks to sensor nodes and expressing queries to relative to specific attributes. • Different strategies can be used to communicate interests to the sensor nodes, including broadcasting and attribute-based multicasting.
  • 16. 2.1SPIN • Sensor Protocols for Information via Negotiation. • The main objective of SPIN is to overcome the shortcomings of conventional protocols like flooding. • The basic property of this family of protocols are data negotiation and resource adaptation. • data negotiation requires that nodes running SPIN ‘‘learn’’ about the content of the data before any data are transmitted between network nodes.
  • 17. 2.1SPIN • To carry out negotiation and data transmission, nodes running SPIN use three types of messages: • The first message type, ADV (advertise) • The second message type, REQ (request) • The third message type, DATA
  • 19. 2.1SPIN • SPIN versions: • SPIN-PP (Basic Handshake sequence) • SPIN-EC (When a node energy level approaches the low threshold, a node running SPIN-EC reduces its participation in the protocol operations.)
  • 20. 2.1SPIN • SPIN-BC (Is designed for broadcast networks where the ADV signal will reach all the sensors in the coverage area of the source) • SPIN-RL (Enhance its reliability and overcome message transmission errors caused by a lossy channel). by periodic broadcasting of ADV and REQ)
  • 21. 2.2DirectedDiffusion • Directed diffusion is a data - centric paradigm for sensor query dissemination and processing that provides energy efficiency, scalability, and robustness. • In contrast to SPIN, in direct diffusion the sink is the node that broadcast the request for a specific data throughout the network in what is called an “ interest message”. • A gradient can be thought of as a reply link pointing toward the neighboring node from which the interest is received.
  • 23. 3.HierarchicalProtocols • The main aim of hierarchical routing is to efficiently maintain the energy consumption of sensor nodes by: • involving them in multi-hop communication within a particular cluster. • performing data aggregation and fusion in order to decrease the number of transmitted messages to the sink.
  • 24. 3.1LEACH • Low-energy adaptive clustering hierarchy (LEACH) is one of the most popular hierarchical routing algorithms for sensor networks. • The idea is to form clusters of the sensor nodes based on the received signal strength and use local cluster heads as routers to the sink. • The main objectives of LEACH are: 1. Extension of the network lifetime 2. Reduced energy consumption 3. Use of data aggregation to reduce the number of communication messages
  • 25. 3.1LEACH • Cluster heads change randomly over time in order to balance the energy dissipation of nodes. • The LEACH operation can be depicted by the following two phases: • 1.setup phase: In which the cluster head selection is performed. • 2.steady-state phase: In which data collection, aggregation and delivery to the base station happens.
  • 26. 3.2PEGASIS • Power-efficient gathering in Sensor Information Systems (PEGASIS) is an improvement of the LEACH protocol. • Rather than using a tree or star hierarchy as in the LEACH protocol , the PEGASIS protocol uses chain hierarchy. • Data aggregation is carried out by : • 1. The chain leader (3) issues a token to the right most node telling it to send its sensing information, when the request reaches node (7) it sends the information to node (6) where this one aggregate its information to it and consequently until the aggregated information reaches node (3) • 2.Node (3) issues the same operation to the left most node and after having all the information from the left and right sided sends the aggregated information to the sink. 43 5 6210 7
  • 27. 3.2PEGASIS • The sequential approach discussed before is not practical and consumes time. • A better approach would be using parallelism in aggregation. • In this approach node can use CDMA to work simultaneously and not interfere with each other. • Starting from the bottom up in the figure: • First each node send its date to the neighbor odd node. • Secondly each odd node sends its data. • Last node 7 send its aggregated data to Node 3. 7
  • 28. 4.Locationbasedprotocols • The main objective of geographical routing is to use location information to formulate an efficient route search toward the destination. • Geographical routing is very suitable to sensor networks, where data aggregation is a useful technique to minimize the number of transmissions toward the base station by eliminating redundancy among packets from different sources.
  • 29. 4.1GeographicRouting • A node knows its own location, the locations of its neighbors, and the destination’s location (D) • The destination’s location is included in the packet header • Forwarding decision is based on local distance information • Greedy Forwarding: achieve max progress towards D x D y Greedy Forwarding
  • 30. 4.1GeographicRouting • Greedy forwarding • Next hop is the neighbor that gets the packet closest to destination • Greedy forwarding can lead into a dead end, where there is no neighbor closer to the destination. destination source
  • 31. 4.1GeographicRouting • The solution is to use a combination of greedy routing with what called (face routing), where the latter is a technique of routing that rout packets on the faces of the path • Figure below illustrates face routing .
  • 32. WSNroutingprotocols comparison • LEACH, PEGASIS, SPIN, DD, Geographical routing comparison below :
  • 33. RoutingProtocolsSelectionfor particularapplications • LEACH, PEGASIS, SPIN, DD, Geographical routing comparison below :