SlideShare una empresa de Scribd logo
1 de 17
Descargar para leer sin conexión
ENERGY AWARE ROUTING PROTOCOLS

               GUIDE
           Dr. Aloknath De




                             Ashish Joshi
                             Vipin Kumar Garg
Routing protocol classification:
 Data Centric : helps in removing the redundant
  transmissions

 Hierarchical : clustering of nodes


 Location Based: use location based information to relay the
  date to a node rather than the whole network

 Network flow & QoS awareness
Classical approaches: Flooding & Gossiping
 Flooding:
  A node simply sends the copy of data to all its neighbors ,except
   from the one it has just received the data.

 Gossiping:
  Forward data to one randomly selected node to conserve energy.
  Distribute information slowly
  Dissipate energy at a slower rate.
Deficiencies of classical routing:
                 1. Implosion



2.Overlap




3.Resource Blindness
SPIN(Sensor Protocol Information via Negotiation )
Key innovations:
 Negotiations : metadata
 Resource adaptation


Metadata:
 Completely describes collected data
 Application specific


SPIN Messages:
 ADV : meta-data
 REQ: meta-data
 DATA: Actual data + meta-data
SPIN-PP
          ADV
          REQ
          DATA
Directed Diffusion
Directed Diffusion is defined by four elements
 Interest : it is a query which specifies what user wants.
 Data Message : It is collected or processed information of a
  physical phenomena.
 Gradient : It is direction state in each node that receive an
  interest
 Reinforcement :This defines the one or small no. of paths
  from multiple gradient paths from source to originator of
  interest.
Naming
Pattern of a interest
 Type = wheeled vehicle
 Interval = 20ms
 Duration = 10s
 Rect = [-100,100,200,400]
Pattern of a data message
 Type = wheeled vehicle
 Location = [125,250]
 Intensity = 0.6
 Timestamp = 01:20:40
Directed diffusion


Source                                                                                               BS
                                                    BS      Source



             (a) Propagate interest                                           (b) Set up gradients




                                                                               BS
                  Source




                                      (c) Send data and path reinforcemennt
Interest and Gradient
 An interest is usually injected into the network at some
  node(sink) in the network.
Interest propagation :
 Every node maintain an interest cache, each item in cache
  corresponds to a distinct interest.
 When a node receives an interest it checks it in the cache.
Gradient Establishment:
 Every pair of neighboring nodes establish a gradient towards
  each other.
 A gradient specifies both data rate and direction in which to
  send events.
Data Propagation
 When a sensor node detects a target searches its cache for
  matching interest entry.
 It computes the highest requested event rate among all its
  outgoing gradient.
 When a node receive a data message, it also search in cache
  to find matching interest entry.
 If no entry matched or has it has sent it to others already than
  data message silently dropped.
Reinforcement
Path establishment using positive reinforcement : to reinforce
  the neighbor, the sink resend original interest message with
  higher data rate.
Local repair for failed paths : A intermediate node also can
  apply reinforcement rules.
Path truncation using negative reinforcement : it is possible that
  more than one path reinforced, if one path is consistently
  better, we have a mechanism to negative reinforce the second
  path.
Wireless
sensor
network
simulator
v1.1
REFRENCES
 Akaya K. ,Younis M. , “A Survey on Routing Protocols for
  Wireless Sensor Networks” , Elsevier Ad Hoc Network
  Journal, Vol. 3 (2005)
 Kulik, Heinzelman , Balakrishnan,MIT “Negotiation based
  protocols for disseminating information in wireless sensor
  networks”
 Chalermek Intanagonwiwat, Ramesh Govindan, “Directed
  Diffusion for Wireless Sensor Networking”, IEEE transaction
  on networking,Vol.11,No.1,Feb.2003
Thank you

Más contenido relacionado

La actualidad más candente

Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyAli Habeeb
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingHabibur Rahman
 
An Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing ProtocolAn Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing Protocoljaimin_m_raval
 
Qos aware routing protocol for wsn
Qos aware routing protocol for wsnQos aware routing protocol for wsn
Qos aware routing protocol for wsnKamal Patel
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECYogesh Fulara
 
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN Sathish Silence
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor networkshashankcsnits
 
Geographical routing presentation
Geographical routing presentationGeographical routing presentation
Geographical routing presentationApoorva Nagaraj
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSNMahbubur Rahman
 
clustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHclustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHJimit Rupani
 
Energy efficient communication techniques for wireless micro sensor networks
Energy efficient communication techniques for wireless micro sensor networksEnergy efficient communication techniques for wireless micro sensor networks
Energy efficient communication techniques for wireless micro sensor networksPushpita Biswas
 
Energy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSNEnergy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSNZubin Bhuyan
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksDarpan Dekivadiya
 
Clouster Based Routing Protocol
Clouster Based Routing ProtocolClouster Based Routing Protocol
Clouster Based Routing ProtocolSantosh Regmi
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networkssashar86
 

La actualidad más candente (20)

WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Thesis-Final-slide
Thesis-Final-slideThesis-Final-slide
Thesis-Final-slide
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
 
An Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing ProtocolAn Energy Aware QOS Routing Protocol
An Energy Aware QOS Routing Protocol
 
Qos aware routing protocol for wsn
Qos aware routing protocol for wsnQos aware routing protocol for wsn
Qos aware routing protocol for wsn
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEEC
 
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
 
Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & Pegasis
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
 
Geographical routing presentation
Geographical routing presentationGeographical routing presentation
Geographical routing presentation
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
 
clustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHclustering protocol in WSN:LEACH
clustering protocol in WSN:LEACH
 
Energy efficient communication techniques for wireless micro sensor networks
Energy efficient communication techniques for wireless micro sensor networksEnergy efficient communication techniques for wireless micro sensor networks
Energy efficient communication techniques for wireless micro sensor networks
 
Energy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSNEnergy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSN
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor Networks
 
Clouster Based Routing Protocol
Clouster Based Routing ProtocolClouster Based Routing Protocol
Clouster Based Routing Protocol
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
 
Routing in Wireless Sensor Networks
Routing in Wireless Sensor NetworksRouting in Wireless Sensor Networks
Routing in Wireless Sensor Networks
 

Destacado

Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...ketaki19deshmukh
 
Energy aware efficient geographic routing in lossy wireless Networks
Energy aware efficient geographic routing in lossy wireless NetworksEnergy aware efficient geographic routing in lossy wireless Networks
Energy aware efficient geographic routing in lossy wireless NetworksPrajwal Panchmahalkar
 
Data centric multiobjective qo s-aware routing protocol (dm-qos) for body are...
Data centric multiobjective qo s-aware routing protocol (dm-qos) for body are...Data centric multiobjective qo s-aware routing protocol (dm-qos) for body are...
Data centric multiobjective qo s-aware routing protocol (dm-qos) for body are...Iffat Anjum
 
CCNxCon2012: Session 3: Content-centric VANETs: routing and transport issues
CCNxCon2012: Session 3: Content-centric VANETs: routing and transport issuesCCNxCon2012: Session 3: Content-centric VANETs: routing and transport issues
CCNxCon2012: Session 3: Content-centric VANETs: routing and transport issuesPARC, a Xerox company
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksGokuldhev mony
 
Search Engine Optimization (SEO)
Search Engine Optimization (SEO)Search Engine Optimization (SEO)
Search Engine Optimization (SEO)Dennis Deacon
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar pptEisha Madhwal
 
Introduction to SEO
Introduction to SEOIntroduction to SEO
Introduction to SEORand Fishkin
 

Destacado (9)

Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
Design and implementation of TARF: A Trust Aware Routing Framework for Wirele...
 
Energy aware efficient geographic routing in lossy wireless Networks
Energy aware efficient geographic routing in lossy wireless NetworksEnergy aware efficient geographic routing in lossy wireless Networks
Energy aware efficient geographic routing in lossy wireless Networks
 
Data centric multiobjective qo s-aware routing protocol (dm-qos) for body are...
Data centric multiobjective qo s-aware routing protocol (dm-qos) for body are...Data centric multiobjective qo s-aware routing protocol (dm-qos) for body are...
Data centric multiobjective qo s-aware routing protocol (dm-qos) for body are...
 
CCNxCon2012: Session 3: Content-centric VANETs: routing and transport issues
CCNxCon2012: Session 3: Content-centric VANETs: routing and transport issuesCCNxCon2012: Session 3: Content-centric VANETs: routing and transport issues
CCNxCon2012: Session 3: Content-centric VANETs: routing and transport issues
 
Presentation1
Presentation1Presentation1
Presentation1
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Search Engine Optimization (SEO)
Search Engine Optimization (SEO)Search Engine Optimization (SEO)
Search Engine Optimization (SEO)
 
wireless sensor network my seminar ppt
wireless sensor network my seminar pptwireless sensor network my seminar ppt
wireless sensor network my seminar ppt
 
Introduction to SEO
Introduction to SEOIntroduction to SEO
Introduction to SEO
 

Similar a Wireless sensor networks routing protocols

Trust Based Routing In wireless sensor Network
  Trust Based  Routing In wireless sensor Network  Trust Based  Routing In wireless sensor Network
Trust Based Routing In wireless sensor NetworkAnjan Mondal
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks DEBABRATASINGH3
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksSayed Chhattan Shah
 
Routing_Techniques_in_Wireless_Sensor_Ne.ppt
Routing_Techniques_in_Wireless_Sensor_Ne.pptRouting_Techniques_in_Wireless_Sensor_Ne.ppt
Routing_Techniques_in_Wireless_Sensor_Ne.pptAbyThomas54
 
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkAnalysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkIJMER
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHijsrd.com
 
Implementation of hybrid data collection (mobile element and hierarchical clu...
Implementation of hybrid data collection (mobile element and hierarchical clu...Implementation of hybrid data collection (mobile element and hierarchical clu...
Implementation of hybrid data collection (mobile element and hierarchical clu...IJARIIT
 
WSN_Chapter 4 Routing Protocols-I.pptx
WSN_Chapter 4 Routing Protocols-I.pptxWSN_Chapter 4 Routing Protocols-I.pptx
WSN_Chapter 4 Routing Protocols-I.pptxRamprakashSingaravel1
 
Network structure routing_protocols_in_wsn
Network structure routing_protocols_in_wsnNetwork structure routing_protocols_in_wsn
Network structure routing_protocols_in_wsnGr Patel
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networkssangusajjan
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkijwmn
 
Energy efficient routing_in_wireless_sensor_networks
Energy efficient routing_in_wireless_sensor_networksEnergy efficient routing_in_wireless_sensor_networks
Energy efficient routing_in_wireless_sensor_networksGr Patel
 

Similar a Wireless sensor networks routing protocols (20)

Trust Based Routing In wireless sensor Network
  Trust Based  Routing In wireless sensor Network  Trust Based  Routing In wireless sensor Network
Trust Based Routing In wireless sensor Network
 
Protocols for wireless sensor networks
Protocols for wireless sensor networks Protocols for wireless sensor networks
Protocols for wireless sensor networks
 
WSN netw layer.pptx
WSN netw layer.pptxWSN netw layer.pptx
WSN netw layer.pptx
 
3-Routing.ppt
3-Routing.ppt3-Routing.ppt
3-Routing.ppt
 
Ad-HOc presentation
Ad-HOc presentationAd-HOc presentation
Ad-HOc presentation
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc Networks
 
Routing_Techniques_in_Wireless_Sensor_Ne.ppt
Routing_Techniques_in_Wireless_Sensor_Ne.pptRouting_Techniques_in_Wireless_Sensor_Ne.ppt
Routing_Techniques_in_Wireless_Sensor_Ne.ppt
 
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkAnalysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
 
Implementation of hybrid data collection (mobile element and hierarchical clu...
Implementation of hybrid data collection (mobile element and hierarchical clu...Implementation of hybrid data collection (mobile element and hierarchical clu...
Implementation of hybrid data collection (mobile element and hierarchical clu...
 
WSN_Chapter 4 Routing Protocols-I.pptx
WSN_Chapter 4 Routing Protocols-I.pptxWSN_Chapter 4 Routing Protocols-I.pptx
WSN_Chapter 4 Routing Protocols-I.pptx
 
Network structure routing_protocols_in_wsn
Network structure routing_protocols_in_wsnNetwork structure routing_protocols_in_wsn
Network structure routing_protocols_in_wsn
 
Unit VIII wireless sensor networks
Unit VIII wireless sensor networksUnit VIII wireless sensor networks
Unit VIII wireless sensor networks
 
ROUTING STRATEGIES IN DTN
ROUTING STRATEGIES IN DTNROUTING STRATEGIES IN DTN
ROUTING STRATEGIES IN DTN
 
Unit8 tgb
Unit8 tgbUnit8 tgb
Unit8 tgb
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
 
Sensor net
Sensor netSensor net
Sensor net
 
Manet
ManetManet
Manet
 
Energy efficient routing_in_wireless_sensor_networks
Energy efficient routing_in_wireless_sensor_networksEnergy efficient routing_in_wireless_sensor_networks
Energy efficient routing_in_wireless_sensor_networks
 
7. 22181.pdf
7. 22181.pdf7. 22181.pdf
7. 22181.pdf
 

Último

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Último (20)

Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Wireless sensor networks routing protocols

  • 1. ENERGY AWARE ROUTING PROTOCOLS GUIDE Dr. Aloknath De Ashish Joshi Vipin Kumar Garg
  • 2. Routing protocol classification:  Data Centric : helps in removing the redundant transmissions  Hierarchical : clustering of nodes  Location Based: use location based information to relay the date to a node rather than the whole network  Network flow & QoS awareness
  • 3. Classical approaches: Flooding & Gossiping Flooding:  A node simply sends the copy of data to all its neighbors ,except from the one it has just received the data. Gossiping:  Forward data to one randomly selected node to conserve energy.  Distribute information slowly  Dissipate energy at a slower rate.
  • 4. Deficiencies of classical routing: 1. Implosion 2.Overlap 3.Resource Blindness
  • 5. SPIN(Sensor Protocol Information via Negotiation ) Key innovations:  Negotiations : metadata  Resource adaptation Metadata:  Completely describes collected data  Application specific SPIN Messages:  ADV : meta-data  REQ: meta-data  DATA: Actual data + meta-data
  • 6. SPIN-PP ADV REQ DATA
  • 7. Directed Diffusion Directed Diffusion is defined by four elements  Interest : it is a query which specifies what user wants.  Data Message : It is collected or processed information of a physical phenomena.  Gradient : It is direction state in each node that receive an interest  Reinforcement :This defines the one or small no. of paths from multiple gradient paths from source to originator of interest.
  • 8. Naming Pattern of a interest  Type = wheeled vehicle  Interval = 20ms  Duration = 10s  Rect = [-100,100,200,400] Pattern of a data message  Type = wheeled vehicle  Location = [125,250]  Intensity = 0.6  Timestamp = 01:20:40
  • 9. Directed diffusion Source BS BS Source (a) Propagate interest (b) Set up gradients BS Source (c) Send data and path reinforcemennt
  • 10. Interest and Gradient  An interest is usually injected into the network at some node(sink) in the network. Interest propagation :  Every node maintain an interest cache, each item in cache corresponds to a distinct interest.  When a node receives an interest it checks it in the cache. Gradient Establishment:  Every pair of neighboring nodes establish a gradient towards each other.  A gradient specifies both data rate and direction in which to send events.
  • 11. Data Propagation  When a sensor node detects a target searches its cache for matching interest entry.  It computes the highest requested event rate among all its outgoing gradient.  When a node receive a data message, it also search in cache to find matching interest entry.  If no entry matched or has it has sent it to others already than data message silently dropped.
  • 12. Reinforcement Path establishment using positive reinforcement : to reinforce the neighbor, the sink resend original interest message with higher data rate. Local repair for failed paths : A intermediate node also can apply reinforcement rules. Path truncation using negative reinforcement : it is possible that more than one path reinforced, if one path is consistently better, we have a mechanism to negative reinforce the second path.
  • 14.
  • 15.
  • 16. REFRENCES  Akaya K. ,Younis M. , “A Survey on Routing Protocols for Wireless Sensor Networks” , Elsevier Ad Hoc Network Journal, Vol. 3 (2005)  Kulik, Heinzelman , Balakrishnan,MIT “Negotiation based protocols for disseminating information in wireless sensor networks”  Chalermek Intanagonwiwat, Ramesh Govindan, “Directed Diffusion for Wireless Sensor Networking”, IEEE transaction on networking,Vol.11,No.1,Feb.2003