This document summarizes and classifies various routing protocols for wireless sensor networks (WSN). It discusses protocols that are homogenous (all nodes are identical) and heterogeneous (nodes differ). It focuses on clustered protocols where nodes are grouped into clusters to aggregate and transmit data. Specific clustered protocols covered include LEACH (Low-Energy Adaptive Clustering Hierarchy), ALEACH, MR-LEACH, PEGASIS, TEEN, and Re-Cluster LEACH. Each protocol is summarized with its key features and advantages/disadvantages.
This document discusses routing protocols in wireless sensor networks. It begins with an introduction to routing challenges in WSNs such as limited energy, processing, and storage in sensor nodes. It then covers different routing techniques including flat routing protocols like SPIN, directed diffusion, and rumor routing. Hierarchical routing protocols discussed include LEACH, PEGASIS, TEEN, and APTEEN. Finally, it briefly mentions location-based routing and the GEAR protocol.
This document summarizes geographical routing in wireless sensor networks. It begins with an introduction to geographic routing protocols, which route packets based on the geographic position of nodes rather than their network addresses. It then discusses several specific geographic routing protocols, including Greedy Perimeter Stateless Routing (GPSR) and Geographical and Energy Aware Routing (GEAR). The document also covers topics like how nodes obtain location information, security issues in geographic routing like the Sybil attack, and concludes that geographic routing can enable scalable and energy-efficient routing in wireless sensor networks.
This document discusses geographical routing in mobile ad hoc networks. It describes traditional routing approaches like next-hop routing, source routing, and flooding, and their disadvantages. It then introduces geographical routing, which uses location information to route packets. Key geographical routing protocols discussed include LAR, DREAM, and GRID. LAR and DREAM disseminate location information and forward packets towards the destination's expected zone. GRID partitions the area into grids and elects gateways to route between grids towards the destination. The document also categorizes geographical routing algorithms based on their use of location services, forwarding strategies, and recovery schemes.
This document discusses various techniques for energy efficient unicast routing in wireless sensor networks. It describes algorithms such as Dijkstra's algorithm, minimizing energy per packet, maximizing network lifetime, and routing based on available battery energy. Additional algorithms covered include minimum battery cost routing, minimum-max battery cost routing, and conditional max-min battery capacity routing. The document also discusses multipath unicast routing techniques including constructing disjoint and braided paths, and simultaneously transmitting over multiple paths.
This document summarizes several energy-aware routing protocols for wireless sensor networks. It discusses classical approaches like flooding and gossiping and their deficiencies. It then describes the SPIN protocol which uses negotiations and metadata to adapt to resource constraints. Directed Diffusion is also covered, using interests, data messages, gradients, and reinforcement to set up multiple paths between sources and sinks. The document provides details on how these protocols establish and maintain paths while conserving energy in wireless sensor networks.
Energy balanced improved leach routing protocol for wireless sensor networkscsandit
A proper sensor node clustering is an effective topology control that can balance energy
consumption among sensor nodes and increase network scalability and life time. As the use of
wireless sensor networks (WSNs) has grown enormously, the need for energy-efficient routing
and data aggregation has also risen. LEACH
(
Low Energy Adaptive Cluster Hierarchy
)
is a
hierarchical clustering protocol that provides an elegant solution for such protocols. Random
clustering is the main deficiency of LEACH. In this paper an energy balanced clustering
approach is proposed, in which the K-mean clustering algorithm is applied. It is centralized
clustering algorithm that based on minimum energy clustering to form optimal clusters. For the
candidate nodes, the location and the residual energy are used as key parameters to select the
cluster head (CH). The method shows that the proposed approach outperforms LEACH in terms
of energy conservation and network life time prolonging.
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
In the wireless sensor networks (WSNs), the sensor nodes (called motes) are usually scattered in a sensor field an area in which the sensor nodes are deployed. These motes are small in size and have limited processing power, memory and battery life. In WSNs, conservation of energy, which is directly related to network life time, is considered relatively more important souse of energy efficient routing algorithms is one of the ways to reduce the energy conservation. In general, routing algorithms in WSNs can be divided into flat, hierarchical and location based routing. There are two reasons behind the hierarchical routing Low Energy Adaptive Clustering Hierarchy (LEACH) protocol be in explored. One, the sensor networks are dense and a lot of redundancy is involved in communication. Second, in order to increase the scalability of the sensor network keeping in mind the security aspects of communication. Cluster based routing holds great promise for many to one and one to many communication paradigms that are pre valentines or networks.
This document summarizes and classifies various routing protocols for wireless sensor networks (WSN). It discusses protocols that are homogenous (all nodes are identical) and heterogeneous (nodes differ). It focuses on clustered protocols where nodes are grouped into clusters to aggregate and transmit data. Specific clustered protocols covered include LEACH (Low-Energy Adaptive Clustering Hierarchy), ALEACH, MR-LEACH, PEGASIS, TEEN, and Re-Cluster LEACH. Each protocol is summarized with its key features and advantages/disadvantages.
This document discusses routing protocols in wireless sensor networks. It begins with an introduction to routing challenges in WSNs such as limited energy, processing, and storage in sensor nodes. It then covers different routing techniques including flat routing protocols like SPIN, directed diffusion, and rumor routing. Hierarchical routing protocols discussed include LEACH, PEGASIS, TEEN, and APTEEN. Finally, it briefly mentions location-based routing and the GEAR protocol.
This document summarizes geographical routing in wireless sensor networks. It begins with an introduction to geographic routing protocols, which route packets based on the geographic position of nodes rather than their network addresses. It then discusses several specific geographic routing protocols, including Greedy Perimeter Stateless Routing (GPSR) and Geographical and Energy Aware Routing (GEAR). The document also covers topics like how nodes obtain location information, security issues in geographic routing like the Sybil attack, and concludes that geographic routing can enable scalable and energy-efficient routing in wireless sensor networks.
This document discusses geographical routing in mobile ad hoc networks. It describes traditional routing approaches like next-hop routing, source routing, and flooding, and their disadvantages. It then introduces geographical routing, which uses location information to route packets. Key geographical routing protocols discussed include LAR, DREAM, and GRID. LAR and DREAM disseminate location information and forward packets towards the destination's expected zone. GRID partitions the area into grids and elects gateways to route between grids towards the destination. The document also categorizes geographical routing algorithms based on their use of location services, forwarding strategies, and recovery schemes.
This document discusses various techniques for energy efficient unicast routing in wireless sensor networks. It describes algorithms such as Dijkstra's algorithm, minimizing energy per packet, maximizing network lifetime, and routing based on available battery energy. Additional algorithms covered include minimum battery cost routing, minimum-max battery cost routing, and conditional max-min battery capacity routing. The document also discusses multipath unicast routing techniques including constructing disjoint and braided paths, and simultaneously transmitting over multiple paths.
This document summarizes several energy-aware routing protocols for wireless sensor networks. It discusses classical approaches like flooding and gossiping and their deficiencies. It then describes the SPIN protocol which uses negotiations and metadata to adapt to resource constraints. Directed Diffusion is also covered, using interests, data messages, gradients, and reinforcement to set up multiple paths between sources and sinks. The document provides details on how these protocols establish and maintain paths while conserving energy in wireless sensor networks.
Energy balanced improved leach routing protocol for wireless sensor networkscsandit
A proper sensor node clustering is an effective topology control that can balance energy
consumption among sensor nodes and increase network scalability and life time. As the use of
wireless sensor networks (WSNs) has grown enormously, the need for energy-efficient routing
and data aggregation has also risen. LEACH
(
Low Energy Adaptive Cluster Hierarchy
)
is a
hierarchical clustering protocol that provides an elegant solution for such protocols. Random
clustering is the main deficiency of LEACH. In this paper an energy balanced clustering
approach is proposed, in which the K-mean clustering algorithm is applied. It is centralized
clustering algorithm that based on minimum energy clustering to form optimal clusters. For the
candidate nodes, the location and the residual energy are used as key parameters to select the
cluster head (CH). The method shows that the proposed approach outperforms LEACH in terms
of energy conservation and network life time prolonging.
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
In the wireless sensor networks (WSNs), the sensor nodes (called motes) are usually scattered in a sensor field an area in which the sensor nodes are deployed. These motes are small in size and have limited processing power, memory and battery life. In WSNs, conservation of energy, which is directly related to network life time, is considered relatively more important souse of energy efficient routing algorithms is one of the ways to reduce the energy conservation. In general, routing algorithms in WSNs can be divided into flat, hierarchical and location based routing. There are two reasons behind the hierarchical routing Low Energy Adaptive Clustering Hierarchy (LEACH) protocol be in explored. One, the sensor networks are dense and a lot of redundancy is involved in communication. Second, in order to increase the scalability of the sensor network keeping in mind the security aspects of communication. Cluster based routing holds great promise for many to one and one to many communication paradigms that are pre valentines or networks.
This document discusses wireless sensor networks and routing protocols for wireless sensor networks. It defines what a wireless sensor network is and its key characteristics. It then discusses objectives like understanding ad hoc network basics and various routing protocols. It covers topics like the differences between WSNs and ad hoc networks, what a network simulator is and reasons for using NS2, various routing techniques like flooding, gossiping, and hierarchical routing. It also discusses routing challenges, wireless nodes, packet transmission, applications and the future scope of WSNs.
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkIJCI JOURNAL
In Multihop Wireless Networks, traffic forwarding capability of each node varies according to its level of contention. Each node can yield its channel access opportunity to its neighbouring nodes, so that all the nodes can evenly share the channel and have similar forwarding capability. In this manner the wireless channel is utilized effectively, which is achieved using Contention Window Adaptation Mechanism (CWAM). This mechanism achieves a higher end-to-end throughout but consumes the network power to a higher level. So, a newly proposed algorithm Quadrant- Based Directional Routing Protocol (Q-DIR) is implemented as a cross-layer with CWAM, to reduce the total network power consumption through limited flooding and also reduce the routing overheads, which eventually increases overall network throughput. This algorithm limits the broadcast region to a quadrant where the source node and the destination nodes are located. Implementation of the algorithm is done in Linux based NS-2 simulator
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...IOSR Journals
The broad significance of Wireless Sensor Networks is in most emergency and disaster rescue
domain. The routing process is the main challenges in the wireless sensor network due to lack of physical links.
The objective of routing is to find optimum path which is used to transferring packets from source node to
destination node. Routing should generate feasible routes between nodes and send traffic along the selected path
and also achieve high performance. This paper presents a nearest adjacent node scheme based on shortest path
routing algorithm. It is plays an important role in energy conservation. It finds the best location of nearest
adjacent nodes by involving the least number of nodes in transmission of data and set large number of nodes to
sleep in idle mode. Based on simulation result we shows the significant improvement in energy saving and
enhance the life of the network
The document discusses geo-cast routing protocols, which deliver data packets to nodes within a specified geographic region. It describes two categories of geo-cast protocols: data-transmission oriented protocols, which focus on transmitting information from source to geographic region, and routing creation oriented protocols, which aim to reduce flooding overhead while maintaining delivery accuracy. Specific protocols discussed include Location-Based Multicast, Geo-GRID, Geo-TORA, and mesh-based geo-cast routing. The document concludes by noting open issues like scalability, applications, addressing, and security for geo-cast routing over mobile ad hoc networks.
A New Energy-Efficient Routing Protocol for Wireless Body Area Sensor NetworksLeila_maleke
This document proposes a new energy-efficient routing protocol called ATTEMPT for wireless body area sensor networks. It describes the system model of ATTEMPT, which includes initialization, routing, scheduling, and data transmission phases. It also discusses how ATTEMPT supports node mobility. Simulation results show that ATTEMPT has less energy consumption and higher packet delivery ratios compared to multi-hop communication. The conclusion states that ATTEMPT is an energy efficient routing algorithm for heterogeneous wireless body area sensor networks that supports real-time data traffic, mobility, and energy management through multi-hop communication and TDMA scheduling.
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
In this paper, we have explained the Enhanced Adaptive Position Update strategy for geographic routing in mobile ad hoc
network In Adaptive Position Update strategy, there are two techniques: Mobility prediction rule and On-demand learning rule. Proposed
system is based on the destination aware routing in which path to transfer the data over the network is based on the distance from highly
stable node to the destination node. Results of the proposed system are compared with Periodic Beaconing on the basis of packet delivery
ratio, beacon overhead, energy consumption. Experiment results show a high improvement in results on the parameters energy
consumption, packet delivery ratio and beacon overhead. Proposed work is implemented on the NS2 (Network Simulator) Environment
to perform experiments.
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Narendra Singh Yadav
Clustering is an important research area for mobile ad hoc networks (MANETs) as it increases the capacity of network, reduces the routing overhead and makes the network more scalable in the presence of both high mobility and a large number of mobile nodes. Routing protocols based on flat topology are not scalable because of their built-in characteristics. However, clustering cause overhead which consumes considerable bandwidth, drain mobile nodes energy quickly, likely cause congestion, collision and data delay in larger networks. This paper uses an implementation of the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based routing protocol to examine the influence of clustering on the performance of mobile ad hoc networks. This paper evaluates channel utilization and control overhead as a function of number of nodes per sq. km to show the effect of clustering. Simulation results show that in high mobility scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
This document outlines a study on implementing a hybrid routing protocol for wireless sensor networks. It discusses the problems with purely proactive or reactive routing protocols and the motivation for a hybrid approach. The document outlines the objectives to implement OLSR and AODV protocols, design a framework to allow them to work together, and test their performance. Preliminary results show the individual protocols working correctly in simulation. The future work involves combining the protocols in the framework and further evaluating the hybrid protocol's performance and efficiency.
The document discusses routing challenges and protocols in wireless sensor networks (WSNs). It covers flooding, hierarchical routing protocols like LEACH, data-centric protocols like directed diffusion, and negotiation-based protocols like SPIN. It also discusses resource constraints in WSNs like limited energy and the need for routing protocols to be energy-efficient. Unique characteristics of WSNs like dynamic topology and varying node densities present new challenges for routing protocol design.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document summarizes several cluster-based routing protocols for wireless sensor networks that aim to improve energy efficiency. It discusses both pre-established protocols like LEACH, EEHC, and HEED, as well as on-demand protocols like Passive Clustering and Energy Level-based Passive Clustering. For each protocol, it describes the key ideas such as random cluster head election, using residual energy to select cluster heads, and rotating cluster head roles to balance energy load among nodes. The document concludes that hierarchical routing protocols can improve energy efficiency but optimal clustering parameters and handling of network dynamics are still challenges.
A New Theoretical Approach to Location Based Power Aware RoutingIOSR Journals
This document proposes a new theoretical approach to location based power aware routing in mobile ad hoc networks (MANETs). It aims to extend the network lifetime by improving power utilization during routing. The approach uses nodes' location information, remaining battery power, and bandwidth status to assign link stability and select routes with lower "uptime values" and minimum bandwidth over time. This is hypothesized to better utilize nodes' power sources and bandwidth. The document outlines calculating a root up time factor for each node based on its power backup and required power, and only using nodes with maximum backup. It concludes future work will design and validate a new protocol based on this approach.
This document summarizes several geographical routing protocols for wireless sensor networks:
1) Small World Topology-Aware Routing (SWTAR) uses topological awareness to discover routes and avoid voids, achieving high delivery ratios with short paths.
2) Geographic Wireless Reliable Multicast (GeoWiReM) provides efficient multicast delivery within ad hoc regions using passive acknowledgments and local recovery.
3) Energy-aware interference-sensitive geographic routing (EIGR) minimizes energy use and interference by selecting next hops along an anchor list that guides packets along energy-optimal low-interference paths.
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
Wireless sensor networks consist of large numbers of sensor nodes that monitor parameters and communicate wirelessly. The SPIN protocol family was developed to address the limitations of sensor nodes, particularly their limited energy, computation, and communication capabilities. SPIN uses meta-data negotiation and resource awareness to disseminate data between nodes more efficiently than flooding protocols. SPIN-1 is a simple three-stage handshake protocol that reduces energy costs. SPIN-2 builds upon SPIN-1 with an additional energy conservation heuristic to further prolong network lifetime. Evaluation shows SPIN consumes significantly less energy than flooding for data dissemination in wireless sensor networks.
Improved Power Aware Location Based RoutingIOSR Journals
Abstract : With rapid growth in wireless Ad Hoc networks, Quality of service factor has drawn a great attention of researchers. Whereas network topology of wireless networks constantly changes, resources like bandwidth and energy are also limited. As power is very important factor for the proper working of Ad Hoc networks, need of the time is to research about efficient utilization of power. In the paper, we improve LAR (Location-Aided Routing), one of the most famous location based routing methods, which uses GPS technique to get information about the location of mobile node. Our new protocol considers both areas of routing and power. At first, propose a more efficient routing method which finds more stable paths .Secondly, a power aware method is proposed to have a prior knowledge about the remaining battery backups of all the intermediate nodes so that the nodes with battery backups equal to or greater than the minimum threshold power are the part of path between source and destination. This work presents an efficient approach for providing QOS in power aware scenario. Keywords: Ad hoc networks, Average power, Expected Zone, Requested Zone, Threshold power
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSIJARIIT
This paper presents load balancing and provides security using RSA algorithm. This is brief introduction to handle the traffic on node. This represents the converge-casting protocol in wireless sensor networks. The protocol is localized and distributed, and adapts efficiently to vary traffic. Graphs are analyzed using NS-2 simulator, here end-to-end packet latency, packet delivery ratio, throughput are analyzed. This is done for 30 nodes in NS-2 simulation.
The document discusses the LEACH protocol and DECSA improvement for wireless sensor networks. It describes the two phases of LEACH - the set-up phase where cluster heads are chosen and the steady-state phase where data is transmitted. DECSA considers both distance and residual energy to select cluster heads, forming a three-level hierarchy. DECSA prolongs network lifetime by 31% and reduces energy consumption by 40% compared to the original LEACH protocol.
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
Wireless sensor networks consist of hundreds or thousands of nodes with limited energy. Since the life time
of each sensor is equivalent to the battery life, the energy issue is considered as a major challenge.
Clustering has been proposed as a strategy to extend the lifetime of wireless sensor networks. Cluster size,
number of Cluster head per cluster and the selection of cluster head are considered as important factors in
clustering. In this research by studying LEACH algorithm and optimized algorithms of this protocol and by
evaluating the strengths and weaknesses, a new algorithm based on hierarchical clustering to increase the
lifetime of the sensor network is proposed. In this study, with a special mechanism the environment of
network is layered and the optimal number of cluster head in each layer is selected and then recruit for the
formation of clusters in the same layer by controlling the topology of the clusters is done independently.
Then the data is sent through the by cluster heads through the multi- stage to the main station. Simulation
results show that the above mentioned method increases the life time about 70% compared to the LEACH.
The document provides an overview of routing protocols in wireless sensor networks. It discusses several categories of routing protocols including data-centric, hierarchical, and location-based. For hierarchical routing protocols, it summarizes LEACH, PEGASIS, HEED, P-LEACH, H-LEACH, and other variants that aim to improve energy efficiency. It provides brief descriptions of how each protocol operates and highlights drawbacks. The document also summarizes several data-centric routing protocols including Directed Diffusion, Rumor Routing, and their limitations.
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routingijsrd.com
this paper considered a multi-objective LEACH-C algorithm in the selection of Cluster Head (CH) in such a way so that its energy is used uniformly with load balancing among clusters for delayed disintegration of network. LEACH-C algorithm based single objective clustering approach has been replaced by multi-objective clustering approach where we not only considered the residual energy of nodes but the size of cluster in creating a cluster structure. The improved LEACH-C protocol has been compared with random LEACH and Max Energy LEACH or existing LEACH-C algorithm for energy equi-distribution and load balancing among clusters. Wireless sensor network (WSN) is simulated using a MATLAB programming and power consumption algorithms take into consideration all aspects of power consumption in the operation of the node. The modified LEACH-C routing protocol shows improvements in lifetime as well as in network disintegration criterion
Comprehensive survey on routing protocols for IoTsulaiman_karim
This document provides an overview of routing protocols for the Internet of Things (IoT). It defines IoT and routing protocols, describes common routing algorithms like distance vector and link state, and discusses specific protocols such as RPL, RIP, and OSPF. It also covers clustering in wireless sensor networks and the LEACH clustering protocol.
This document discusses wireless sensor networks and routing protocols for wireless sensor networks. It defines what a wireless sensor network is and its key characteristics. It then discusses objectives like understanding ad hoc network basics and various routing protocols. It covers topics like the differences between WSNs and ad hoc networks, what a network simulator is and reasons for using NS2, various routing techniques like flooding, gossiping, and hierarchical routing. It also discusses routing challenges, wireless nodes, packet transmission, applications and the future scope of WSNs.
Quadrant Based DIR in CWin Adaptation Mechanism for Multihop Wireless NetworkIJCI JOURNAL
In Multihop Wireless Networks, traffic forwarding capability of each node varies according to its level of contention. Each node can yield its channel access opportunity to its neighbouring nodes, so that all the nodes can evenly share the channel and have similar forwarding capability. In this manner the wireless channel is utilized effectively, which is achieved using Contention Window Adaptation Mechanism (CWAM). This mechanism achieves a higher end-to-end throughout but consumes the network power to a higher level. So, a newly proposed algorithm Quadrant- Based Directional Routing Protocol (Q-DIR) is implemented as a cross-layer with CWAM, to reduce the total network power consumption through limited flooding and also reduce the routing overheads, which eventually increases overall network throughput. This algorithm limits the broadcast region to a quadrant where the source node and the destination nodes are located. Implementation of the algorithm is done in Linux based NS-2 simulator
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...IOSR Journals
The broad significance of Wireless Sensor Networks is in most emergency and disaster rescue
domain. The routing process is the main challenges in the wireless sensor network due to lack of physical links.
The objective of routing is to find optimum path which is used to transferring packets from source node to
destination node. Routing should generate feasible routes between nodes and send traffic along the selected path
and also achieve high performance. This paper presents a nearest adjacent node scheme based on shortest path
routing algorithm. It is plays an important role in energy conservation. It finds the best location of nearest
adjacent nodes by involving the least number of nodes in transmission of data and set large number of nodes to
sleep in idle mode. Based on simulation result we shows the significant improvement in energy saving and
enhance the life of the network
The document discusses geo-cast routing protocols, which deliver data packets to nodes within a specified geographic region. It describes two categories of geo-cast protocols: data-transmission oriented protocols, which focus on transmitting information from source to geographic region, and routing creation oriented protocols, which aim to reduce flooding overhead while maintaining delivery accuracy. Specific protocols discussed include Location-Based Multicast, Geo-GRID, Geo-TORA, and mesh-based geo-cast routing. The document concludes by noting open issues like scalability, applications, addressing, and security for geo-cast routing over mobile ad hoc networks.
A New Energy-Efficient Routing Protocol for Wireless Body Area Sensor NetworksLeila_maleke
This document proposes a new energy-efficient routing protocol called ATTEMPT for wireless body area sensor networks. It describes the system model of ATTEMPT, which includes initialization, routing, scheduling, and data transmission phases. It also discusses how ATTEMPT supports node mobility. Simulation results show that ATTEMPT has less energy consumption and higher packet delivery ratios compared to multi-hop communication. The conclusion states that ATTEMPT is an energy efficient routing algorithm for heterogeneous wireless body area sensor networks that supports real-time data traffic, mobility, and energy management through multi-hop communication and TDMA scheduling.
Destination Aware APU Strategy for Geographic Routing in MANETEditor IJCATR
In this paper, we have explained the Enhanced Adaptive Position Update strategy for geographic routing in mobile ad hoc
network In Adaptive Position Update strategy, there are two techniques: Mobility prediction rule and On-demand learning rule. Proposed
system is based on the destination aware routing in which path to transfer the data over the network is based on the distance from highly
stable node to the destination node. Results of the proposed system are compared with Periodic Beaconing on the basis of packet delivery
ratio, beacon overhead, energy consumption. Experiment results show a high improvement in results on the parameters energy
consumption, packet delivery ratio and beacon overhead. Proposed work is implemented on the NS2 (Network Simulator) Environment
to perform experiments.
Influence of Clustering on the Performance of MobileAd Hoc Networks (MANETs)Narendra Singh Yadav
Clustering is an important research area for mobile ad hoc networks (MANETs) as it increases the capacity of network, reduces the routing overhead and makes the network more scalable in the presence of both high mobility and a large number of mobile nodes. Routing protocols based on flat topology are not scalable because of their built-in characteristics. However, clustering cause overhead which consumes considerable bandwidth, drain mobile nodes energy quickly, likely cause congestion, collision and data delay in larger networks. This paper uses an implementation of the Dynamic Source Routing (DSR), an flat architecture based and the Cluster Based Routing Protocol (CBRP), a cluster architecture based routing protocol to examine the influence of clustering on the performance of mobile ad hoc networks. This paper evaluates channel utilization and control overhead as a function of number of nodes per sq. km to show the effect of clustering. Simulation results show that in high mobility scenarios, CBRP outperforms DSR. CBRP scales well with increasing number of nodes.
This document outlines a study on implementing a hybrid routing protocol for wireless sensor networks. It discusses the problems with purely proactive or reactive routing protocols and the motivation for a hybrid approach. The document outlines the objectives to implement OLSR and AODV protocols, design a framework to allow them to work together, and test their performance. Preliminary results show the individual protocols working correctly in simulation. The future work involves combining the protocols in the framework and further evaluating the hybrid protocol's performance and efficiency.
The document discusses routing challenges and protocols in wireless sensor networks (WSNs). It covers flooding, hierarchical routing protocols like LEACH, data-centric protocols like directed diffusion, and negotiation-based protocols like SPIN. It also discusses resource constraints in WSNs like limited energy and the need for routing protocols to be energy-efficient. Unique characteristics of WSNs like dynamic topology and varying node densities present new challenges for routing protocol design.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document summarizes several cluster-based routing protocols for wireless sensor networks that aim to improve energy efficiency. It discusses both pre-established protocols like LEACH, EEHC, and HEED, as well as on-demand protocols like Passive Clustering and Energy Level-based Passive Clustering. For each protocol, it describes the key ideas such as random cluster head election, using residual energy to select cluster heads, and rotating cluster head roles to balance energy load among nodes. The document concludes that hierarchical routing protocols can improve energy efficiency but optimal clustering parameters and handling of network dynamics are still challenges.
A New Theoretical Approach to Location Based Power Aware RoutingIOSR Journals
This document proposes a new theoretical approach to location based power aware routing in mobile ad hoc networks (MANETs). It aims to extend the network lifetime by improving power utilization during routing. The approach uses nodes' location information, remaining battery power, and bandwidth status to assign link stability and select routes with lower "uptime values" and minimum bandwidth over time. This is hypothesized to better utilize nodes' power sources and bandwidth. The document outlines calculating a root up time factor for each node based on its power backup and required power, and only using nodes with maximum backup. It concludes future work will design and validate a new protocol based on this approach.
This document summarizes several geographical routing protocols for wireless sensor networks:
1) Small World Topology-Aware Routing (SWTAR) uses topological awareness to discover routes and avoid voids, achieving high delivery ratios with short paths.
2) Geographic Wireless Reliable Multicast (GeoWiReM) provides efficient multicast delivery within ad hoc regions using passive acknowledgments and local recovery.
3) Energy-aware interference-sensitive geographic routing (EIGR) minimizes energy use and interference by selecting next hops along an anchor list that guides packets along energy-optimal low-interference paths.
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
Wireless sensor networks consist of large numbers of sensor nodes that monitor parameters and communicate wirelessly. The SPIN protocol family was developed to address the limitations of sensor nodes, particularly their limited energy, computation, and communication capabilities. SPIN uses meta-data negotiation and resource awareness to disseminate data between nodes more efficiently than flooding protocols. SPIN-1 is a simple three-stage handshake protocol that reduces energy costs. SPIN-2 builds upon SPIN-1 with an additional energy conservation heuristic to further prolong network lifetime. Evaluation shows SPIN consumes significantly less energy than flooding for data dissemination in wireless sensor networks.
Improved Power Aware Location Based RoutingIOSR Journals
Abstract : With rapid growth in wireless Ad Hoc networks, Quality of service factor has drawn a great attention of researchers. Whereas network topology of wireless networks constantly changes, resources like bandwidth and energy are also limited. As power is very important factor for the proper working of Ad Hoc networks, need of the time is to research about efficient utilization of power. In the paper, we improve LAR (Location-Aided Routing), one of the most famous location based routing methods, which uses GPS technique to get information about the location of mobile node. Our new protocol considers both areas of routing and power. At first, propose a more efficient routing method which finds more stable paths .Secondly, a power aware method is proposed to have a prior knowledge about the remaining battery backups of all the intermediate nodes so that the nodes with battery backups equal to or greater than the minimum threshold power are the part of path between source and destination. This work presents an efficient approach for providing QOS in power aware scenario. Keywords: Ad hoc networks, Average power, Expected Zone, Requested Zone, Threshold power
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSIJARIIT
This paper presents load balancing and provides security using RSA algorithm. This is brief introduction to handle the traffic on node. This represents the converge-casting protocol in wireless sensor networks. The protocol is localized and distributed, and adapts efficiently to vary traffic. Graphs are analyzed using NS-2 simulator, here end-to-end packet latency, packet delivery ratio, throughput are analyzed. This is done for 30 nodes in NS-2 simulation.
The document discusses the LEACH protocol and DECSA improvement for wireless sensor networks. It describes the two phases of LEACH - the set-up phase where cluster heads are chosen and the steady-state phase where data is transmitted. DECSA considers both distance and residual energy to select cluster heads, forming a three-level hierarchy. DECSA prolongs network lifetime by 31% and reduces energy consumption by 40% compared to the original LEACH protocol.
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
Wireless sensor networks consist of hundreds or thousands of nodes with limited energy. Since the life time
of each sensor is equivalent to the battery life, the energy issue is considered as a major challenge.
Clustering has been proposed as a strategy to extend the lifetime of wireless sensor networks. Cluster size,
number of Cluster head per cluster and the selection of cluster head are considered as important factors in
clustering. In this research by studying LEACH algorithm and optimized algorithms of this protocol and by
evaluating the strengths and weaknesses, a new algorithm based on hierarchical clustering to increase the
lifetime of the sensor network is proposed. In this study, with a special mechanism the environment of
network is layered and the optimal number of cluster head in each layer is selected and then recruit for the
formation of clusters in the same layer by controlling the topology of the clusters is done independently.
Then the data is sent through the by cluster heads through the multi- stage to the main station. Simulation
results show that the above mentioned method increases the life time about 70% compared to the LEACH.
The document provides an overview of routing protocols in wireless sensor networks. It discusses several categories of routing protocols including data-centric, hierarchical, and location-based. For hierarchical routing protocols, it summarizes LEACH, PEGASIS, HEED, P-LEACH, H-LEACH, and other variants that aim to improve energy efficiency. It provides brief descriptions of how each protocol operates and highlights drawbacks. The document also summarizes several data-centric routing protocols including Directed Diffusion, Rumor Routing, and their limitations.
An Improved LEACH-C Algorithm for Energy Efficiency in WSN Routingijsrd.com
this paper considered a multi-objective LEACH-C algorithm in the selection of Cluster Head (CH) in such a way so that its energy is used uniformly with load balancing among clusters for delayed disintegration of network. LEACH-C algorithm based single objective clustering approach has been replaced by multi-objective clustering approach where we not only considered the residual energy of nodes but the size of cluster in creating a cluster structure. The improved LEACH-C protocol has been compared with random LEACH and Max Energy LEACH or existing LEACH-C algorithm for energy equi-distribution and load balancing among clusters. Wireless sensor network (WSN) is simulated using a MATLAB programming and power consumption algorithms take into consideration all aspects of power consumption in the operation of the node. The modified LEACH-C routing protocol shows improvements in lifetime as well as in network disintegration criterion
Comprehensive survey on routing protocols for IoTsulaiman_karim
This document provides an overview of routing protocols for the Internet of Things (IoT). It defines IoT and routing protocols, describes common routing algorithms like distance vector and link state, and discusses specific protocols such as RPL, RIP, and OSPF. It also covers clustering in wireless sensor networks and the LEACH clustering protocol.
This document discusses power aware routing protocols for wireless sensor networks. It begins by describing wireless sensor networks and how they are used to monitor environmental conditions. It then classifies routing protocols for sensor networks based on their functioning, node participation style, and network structure. Specific examples are provided for different types of routing protocols, including LEACH, TEEN, APTEEN, SPIN, Rumor Routing, and PEGASIS. Chain-based and clustering routing protocols are also summarized.
Improved routing scheme with ACO in WSN in comparison to DSDVijsrd.com
Routing is the process of selecting best paths in a network in terms of energy and distance. In adhoc it is critical to collect the information in an efficient manner as it has limitations in terms of centralized congestion. In such case to perform the effective communication there is the requirement of some such routing approach that can provide the routing with optimized path. In this work, ACO based routing approach is defined to generate the optimized path in comparison to DSDV over the network. The presented approach is implemented in matlab environment and obtained results shows the effective results in terms of optimized path.
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
in the wireless sensor networks (WSNs), the sensor nodes (called motes) are usually scattered in a sensor field an area in which the sensor nodes are deployed. These motes are small in size and have limited processing power, memory and battery life. In WSNs, conservation of energy, which is directly related to network life time, is considered relatively more important souse of energy efficient routing algorithms is one of the ways to reduce the energy conservation. In general, routing algorithms in WSNs can be divided into flat, hierarchical and location based routing. There are two reasons behind the hierarchical routing Low Energy Adaptive Clustering Hierarchy (LEACH) protocol be in explored. One, the sensor networks are dense and a lot of redundancy is involved in communication. Second, in order to increase the scalability of the sensor network keeping in mind the security aspects of communication. Cluster based routing holds great promise for many to one and one to many communication paradigms that are pre valentines or networks.
The document presents a graduate project on efficient data aggregation from polling points in wireless sensor networks. The proposed system called Mobi-Cluster aims to minimize overall network overhead and energy expenditure associated with multi-hop data retrieval while ensuring balanced energy consumption and prolonged network lifetime. This is achieved through building cluster structures consisting of member nodes that route data to assigned cluster heads, and selecting appropriate polling points to act as intermediaries between clusters and a mobile collector. The key stages of the Mobi-Cluster protocol are described as cluster head selection, polling point selection, cluster head attachment to polling points, data aggregation and forwarding to polling points, and communication between polling points and the mobile collector.
Analysis of different hierarchical routing protocols of wireless sensor networkeSAT Journals
Abstarct Wireless sensored network is nowadays very popular in the field of research because world is now switching faster from wired communication to the wireless communication. It is used in environment monitoring, habitat monitoring, battlefield etc. WSN is made up of tiny sensor nodes which senses the data and communicate to the base station via other nodes.WSN networks are data-centric rather than node centric. So, main issues in WSN networks are energy consumption of network, lifetime of a network, delay, latency, quality of service etc.WSN has defined many routing protocols for the network. The main challenge in WSN is to design a routing protocol which gives the maximum energy efficient routing because nodes in sensored network are equipped with the battery. So, as time passes the battery of nodes will decrease so in turn network lifetime will decreases. There are many routing protocols which are classified as their working and their application to different conditions. This paper describes a brief information about routing protocols. The main focus of this paper is to give the comparison of different hierarchical routing protocols. Keywords: Leach, Pegasis,Teen/Apteen, WSN
Analysis of different hierarchical routing protocols of wireless sensor networkeSAT Publishing House
This document analyzes and compares different hierarchical routing protocols for wireless sensor networks. It begins with an introduction to wireless sensor networks and discusses common routing protocols like flooding, directed diffusion, and gradient-based routing. It then focuses on hierarchical protocols including LEACH, PEGASIS, TEEN, and APTEEN. For each protocol, it describes the key ideas, features, advantages, and limitations. It provides figures to illustrate how the protocols work. Finally, it concludes there is still room for improvement in protocols like LEACH and discusses open issues for future research in improving routing algorithms for wireless sensor networks.
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...IJSRED
This document summarizes a research paper that proposes and evaluates several routing algorithms to improve communication and energy efficiency in wireless sensor networks. It begins with an introduction to wireless sensor networks and discusses existing routing protocols. It then describes four proposed algorithms: RTP-AMODV, MAODV, MM-LEACH, and E-LEACH. The document outlines the methodology used to simulate and compare the performance of these proposed algorithms against existing routing protocols using metrics like packet delivery ratio, end-to-end delay, throughput, and node energy. The results show the enhanced LEACH (E-LEACH) algorithm achieved better performance than the others in terms of throughput, packet delivery ratio, delay, energy consumption, and network lifetime
This document summarizes several energy-efficient routing protocols for wireless sensor networks. It begins by introducing the basic components and architecture of wireless sensor networks. It then categorizes routing protocols based on network structure (flat, hierarchical, location-based) and operation (multipath, query-based, etc.). The majority of the document focuses on reviewing hierarchical protocols, including LEACH, PEGASIS, Hierarchical PEGASIS, and HEED. It provides brief overviews of how these protocols work to reduce energy consumption and extend network lifetime through clustering and data aggregation approaches.
Essay: Mobile Ad Hoc Networks - Overview Of Routing Protocols.JohnWilson47710
Mobile ad hoc network(MANET) is an advance technology of mobile allowing communication without the help of base framing or station. For more detail visit: https://myassignmenthelp.com/free-samples/comp7055-mobile-and-wireless-networks/proactive-and-reactive-routing-file-A1E62A9.html
International Journal of Engineering Research and Development (IJERD)IJERD Editor
This document presents a comparative study of flat-based/data-centric wireless sensor network (WSN) specific routing protocols. It first provides background on data-centric approaches in WSNs and discusses some popular flat-based/data-centric routing protocols, including Directed Diffusion, Minimum Cost Forwarding Algorithm (MCFA), Threshold sensitive Energy Efficient sensor Network protocol (TEEN), Adaptive Periodic Threshold sensitive Energy Efficient sensor Network protocol (APTEEN), Energy Aware Data (EAD) Centric Routing Protocol, RUMOR Routing, Sensor Protocols for Information via Negotiation (SPIN), Constrained Anisotropic Diffusion Routing (CADR), COUGAR,
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKScscpconf
A proper sensor node clustering is an effective topology control that can balance energy
consumption among sensor nodes and increase network scalability and life time. As the use of
wireless sensor networks (WSNs) has grown enormously, the need for energy-efficient routing
and data aggregation has also risen. LEACH
(
Low Energy Adaptive Cluster Hierarchy
)
is a
hierarchical clustering protocol that provides an elegant solution for such protocols. Random
clustering is the main deficiency of LEACH. In this paper an energy balanced clustering
approach is proposed, in which the K-mean clustering algorithm is applied. It is centralized
clustering algorithm that based on minimum energy clustering to form optimal clusters. For the
candidate nodes, the location and the residual energy are used as key parameters to select the
cluster head (CH). The method shows that the proposed approach outperforms LEACH in terms
of energy conservation and network life time prolonging.
Comparison of energy efficient data transmission approaches for flat wireless...ijassn
In this paper we have analyzed energy efficient neighbour selection algorithms for routing in wireless
sensor networks. Since energy saving or consumption is an important aspect of wireless sensor networks,
its precise usage is highly desirable both for the faithful performance of network and to increase the
network life time. For this work, we have considered a flat network topology where every node has the
same responsibility and capability. We have compared two energy efficient algorithms and analyzed their
performances when all sensor nodes in a network have either homogeneous or heterogeneous energy with
increase in number of nodes, time rounds and node failures.
COMPARISON OF ENERGY EFFICIENT DATA RANSMISSION APPROACHES FOR FLAT WIRELESS ...ijassn
The document compares two energy efficient routing approaches - highest energy (HE) and minimum energy consumption route (MECRT) - for flat wireless sensor networks. Through simulations, it finds that in homogeneous networks, MECRT outperforms HE in terms of energy consumption and network lifetime. However, in heterogeneous networks, HE performs better than MECRT for medium sized networks. Overall, the document analyzes and compares the performance of these two energy efficient routing techniques for both homogeneous and heterogeneous wireless sensor networks of varying sizes.
Energy efficient neighbour selection for flat wireless sensor networkscsandit
In this paper we have analyzed energy efficient neighbour selection algorithms for routing in
wireless sensor networks. Since energy saving or consumption is an important aspect of
wireless sensor networks, its precise usage is highly desirable both for the faithful performance
of network and to increase the network life time. For this work, we have considered a flat
network topology where every node has the same responsibility and capability. We have
compared two energy efficient algorithms and analyzed their performances with increase in
number of nodes, time rounds and node failures.
This document discusses wireless sensor network protocols. It covers multi-hop routing, where sensor nodes act as relays to propagate data to the base station. Common routing protocols are discussed, including reactive protocols like AODV that establish routes on demand and proactive protocols like DSDV that maintain routing tables with periodic updates. MAC protocols help manage access to the shared wireless medium and examples covered include S-MAC and B-MAC. The OSI model layers and responsibilities are also summarized.
Routing protocols for ad hoc networks can be classified as table-driven, on-demand, or hybrid. Table-driven protocols maintain fresh routing tables through periodic updates but generate high overhead. On-demand protocols discover routes only when needed via flooding but have high latency. Hybrid protocols combine the advantages of both approaches. Example protocols discussed include DSDV, DSR, AODV, and CGSR.
The document proposes an Enhanced Heuristic Function based Energy Aware (EHF-EA) routing protocol for wireless sensor networks. EHF-EA aims to extend network lifetime and improve link quality by using a heuristic function to find optimal routes while considering longevity factor, link quality, and bandwidth. It constructs a network of 50 mobile homogeneous sensor nodes in clusters. EHF-EA computes heuristic and cost values to determine the best next hop to the destination, aiming to efficiently transfer data and conserve energy. Simulation results show EHF-EA achieves a 93.85% packet delivery ratio while reducing bandwidth and number of hops compared to other protocols.
This document discusses real-time operating systems and real-time scheduling. It begins by explaining that a real-time operating system (RTOS) provides mechanisms to allow real-time scheduling of tasks to ensure tasks receive the CPU within their deadline. It then discusses different types of real-time scheduling, including priority-based scheduling. Priority-based scheduling allows assigning priorities to tasks to determine which runs next and aims to provide predictable execution. The document notes real-time systems have timing requirements and differ from traditional systems in their metrics of timeliness and predictability. It concludes real-time scheduling is more critical but may be easier in some ways compared to traditional scheduling.
The document discusses various registers found in PIC microcontrollers. It describes two main categories of registers - General Purpose Registers (GPR) and Special Function Registers (SFR). SFRs control specific functions and include Status, Option, INTCON, PIE1, PIR1, PIE2, PIR2, and PCON registers. Each register contains bits that control interrupts, prescalers, ports, and other microcontroller functions.
Programming involves using assembly language as the common language between the programmer and microcontroller. Assembly language is translated into machine language (binary) by an assembler. Basic elements of assembly language include labels, instructions, operands, directives, and comments. Assembly language programs define parameters like the oscillator type and use directives like _CONFIG to set configuration bits before writing the code. Control directives like IF, WHILE, and FOR are used for conditional programming.
The document summarizes the 35 instruction sets of the PIC microcontroller. It describes the 7 types of instructions - MOVE, REGISTER, ARITHMETIC & LOGIC, TEST, SKIP & JUMP, CONTROL. For each type, it provides descriptions of the individual instructions along with examples. Key aspects covered are moving data between registers, performing arithmetic/logic operations, conditional program flow, and system control instructions.
Online train ticket booking system project.pdfKamal Acharya
Rail transport is one of the important modes of transport in India. Now a days we
see that there are railways that are present for the long as well as short distance
travelling which makes the life of the people easier. When compared to other
means of transport, a railway is the cheapest means of transport. The maintenance
of the railway database also plays a major role in the smooth running of this
system. The Online Train Ticket Management System will help in reserving the
tickets of the railways to travel from a particular source to the destination.
1. Wireless Sensor Network
Routing
Routing challenges and design issues in WSN:
Node deployment
Energy consumption without losing accuracy
Data Reporting Model
Node/Link Heterogeneity
Fault Tolerance
Scalability
Network Dynamics
Transmission Media
Connectivity
Coverage
Data Aggregation
Quality of Service
Routing Protocols
The protocols can be divided into Flat-based routing, hierarchical based routing and
location based routing depending on the network structure.
In flat based routing, all nodes are typically assigned equal roles of functionalities.
In hierarchical based routing, each node will play different roles.
In location based routing, sensor nodes’ positions are exploited to route data in the
network.
A routing protocol is considered adaptive if certain system parameters can be
controlled in order to adapt to the current network conditions and available energy
levels.
The protocols can be further divided into multipath-based, query based, negotiation
based, QoS based, or coherent based routing techniques depending upon the protocol
operations.
Apart from all the above classifications of the routing protocols, the routing protocol
can be further classified into three categories: proactive, reactive and hybrid
depending upon how the source finds a route to the destination.
In proactive protocols, all the routes are computed before they are really needed.
In reactive protocols, the routes are computed on demand, and hybrid protocols uses
the functionality of both these ideas.
When the sensor nodes are static, it is preferable to have table driven routing
protocols instead of having reactive protocols.
Another class of routing protocol is called the cooperative routing protocol. In this,
the data is aggregated at a central node where the aggregated node may be further
processed leading to reduction of routes cost in terms of energy consumed.
2. 1. Network Structure Protocol
1.1 Flat Routing: The first category of routing protocol is the multi-hop flat routing
protocols. In flat networks, each node typically plays the same role and sensor nodes
collaborate together to perform the sensing task. Due to large number of such nodes, it is not
feasible to assign a global identifier to each node. This consideration has led to data centric
routing, where the base station sends queries to certain regions and waits for data from
the sensor located in the selected regions. Since data is being requested through queries,
attributes based naming is necessary to specify the properties of data.
Early works on data centric routing e.g. SPIN and Directed Diffusion, were shown to save
energy through data negotiation and eliminating the redundant data. These two protocols
motivated the design of many other protocols which follow a similar concept. Some of the
flat routing protocols are mentioned below:
Sensor Protocols for Information via Navigation (SPIN)
Directed Diffusion (DD)
Rumor Routing
Minimum Cost Forwarding Algorithm (MCFA)
Gradient Based Routing
Information Driven Sensor Querying (IDSQ) and Constrained Anisotropic Diffusion
Routing (CADR)
Directed Diffusion
The directed diffusion protocol is useful in scenarios where the sensor nodes
themselves generate requests/queries for data sensed by other nodes.
Each sensor node names its data with one or more attributes.
Each sensor node expresses their interest depending on these attributes.
Each path is associated with an interest gradient, while positive gradient make the
data flow along the path, negative gradient inhibit the distribution data along a
particular path.
Routing Protocols in WSN
Network Structure
Flat
Netowrk
Routing
Hierarchical
Network
Routing
Location
Based
Routing
Protocol Operation
Negotiation
BAsed
Rouing
multi-Path
Based
Routing
Query
Based
Routing
QoS Based
Routing
Coherent
Based
Routing
3. – Example : two path formed with gradient 0.4 and 0.8, the source may twice as
much data along the higher one
– Suppose the sink wants more frequent update from the sensor which have
detected an event => send a higher data-rate requirement for increasing the
gradient of that path.
Sensor protocol for Information Negotiation (SPIN)
SPIN use negotiation and resource adaptation to address the disadvantage of flooding.
Reduce overlap and implosion, and prolong network lifetime.
Use meta-data instead of raw data.
SPIN has three types of messages: ADV, REQ, and DATA.
SPIN-2 using an energy threshold to reduce participation. A node may join in the
ADV-REQ-DATA handshake only if it has sufficient resource above a threshold.
Fig: SPIN Protocol
1.2 Hierarchical Network Routing: hierarchical or cluster based routing, originally
proposed in wireless network, are well known techniques with special advantages related to
scalability and efficient communication. As such the concept of hierarchical routing is also
utilized to perform energy efficient routing in WSNs. In hierarchical architecture, higher
energy nodes can be used to process and send the information while the low energy nodes can
be used to perform the sensing in the proximity of the target. This means, creation of
clusters and assigning special tasks to cluster heads leading to greatly contributing
towards the overall system scalability, lifetime and energy efficiencies.
Hierarchical routing is an efficient way of lower energy consumption within a cluster and by
performing data aggregation and fusion in order to decrease the number of transmitted
messages to the base station. Hierarchical routing is mainly two layers routing where one
layer is used to select the cluster heads and the other layer is used for routing.
Some of the hierarchical routing protocols are:
LEACH Protocol
PEGASIS
TEEN and APTEEN
4. Small Minimum Energy Communication Network (MECN)
Self-Organizing Protocol
Sensor Aggregate Routing
Virtual Grid Architecture Routing (VGA)
Hierarchical Power Aware Routing
Two-Tier Data Dissemination
Difference between hierarchical vs Flat routing
Hierarchical Routing Flat Routing
Reservation based scheduling Contention based scheduling
Collision avoided Collision overhead present
Reduced duty cycle due to periodic sleeping Variable duty cycle by controlling sleep time
of nodes
Data aggregation by cluster heads Node on multi-hop path aggregates incoming
data from neighbours.
Simple but not optimal routing Routing can be made optimal but with an
added complexity
Requires global and local synchronization Links formed on the fly without
synchronization
Energy dissipation is uniform Energy dissipation depends on traffic
patterns
Energy dissipation cannot be controlled Energy dissipation adapts to traffic pattern
Fair channel allocation Fairness not guaranteed.
Overhead of the cluster formation throughout
the network
Routes formed only in regions that have data
for transmission.
Hierarchical Routing Protocol
It is natural way of routing to scale: Size, Network administration and Governance.
It exploits the address aggregation and allocation.
It allows multiple metrics at different levels of the hierarchy.
The following are the hierarchical routing protocols:
Low Energy Adaptive Clustering Hierarchy (LEACH)
Fig: LEACH protocol
5. LEACH protocol is a self-organizing adaptive clustering.
Cluster heads elect themselves in a manner random round robin manner. In future, it
could be done in with a power based probability.
The cluster head is always on and nodes die in random. The base station is stationary.
The coordination between the nodes is done in a localised manner.
Data fussion
(aggregation) takes place.
It suffers from HOT-SPOT problem: nodes on a path from an event-congested area to
the sink may drain
It is in adequate for time critical applications.
Basic algorithm assumes any node can communicate with sink – possible to a scale.
In LEACH, sink makes all the decisions. Thus, too much power is consumed in
computation at the sink.
LEACH works in round and each round consist of set-up phase (short) and steady
phase (long)
Set up phase:
o Advertisement: a cluster head decides itself as a cluster head
o Cluster set-up: nodes included in a cluster declares themselves
o Schedule creation: slots are allotted to nodes for data transmission
Steady state phase:
o Data is transmitted using TDMA
o Everyone uses same channel
o Different cluster use different CDMA code
o Code selection is done in a random manner
o The cluster heads communicates with the base station or the cluster head in
higher hierarchy.
Time Line Showing LEACH Operation
Threshold Sensitive Energy Efficient Sensor Network Protocol (TEEN)
At every cluster change time, the cluster-head broadcasts to its members
o Hard Threshold (HT)
6. This is a threshold value for the sensed attribute.
It is the absolute value of the attribute beyond which, the node sensing
this value must switch on its transmitter and report to its cluster head.
o Soft Threshold (ST)
This is a small change in the value of the sensed attribute which
triggers the node to switch on its transmitter and transmit.
It uses LEACH based clustering. It uses smart data transmission to save power. It is
suited for time-critical applications.
The cluster heads needs to listen continuously. It leads to wasted time slots.
In this protocol, it cannot distinguish between dead nodes.
Node transmit in timeslot only if both:
o Value greater then a Hard Threshold (HT)
o Value differs from last transmitted value (TV ) by more than a Soft Threshold
(ST)
After transmission, TV is reset
Adaptive periodic Threshold-sensitive Energy Efficient Sensor Network (APTEEN)
It is similar to TEEN but a better version of TEEN. It has more flexible logic and
timeslots.
It uses multi type of queries: historical, one-time and persistent.
It can also distinguish between dead and alive nodes.
Node transmit in timeslot only if both:
o Value greater then a Hard Threshold (HT)
o Value differs from last transmitted value (SV ) by more than a Soft Threshold
(ST)
o Or If did not transmit for a max time (TC )
o Or if queried by some sink
After transmission SV is reset
Power Efficient Gathering in Sensor Information System (PEGASIS)
The key idea in PEGASIS is to form a chain among the sensor nodes so that each
node will receive from and transmit to a close neighbor
The nodes will be organized to form a chain, which can either be accomplished by the
sensor nodes themselves using a greedy algorithm starting from some node.
When a node dies, the chain is reconstructed in the same manner to bypass the dead
node.
The main idea in PEGASIS is for each node to receive from and transmit to close
neighbors and take turns being the leader for transmission to the BS.
Nodes take turns transmitting to the BS, and we will use node number i mod N (N
represents the number of nodes) to transmit to the BS in round i.
7. Power Efficient Data Gathering and Aggregation protocol (PEDAP)
It is a tree-based routing protocol. The objective of PEDAP is to maximize the
network lifetime, which is defined by the number transmission rounds.
The minimum energy cost tree is uses to data transmission.
This tree is constructed by a centralized manner using Prim’s minimum spanning
tree algorithm.
Initially, the sink is defined as the root of the tree. After that, we select the
minimum weighted edge, one vertex of which is in the tree and another vertex is not
in the tree. Such an edge is added to the tree. This process lasts until all nodes are
merged into the tree.
The total energy consumption in each communication round is achieved by
computing a minimum spanning tree with link cost, which is related to data volume
and transmission distance.
In order to achieve load balancing among all nodes, the residual energy of the nodes
is taken into account during the course of data aggregation. When data transmission is
performed, the root of the tree structure acts as the CH.
Each node receives data from its child nodes, aggregates the data with its own and
delivers it to its parent node. This process continues until the aggregated data reaches
the CH. Ultimately, the data is delivered from the CH to the sink.
PEDAP can cut down the total energy dissipation in each communication round
by computing a minimum spanning tree with link cost calculation.
Moreover, the residual energy is considered. This can contribute to load balancing to
some extent. In addition, the transmission delay is lessened because the tree formation
mechanism can reduce the path length. However, in large-scale networks, the
energy cost calculation is a difficult task.
So PEDAP suffers from the scalability problem. Furthermore, the robustness of
PEDAP is very limited due to its centralized nature which requires the global
knowledge of the location of all nodes at the sink.
Types of Hierarchical routing protocol: LEACH, PEGASIS, TEEN, APTEEN, PEDAP-PA
8. Performance Parameters LEACH TEEN APTEEN PEGASIS PEDAP-PA
Energy Efficiency Poor Moderate Moderate Good Best
Network Lifetime Shortest Long Long Longer Longest
Self-Organisation Capability High High Low High Low
Network Quality Maintenance Poor Moderate Moderate Good Best
Throughput Low Low High Low High
Latency High Low Moderate High Moderate
Generally Hierarchical Routing Protocol are designed to provide scalability to WSNs while
maintaining high energy efficiency
1.3 Location Based Routing: In this kind of routing, sensor nodes are addressed by means
of their locations. The distance between neighbouring nodes can be estimated on the basis of
incoming signal strengths. Relative coordinates of neighbouring nodes can be obtained by
exchanging such information between neighbours. Alternatively, the location of nodes may
be available directly by communicating with a satellite, using GPS (Global Positioning
System), if nodes are equipped with a small low power GPS receiver. To save energy,
some location based schemes demand that nodes should go to sleep if there is no activity.
More energy savings can be obtained by having as many sleeping nodes in the network as
possible. The problem of designing sleep period schedules for each node in a localized
manner was addressed in. some of the location based routing protocols are given below:
Geographic adaptive fidelity (GAF)
Geographic and Energy Aware Routing
Most forward Within Radius (MFR)
Geographic Distance Routing (GEDIR)
ENERGY EFFICIENT ROUTING
Power Aware Routing
Transmission Power Control Approach
OMM – Online Max-min
PLR – Power Aware Localized Routing
MER – Minimum Energy Routing
COMPOW – Common Power
PAAODV – Power Aware Adhoc on Demand Distance Vector Routing
Load Distribution
LEAR – Localized Energy Aware Routing
CMMBCR – Conditional Max-Min Battery Capacity Routing
Power Management
PAMAS – Power Aware Multi Access
PDTORA – Power and Delay Aware on Demand Routing for Adhoc Networks
9. Sleep/Power Down Mode
SPAN -
GAF
Transmission power Control Approach:
This approach can be achieved with the help of topology control of a MANET. The
transmission power determines the range over which the signal can be coherently
received, and is therefore crucial in determining the performance of the network.
Power aware routing protocols based on transmission power control finds best route
that minimizes the total transmission power between a source and a destination.
It is equivalent to graph optimization problem where each link is weighted with
the link cost corresponding to the required transmission power. Finding the most
power efficient route from source to destination is equivalent to finding the least
cost path in the weighted graph.
There are some of the protocols for transmission power control approach, of which
OMM is explained here.
Online Max-Min (OMM)
o This protocol uses two different metrics of the nodes in the network:
minimizing power consumption (min-power) and maximizing the minimal
residual power (max-min).
o Max-min metric is helpful in preventing the occurrence of overloaded nodes.
o OMM protocol uses Djkstra’s algorithm to find the optimal path between
source-destination pair. This min-power path consumes the minimal power
(Pmin)
o In order to optimise the second metric, the OMM protocol obtains multiple
near optimal min-power paths that do not deviate much from the optimal
value.
o In order to obtain the max-min path among those three path candidates, the
node with the minimal residual power in each path must be compared.
Fig:
o In the next figure, node A has residual energy of 25 but it will drop to 13 if
that path is used to transfer the data packets from node S to node D.
o Similarly node B and node C will have residual energy of 6 and 20
respectively.
o Therefore, the max-min path among the three min-power path is SCD.
o The major advantage of OMM protocol is that without requiring the
information regarding the data transmission sequence or data generation rate,
10. the protocol makes a routing decision that optimizes the two different metrics
in the nodes of the network.
o The disadvantage of using OMM protocol is that the data transmission
sequence or data generation rate is not usually known in advance. This graph
optimization algorithm based on global information such as data generation
rate may not be practical because each node is provided with only the local
information.
Load distribution:
The specific objective of load distribution approach is to balance the energy usage of
all mobile nodes by selecting a route with underutilized nodes rather than the
shortest route. This may result in longer routes, but packets are routed only through
energy rich intermediate nodes.
Protocols based on this approach do not necessarily provide the lowest energy route,
but prevent certain nodes from being overloaded and thus, ensures longer lifetime.
Localized Energy Aware Routing (LEAR) Protocol
o The LEAR routing protocol is based on DSR which modifies the route
discovery procedure for balanced energy consumption.
o LEAR is a distributed algorithm where each node makes its routing
decisions based on local information such as Er and Thr.
o In DSR, when a node receives a route request message, it appends its identity
in the message’s header and forwards it toward the destination. Thus, an
intermediate node always relays messages if the corresponding route is
selected.
o However, in LEAR, a node determines whether to forward the route request
message or not depending on its residual battery Power (Er ). When Er is
higher than a threshold value Thr, the node forwards the Route-request
message; otherwise, it drops the message and refuses to participate in relaying
packets.
o Therefore, the destination node will receive a route-request message only
when all intermediate nodes along a route have good battery power levels, and
nodes with low battery levels can conserve their battery power.
o LEAR is a distributed algorithm where each node makes its routing decision
based only on local information, such as Er and Thr. As Er decreases in time,
the value of Thr must also be decreased adaptively in order to identify energy-
rich and energy-hungry nodes in a relative sense.
Basic LEAR Algorithm
Node Steps
Source Node Broadcast a ROUTE_REQ;
Wait for the first arriving ROUTE_REPLY;
Select the source route contained in the message;
11. Ignore all later replies
Intermediate
Node
If the message is not the first trial and Er < Thr adjust Thr by d;
If Er > Thr, broadcast the ROUTE_REQ and ignore all later requests
Otherwise, drop the message
Destination
Node
Upon receipt the first arriving ROUTE_REQ send a ROUTE_REPLY to
the source with the source route contained in the message
Power Management:
Power management approach helps in reducing the system power consumption and
hence prolonging the battery life of mobile nodes.
Furthermore, it improves the end-to-end network throughput as compared to
other ad-hoc networks in which all mobile nodes use the same transmit power.
The improvement is due to the achievement of a trade-off between minimizing
interference ranges, reduction in the average number of hops to reach a
destination, the probability of having isolated clusters, and the average number
of transmissions (including retransmissions due to collisions) and also due to the
fact that as the power gets higher, and the connectivity range increases, each
node would reach almost all other nodes in a single hop.
The protocols would dynamically determine first an optimal connectivity range
wherein they adapt their transmit powers so as to only reach a subset of the nodes in
the network. The connectivity range would then be dynamically changed in a
distributed manner so as to achieve the near optimal throughput.
Minimal power routing is used to further enhance performance. As power
management approach increases the throughput of the network this approach is better
in terms of throughput as compared to the previous 2 approaches.
Power Aware Multiple Access (PAMAS):
o PAMAS saves energy by turning off radios when the nodes are not in use. It
uses a new routing cost model to discourage the use of nodes running low on
battery power.
o The lifetime of the network is improved significantly. There is a trivial
negative effect on packet delivery fraction and delay, except at high traffic
scenarios, where both actually improve due to reduced congestion.
o Routing load, however, is consistently high, more at low traffic scenarios. For
the most part, PAMAS demonstrates significant benefits at high traffic and
not-so high mobility scenarios.
o Although, it was implemented on the AODV protocol, the technique used is
very standard and can be used with any on-demand protocol. The energy-
aware protocol works only in the routing layer and exploits only routing-
specific information
o In this protocol, the node can be in any of the six following different states:
Idle state - A node goes to idle state if it is not transmitting or
receiving a packet or does not have any packets to transmit or does
have packets to transmit but cannot transmit because a neighbour is
receiving a transmission.
12. Await CTS state - Whenever a node gets a packet to transmit it
transmits a RTS and enters the Await CTS state.
BEB (Binary Exponential Backoff) state-If the awaited CTS state
does not arrive the node goes into BEB (Binary Exponential Backoff)
state.
Transmit Packet state-If a CTS arrives it begins transmitting the
packet and enters the Transmit Packet state.
Await Packet state-This state comes into picture when the intended
receiver transmits the CTS.
Receive Packet state-If the packet begins arriving, it transmits a busy
tone over the signalling channel and enters the Receive Packet state
otherwise enters to the idle state.
Sleep/Power-Down Approach
The sleep/power-down mode approach focuses on inactive time during
communication. Since most radio hardware supports a number of low power states, it
is desirable to put the radio subsystem into the sleep state or simply turn it off to save
energy. However, when all the nodes in a MANET sleep and do not listen, packets
cannot be delivered to a destination node.
One possible solution is to elect a special node, called a master, and let it coordinate
the communication on behalf of its neighbouring slave nodes. Now, slave nodes can
safely sleep most of time thereby saving battery power. Each slave node periodically
wakes up and communicates with the master node to find out if it has data to receive
or not and it sleeps again if it is not addressed.
SPAN Protocol:
o SPAN protocol is a power saving mechanism that reduces power consumption
of nodes by retaining the capacity and coordinating with the underlying MAC
layer.
o SPAN tries to exploit MAC layers power saving features
o The routing layer uses information SPAN provides for power aware routing.
o Advantages of the SPAN protocol is that the master nodes play an important
role in routing by providing a routing backbone and control traffic as well as
channel contention is reduced because the routing backbone helps to avoid the
broadcast flooding of route request messages.
o Other benefits of SPAN protocol are that this technique not only preserves
network connectivity, it also preserves capacity, decreases latency and
provides significant power savings.
o Drawback of SPAN protocol is that the amount of power saving increases
slightly as density decreases
o To select master nodes in a dynamic configuration, the SPAN protocol
employs a distributed master eligibility rule so that each node independently
checks if it should become a master or not. The rule is that if two of its
13. neighbours cannot reach each other either directly or via one or two masters, it
should become a master.
o Non-master nodes also periodically determine if they should become a master
or not based on the master eligibility rule.
o In Figure below, nodes B, C and D become masters. Node B is eligible to
become master since its two neighbours A and F cannot communicate directly.
Node D is eligible to become master since its two neighbours C and E cannot
communicate directly. Node C is not eligible to become master since its
neighbours B and F can communicate with each other directly. Node C is also
eligible to become master since its neighbours B and D cannot communicate
directly.
Fig: Master Eligibility Rule in SPAN protocol
o So, if any one of the nodes B and D do not elect itself as a master, node C is
eligible to be the master.
o Thus, the master selection process is not deterministic. This rule does not yield
the minimum number of master nodes, but it provides robust connectivity with
substantial energy savings.
o However, the master nodes are easily overloaded. To prevent this and to
ensure fairness, each master periodically checks if it should withdraw as a
master and gives other neighbour nodes a chance to become a master. Non-
master nodes also periodically determine if they should become a master or
not based on the master eligibility rule
2. Protocol Operation
2.1 Multipath Routing Protocol:
These are the routing protocol that uses multiple paths rather than a single path in order to
enhance the network performance. The fault tolerance (resilience) of a protocol is
measured by the likelihood that an alternate path exist between a source and a
destination when the primary path fails. This can be increased by maintaining multiple
paths between a source and a destination at the expense of an increased energy
consumption and traffic generation. These alternate paths are kept alive by sending
periodic messages. Hence, network reliability can be increased at the expense of increased
overhead of maintaining the alternate paths.
14. 2.2 Query Based Routing:
In this kind of routing, the destination node propagates a query for data from a node through
a network and a node having this data sends the data which matches the query back to the
node which initiates the query. Usually these queries are described in a natural language or
in a high level query language. All the nodes have tables consisting of a sensing task queries
that they receive and send data which matches these tasks when they receive it.
2.3 Negotiation Based Routing:
These protocols use high level data descriptors in order to eliminate redundant data
transmission through negotiation. Communication decisions are also taken based on the
resources that are available to them.
2.4 QoS Based Routing:
In QoS based routing protocol, the network has to balance between energy consumption and
data quality. In particular, the network has to satisfy certain QoS matrices e.g. delay, energy,
bandwidth, etc. when delivering data to base station. Sequential assignment routing (SAR) is
one of the first WSN routing protocol that talks about the QoS in routing decisions.
2.5 Coherent Based Routing:
Data processing is a major component in the operation of wireless sensor networks. Hence
routing techniques employ different data processing techniques. In general, sensor nodes will
cooperate with each other in processing different data flooded in the network area.
Design of Wireless Sensor Network
Wireless sensor networks (WSNs) are networks of tiny sensing devices for wireless
communication, actuation, control, and monitoring. Given the potential benefits offered by
these networks, as, e.g., simple deployment, low installation cost, lack of cabling, and
mobility, they are specially appealing for control applications in home and industrial
automation. The variety of application domains and theoretical challenges for WSNs has
attracted research efforts for more than one decade. Nevertheless, a lively research and
standardization activity is ongoing and there is not yet a widely accepted protocol stack for
WSNs for control applications. The lack of efficient protocol solutions is due to that the
protocols for control applications face complex control and communication requirements.
Traditional control applications are usually designed by a top-down approach from a protocol
stack point of view, whereby most of the essential aspects of the network and sensing
infrastructure that has to be deployed to support control applications are ignored.
Here, packet losses and delays introduced by the communication network are considered as
non-idealities and uncertainties and the controllers are tuned to cope with them without
having any influence on them. The top-down approach is limited for two reasons: 1) it misses
15. the essential aspect of the energy efficiency that is usually required to WSNs, and 2) it can be
quite conservative and therefore inefficient, because the controllers are built by presuming
worst case wireless channel conditions that may be rarely experienced in the reality. On the
other side, protocols for WSNs are traditionally designed to maximize the reliability and
minimize the delay. This is a bottom-up approach, where controller specifications are not
explicitly considered even though the protocols are used for control. This approach is energy
inefficient because high reliability and low latency may demand significant energy
consumption. Therefore, it follows that there is the essential need of a new design approach.
Traditional WSNs applications (e.g., monitoring) need a high probability of success in the
packet delivery (reliability). In addition to reliability, control applications ask also for timely
packet delivery (latency). If reliability and latency constraints are not met, the correct
execution of control decisions may be severely compromised, thus creating unstable control
loops. High reliability and low latency may demand significant energy expenditure, thus
reducing the WSN lifetime. Controllers can usually tolerate a certain degree of packet losses
and delay: For example, the stability of a closed loop control system may be ensured by high
reliable communications and large delays, or by low delays when the packet loss is high. In
contrast to monitoring applications, for control applications there is no need to maximize the
reliability. A trade-off between latency, packet losses, and stability requirements can be
exploited for the benefit of the energy consumption, as proposed by the system level design
approach. Therefore, we claim that the protocol design for control needs a system-level
approach whereby the need of a parsimonious use of energy and the typical requirements of
the control applications are jointly taken into account and control and WSNs protocols are co-
designed. Exploiting such a trade-off poses extra challenges when designing WSNs protocols
for control applications when compared to more traditional communication networks,
namely:
Reliability: Sensor information must be sent to the sink of the network with a given
probability of success, because missing these data could prevent the correct execution
of control actions or decisions concerning the phenomena sensed. However,
maximizing the reliability may increase substantially the network energy
consumption. Hence, the network designers need to consider the tradeoff between
reliability and energy consumption.
Latency: Sensor information must reach the sink within some deadline. A
probabilistic delay requirement must be considered instead of using average packet
delay since the delay jitter can be too difficult to compensate for, especially if the
delay variability is large. Retransmission of old data to maximize the reliability may
increase the delay and is generally not useful for control application.
Energy efficiency: The lack of battery replacement, which is essential for affordable
WSN deployment, requires energy-efficient operations. Since high reliability and low
delay may demand a significant energy consumption of the network, thus reducing the
WSN lifetime, the reliability and delay must be flexible design parameters that need
to be adequate for the requirements. Note that controllers can usually tolerate a certain
degree of packet losses and delay. Hence, the maximization of the reliability and
minimization of the delay are not the optimal design strategies for the control
applications we are concerned within this chapter.
16. Adaptation: The network operation should adapt to application requirement changes,
varying wireless channel and network topology. For instance, the set of control
application requirements may change dynamically and the communication protocol
must adapt its design parameters according to the specific requests of the control
actions. To support these changing requirements, it is essential to have an analytical
model describing the relation between the protocol parameters and performance
indicators (reliability, delay, and energy consumption).
Scalability: Since the processing resources are limited, the protocol procedures must
be computationally light. These operations should be performed within the network,
to avoid the burden of too much communication with a central coordinator. This is
particularly important for large networks. The protocol should also be able to adapt to
size variation of the network, as, for example, caused by moving obstacles, or
addition of new nodes.