Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Routing in Wireless Sensor Network: Divya Lunawat

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

ROUTING IN WIRELESS SENSOR NETWORK

A SYNOPSIS
Submitted By

DIVYA LUNAWAT
BACHELOR OF TECHNOLOGY
IN

Computer Science & Engineering


SCHOOL OF ENGINEERING

Sir Padampat Singhania University, Udaipur

Under the guidance of

SUBHRENDU GUHA NEOGI

INTRODUCTION
Wireless Sensor Networks (WSNs) consist of small nodes with sensing,
computation, and wireless communications capabilities. Many routing, power
management, and data dissemination protocols have been specifically designed for
WSNs where energy awareness is an essential design issue. The focus, however,
has been given to the routing protocols which might differ depending on the
application and network architecture.
Due to recent technological advances, the manufacturing of small and low cost
sensors became technically and economically feasible. The sensing electronics
measure ambient conditions related to the environment surrounding the sensor and
transforms them into an electric signal. Processing such a signal reveals some
properties about objects located and/or events happening in the vicinity of the
sensor. A large number of these disposable sensors can be networked in many
applications that require unattended operations. A Wireless Sensor Network (WSN)
contain hundreds or thousands of these sensor nodes. These sensors have the
ability to communicate either among each other or directly to an external basestation (BS). Figure 1 shows the schematic diagram of sensor node components.
Basically, each sensor node comprises sensing, processing, transmission, mobilizer,
position finding system, and power units (some of these components are optional
like the mobilizer). The same figure shows the communication architecture of a
WSN. Sensor nodes are usually scattered in a sensor field, which is an area where
the sensor nodes are deployed. Sensor nodes coordinate among themselves to
produce high-quality information about the physical environment. Each sensor
node bases its decisions on its mission, the information it currently has, and its
knowledge of its computing, communication, and energy resources. Each of these
scattered sensor nodes has the capability to collect and route data either to other
sensors or back to an external base stations. A base-station may be a fixed node or
a mobile node capable of connecting the sensor network to an existing
communications infrastructure or to the Internet where a user can have access to
the reported data.

Figure 1: The components of a sensor nod

LITERATURE REVIEW
HeejungByun el al. [2003] proposed Adaptive Duty Cycle Control with Queue
Management in WSN. Here the queue management of the duty cycle is only
considered, so this work only concentrates on duty cycle. The energy efficient
WSN is achieved but due to the queue management the end to end delay is
increased and has the disadvantages of packet delivery ratio due to packet loss.
Qinghua Wang, and Tingting Zhang [2004] proposed Bottleneck zone analysis in
Energy-constrained wireless sensor network. This work concentrates on the
bottleneck zone which is around the sink node. They work out for lowering the
traffic in this zone. Therefore as the traffic is minimised the collisions between the
data packets are minimized and the energy consumption gets reduced.
Lun et al. [2006] proposed The network coding based approach that improves the
packet level capacity of the network. This work implements only network coding
approach for efficient packet delivery. In this work they introduced the packet
capacity, but do not have any routing scheme for better transmission. Therefore the
energy consumed by the network may increase for transmitting the data along the
unknown way.

Rout et al [2007]. In this work the routing algorithm is derived for the efficient
transfer of the data packet. Therefore the unwanted energy consumption is reduced
by introducing the routing algorithm. But in both the above work there is no
provision for energy conservation of the node

OBJECTIVE:- Study of Routing Protocols in WSN using TRM Simulator.


METHODOLOGY:
Types of Routing Protocol
WSN Routing Protocols can be classified in four ways, according to the way of
routing paths are established, according to the network structure, according to the
protocol operation and according to the initiator of communications. Fig. 3 shows
the classification of WSN routing protocols.

WSN Routing Protocol

Path
Establishment

Network
Structure

Protocol
Operation

Initiator of
Communication

Proactive

Flat

Multipath Based

Source

Reactive

Hierarchical

Query Based

Destination

Hybrid

Location Based

Negot
iation Based

QoS Based
Coherent & Non
-coherent

Figure 3: Classification of Routing Protocols in Wireless Sensor Network.


Routing paths can be established in one of three ways, namely proactive, reactive
or hybrid. Proactive protocols compute all the routes before they are really needed
and then store these routes in a routing table in each node. When a route changes,
the change has to be propagated throughout the network. Since a WSN could
consist of thousands of nodes, the routing table that each node would have to keep
could be huge and therefore proactive protocols are not suited to WSNs. Reactive
protocols compute routes only when they are needed. Hybrid protocols use a
combination of these two ideas. But in general, routing in WSNs can be divided
into three categories named as flat-based routing, hierarchical-based routing and
locationbased routing depending on the network structure. In flat-based routing, all
nodes play the same role. In hierarchical-based routing, however, nodes will play
different roles in the network. In location-based routing, sensor nodes' positions
are exploited to route data in the network. Furthermore, these protocols can be
classified into multipath-based, query-based, negotiation-based, QoS-based, or
coherent-based routing techniques depending on the protocol operation.
Flat Routing (Data Centric Routing protocols) : It is not feasible to assign
global identifiers to each node due to the sheer number of nodes deployed in
many applications of sensor networks. Such lack of global identification along
with random deployment of sensor nodes makes it hard to select a specific set
of sensor nodes to be queried. Therefore, data is usually transmitted from every
sensor node within the deployment region with significant redundancy. This
consideration has led to data-centric routing. In data-centric routing, the sink
sends queries to certain regions and waits for data from the sensors located in
the selected regions.

Hierarchical protocols: The major design attributes of sensor networks are


scalability. Since the sensors are not capable of long-haul communication,
singlegateway architecture is not scalable for a larger set of sensors.
Networking clustering has been pursued in some routing approaches to cope
with additional load and to be able to cover a large area of interest without
degrading the service. Hierarchical routing works in two layers, first layer is
used to choose clusterheads and the other layer is used for routing. To make the
WSN more energy efficient, clusters are created and special tasks (data
aggregation, fusion) are assigned to them. It increases the overall system
scalability, lifetime, and energy efficiency.
Location-based protocols : In most cases location information is needed in
order to calculate the distance between two particular nodes so that energy
consumption can be estimated. Generally two techniques are used to find
location, one is to find the coordinate of the neighbouring node and other is to
use GPS (Global Positioning System). Since, there is no addressing scheme for
sensor networks like IP-addresses and they are spatially deployed on a region,
location information can be utilized in routing data in an energy efficient way.
Multipath routing protocols : Multiple paths are used to enhance the network
performance. When the primary path fails between the source and the
destination an alternate path exists that measured the fault tolerance (resilience)
of a protocol. This can be increased, by maintaining multiple paths between the
source and the destination. This increases the cost of energy consumption and
traffic generation. The alternate paths are kept alive by sending periodic
messages. Due to this, network reliability can be increased. Also the overhead
of maintaining the alternate paths increases.
Query based routing protocols : The destination nodes propagate a query for
data (sensing task) from a node through the network and a node having this data
sends back the data to the node that matches the query to the query that
initiates. Usually these queries are described in natural language, or in highlevel query languages.
Negotiation based routing protocols: In order to eliminate redundant data
transmissions, these use high level data descriptors through negotiation. Based
on the resources that are available to them, communication decisions are taken.
The motivation is that the use of flooding to disseminate data will produce
implosion and overlap between the sent data; hence nodes will receive
duplicate copies of the same data. This consumes more energy and more
processing by sending the same data to different sensor nodes. So, the main

idea of negotiation based routing in WSNs is to suppress duplicate information


and prevent redundant data from being sent to the next sensor node or the basestation by conducting a series of negotiation messages before the real data
transmission begins.
QoS-based routing protocols : In order to satisfy certain QoS (Quality of
Service) metrics, e.g., delay, energy, bandwidth, etc. when delivering data to the
Base Station, the network has to balance between energy consumption and data
quality.
Coherent and non-coherent processing: Data processing is a major component
in the operation of wireless sensor networks. Hence, routing techniques employ
different data processing techniques. There are two ways of data processing
based routing [5].
- Non-coherent data processing: In this, nodes will locally process the raw
data before being sent to other nodes for further processing. The nodes that
perform further processing are called the aggregators.
- Coherent data processing: In coherent routing, the data is forwarded to
aggregators after minimum processing. The minimum processing typically
includes tasks like time stamping, duplicate suppression, etc. When all nodes
are sources and send their data to the central aggregator node, a large
amount of energy will be consumed and hence this process has a high cost.
One way to lower the energy cost is to limit the number of sources that can
send data to the central aggregator node.
Types of Simulator for WSN
NS-2 is the most popular non-specific network simulator environment. NS-2
is a discrete event simulator developed in C++ software. The NS-2 Supports
the wide range of protocols in all layers.
The second simulator for WSNs is OMNET++, it is also a discrete event
simulator developed in C++. It has very clear design. It provides easy
Graphical User Interface (GUI) library for tracing, animation and debugging
support.
The other type of simulator is J-sim. It is a component based simulation
environment entirely developed in JAVA software. It is also provides GUI
for tracing, animation, debugging and also the script interface.
The other simulator is NCTUns2.0, it is a discrete event simulator developed
in kernel of UNIX software.

JiST/SWANS, it is also a discrete event simulation framework that embeds


the simulation in JAVA byte-code. It is run entirely in JAVA programming.
GloMoSim, it is one type of simulation framework simulation environment
built in parsec. Parsec is a simulation language derived from C language.

TRM Simulator
TRMSim-WSN (Trust and Reputation Models Simulator for Wireless Sensor
Networks) is a Java-based simulator aimed to test Trust and Reputation models for
WSNs.
It provides several Trust and Reputation models and new ones can be easily added.
It allows researchers to test and compare their trust and reputation models against a
wide range of WSNs. They can decide whether they want static or dynamic
networks, the percentage of fraudulent nodes, the percentage of nodes acting as
clients or servers, etc.
It has been designed to easily adapt and integrate a new model within the
simulator. Only a few classes have to be implementend in order to carry out this
task.

Figure 3: TRM Simulator

REFERENCES
[1]

Stephan Olariu, Information assurance in wireless sensor networks, Sensor


network research group, Old Dominion University.

[2]

C. Chong and S. P. Kumar, Sensor Networks: Evolution, Opportunities, and


Challenges, in Proceedings of the IEEE, vol. 91, no. 8, Aug. 2003.

[3]

Karp and H. T. Kung, GPSR: greedy perimeter stateless routing for wireless
networks, in Mobile Computing and Networking, 2000, pp. 243254.

[4]

Holger Karl and Andreas Willig. Protocols and architectures for Wireless
Sensor Networks, Wiley, 2005, ISBN:0470095105.

[5]

Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, A survey on sensor


networks, IEEE Communication Magazine, Aug. 2002.
[6]

http://ants.inf.um.es/~felixgm/research/trmsim-wsn/

[7]

http://dspace.thapar.edu:8080/dspace/bitstream/10266/785/1/f

[8]

http://www.ijetae.com/files/ICADET15/IJETAE_ICADET_15_05.pdf

You might also like