Qualitative Analysis of Routing Protocols in WSN

Eswar Publications
Eswar PublicationsEswar Publications

Wireless Sensor Network (WSN) is partially distributed autonomous sensors to monitor physical or environmental conditions such as temperature, pressure etc. and to cooperatively pass their data through the network to the central location. The technique referred to as multi-hop wireless communications is used by the WSN’s to communicate. Due to the limited processing power and the finite power accessible to each sensor nodes, the application of regular routing techniques is not recommended. Hence recent advances in wireless sensor networks have made the routing protocols more efficient. This paper surveys and compares the advanced routing protocols. The three main categories discussed here are flat based, hierarchical based and location based. The paper concludes with open research issues.

Int. J. Advanced Networking and Applications
Volume: 08 Issue: 02 Pages: 3021-3025 (2016) ISSN: 0975-0290
3021
Qualitative Analysis of Routing Protocols in
WSN
Raghunandan.G.H
Department of Telecommunication, BMS Institute of Technology, Bangalore, India
Email: raghunandangh@bmsit.in
Archana.A.R , Rachana Pai, Raksha Hegde, T.N.Srinidhi
Department of Telecommunication, BMS Institute of Technology, Bangalore, India
Email: ararchana90@gmail.com
--------------------------------------------------------------------ABSTRACT-------------------------------------------------------------
Wireless Sensor Network (WSN) is partially distributed autonomous sensors to monitor physical or
environmental conditions such as temperature, pressure etc. and to cooperatively pass their data through the
network to the central location. The technique referred to as multi-hop wireless communications is used by the
WSN’s to communicate. Due to the limited processing power and the finite power accessible to each sensor nodes,
the application of regular routing techniques is not recommended. Hence recent advances in wireless sensor
networks have made the routing protocols more efficient. This paper surveys and compares the advanced routing
protocols. The three main categories discussed here are flat based, hierarchical based and location based. The
paper concludes with open research issues.
Keywords- Flat based, Hierarchical, Location based, Routing techniques, WSN
--------------------------------------------------------------------------------------------------------------------------------------------
Date of submission: Oct 07, 2016 Date of Acceptance: Oct 20, 2016
--------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
Micro–sensors development in recent times is due to
microelectronic mechanical systems and low power and
highly integrated digital electronics. MEMS are
equipped with data processing and communication
capabilities. The ambient conditions surrounding the
environment are sensed by the sensory circuits and are
converted into electrical signals. Properties of the
objects located and the events happening in the locality
of the sensor are obtained through the processing of
such electrical signals. The radio transmitter collects the
data sent by the sensor and sends it to a command
centre also known as sink. The interest in the possible
use of huge set of disposable unused sensors has
increased because of the decrease in cost of sensors and
size. Many researchers have been carried out the past
years pointing to the potential of collaboration among
sensors in data collecting and processing. The
management and coordination of the sensing activity
and flow of the data to the sink. A network with
wireless links that is created among the sensors by an
ad-hoc technique is the basic set up for such
collaborative distributed sensors. Sensing over larger
geographical region with greater accuracy is possible by
a Wireless Sensor Network which has hundreds or
thousands of these sensor nodes. Many applications that
require operations which are unattended can be
networked through WSN which possess ability to
communicate by an external base station or directly
among each other.
Fig 1. Wireless sensor Network
Sensor node components with each sensor node
comprising of sensors, processors and transmission
mobilizes forms a schematic diagram which is shown in
figure 1. The sensor nodes gather and route the data to
other base stations which have a mobile node capable of
connecting the sensor network to present
communication setup or to the internet which provides
an access to the reported data to the users or directly to
the other sensors. The sensor node has capability to
base its decision of its mission and information it
currently has and its computing communication, energy
resources.
The deployment of the large number of sensor nodes
leads to the close arrangement of the neighboring
nodes. This helps in lowering the power consumption
by the multi hop communication when compared to the
single hop communication. To make the covert
operation desirable the transmission power must be
maintained at a lower level. The signal propagation
effects experienced in long distance wireless
communication can be effectively overcome by the
Usage of multi-hop communication. The requirement
for the low power consumptions on the sensor nodes is
its main drawback. The power sources used in sensor
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 02 Pages: 3021-3025 (2016) ISSN: 0975-0290
3022
nodes are irreplaceable and are limited in number.
Therefore, power conservation should be primarily
focused in order to achieve high quality of service
(QoS). To prolong the network lifetime the nodes must
have inbuilt trade-off mechanisms. This results in the
reduction of transmission delay. Many researches are
progressing towards these developments. In this paper,
survey of protocols and algorithms are proposed for
sensor networks. This paper helps in understanding the
current research issues in this field. This paper also
contains the following: In section2, a brief overview on
the various design issues and routing challenges are
discussed. Three types of protocols and their categories
are summarized in section3.
Fig 2. Components of Sensor Nodes
II. DESIGN ISSUES AND ROUTING
TECHNIQUES.
Various design constraints and architectures are
taken into consideration for sensor networks based on
their applications. The routing protocols perform very
similar to the architecture modeling. Therefore, in this
section we look into the architectural issues and throw
light on their implications.
2.1 Hardware resources limitation: Sensor nodes can
perform limited computational functionalities, as they
have limited processing, storage capacities and energy
capacities. The design of software development and
network protocols for sensor networks face many
challenges offered by hardware constraints along with
considering the energy constraints in sensor nodes. It
also considers the processing and storage capacities of
sensor nodes.
2.2 Node Deployment: One of the most fundamental
issues to be solved in WSNs is Node Deployment. The
complexity of problems in WSNs such as routing, data
fusion, communication etc. can be overcome by the
proper node deployment scheme. This also helps in
reducing the power consumption thereby extending the
life span of WSNs. The node deployments are either
deterministic or random for large scale WSNs. The
parameters with which the performance is measured are
the distance coverage, energy consumption and
message transfer delay.
2.3 Quality of service: Time constraint applications are
bounded by another condition that is bounded latency
for data delivery. In order to extend the total network
lifetime and reduce energy dissipation in the nodes
which are caused when the energy gets depleted, the
network may have to be required to reduce the quality
of the results. This majorly comes into picture in some
of the applications where the data from the moment it is
sensed should be delivered within a certain period of
time otherwise the data will be useless. Hence to
capture this requirement energy efficient routing
protocols are required.
2.4 Adaptability: A node may fail, join, or move in
sensor network which would result in changes in
network topology and node density. It is necessary that
the network protocols designed for sensor networks
should be adaptive to such density and topology
changes.
2.5 Fault tolerance: Sensor nodes are suffered to
failures due to harsh deployment environments and
unattended operations. So the sensor nodes should be
fault tolerant. Sensors have the abilities of self
calibrating, self-testing, self-repairing and self-
recovering.
2.6 Scalability: The number sensor nodes in sensor
networks are in the order of tens, hundreds, or
thousands hence the network protocols designed for
sensor networks should be scalable to different network
sizes.
III. CLASSIFICATION OF ROUTING
PROTOCOLS:
In many different ways we can classify the routing
algorithms for WSNs which is having a large design
space. In general, the classification of routing technique
in WSNs is divided into flat-based routing, hierarchical-
based routing and location-based routing depending on
the network structure.
The first category considered is flat-based or the data-
centric routing protocols. Node centric communication
is not commonly used communication type in WSNs.
Therefore, data centric routing protocols are designed
for WSNs. Flat based routing protocols distribute
information as needed to any router that can be reached
or receive information. Here each router node routinely
collects and distributes routing information with its
neighboring routers. The entire participating node
addressed by flat routing protocol performs an equal
role in the overall routing mechanism.
The next category is hierarchical-based or cluster based
routing protocols. A hierarchical routing protocol
allows an administrator to make best use of his fast
powerful routers in the backbone and the slower, lower
energy routers may be used for network access at the
edge of the network. Some hierarchical routing
protocols also perform route aggregation to reduce the
number of routes advertised. The cluster based routing
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 02 Pages: 3021-3025 (2016) ISSN: 0975-0290
3023
protocols are more advantageous for WSN due to the
higher energy utilization rate and being more scalable.
The last category is the location-based routing protocol.
This type of protocol is used for energy efficiency in
WSNs. The distance between neighboring nodes can be
estimated by incoming signal strength. By exchanging
information between neighbors relative coordinates of
neighboring nodes can be obtained. We can determine
the location of the nodes directly by communicating
with a satellite, using GPS (Global Positioning System)
if small low power GPS receivers are present in the
nodes. Few location-based schemes demand that nodes
should go to sleep when there is no activity in order to
save energy. More the number of inactive nodes more is
the energy saved. By using this type routing
performance can be improved.
IV. COMPARISION OF ROUTING
PROTOCOLS:
In this paper we have compared routing protocols
according to their design characteristics which is shown
in the table below.
4.1 Flat based routing.
 SPIN: Sensor Protocols for Information via
Negotiation.
 Directed diffusion.
 Rumor routing.
 GBR: Gradient Based Routing.
 MCFA: Minimum Cost Forwarding
Algorithm.
 CADR: Constrained Anisotropic Diffusion
Routing.
 COUGAR
 ACQUIRE: ACquire QUery forwarding In
sensoR nEtworks.
4.2 Hierarchical based routing.
 LEACH: Low Energy Adaptive Clustering
Hierarchy.
 TEEN: Threshold Sensitive Energy Efficient
sensor Network.
APTEEN: Adaptive Periodic Threshold
Sensitive Energy Efficient sensor Network.
 PEGASIS: The Power-Efficient Gathering in
Sensor Information Systems.
 MECN: Minimum Energy Communication
Network. SMECN: Small Minimum
Energy Communication Network.
 SOP: Self Organizing Protocol
 HPAR: Hierarchical Power Aware Routing.
 VGA: Virtual Grid Architecture Routing.
 TTDD: Two-Tier Data Communication.
4.3 Location based routing.
 GAF: Geographic Adaptive Fidelity.
 GEAR: Geographic and Energy Aware
Routing.
 SPAN
 GOAFR: The Greedy Other Adaptive Face
Routing.
ROUTING
PROTOCOLS
CLASSIFICATION MOBILITY POWER
USAGE
DATA
AGGREGATION
QoS STATE
COMPLEXITY
SCALABILITY QUERY
BASED
SPIN Flat Possible Limited Yes No Low Limited Yes
Directed
Diffusion
Flat Limited Limited Yes No Low Limited Yes
Rumor
Routing
Flat Very Limited N/A Yes No Low Good Yes
GBR Flat Limited N/A Yes No Low Limited Yes
MCFA Flat No N/A No No Low Good No
CADR Flat No Limited Yes No Low Limited No
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 02 Pages: 3021-3025 (2016) ISSN: 0975-0290
3024
COUGAR Flat No Limited Yes No Low Limited Yes
ACQUIRE Flat Limited N/A Yes No Low Limited Yes
LEACH Hierarchical Fixed BS Maximu
m
Yes No CHs Good No
TEEN &
APTEEN
Hierarchical Fixed BS Maximu
m
Yes No CHs Good No
PEGASIS Hierarchical Fixed BS Maximu
m
No No Low Good No
MECN &
SMECN
Hierarchical No Maximu
m
No No Low Low No
SOP Hierarchical No N/A No No Low Low No
HPAR Hierarchical No N/A No No Low Good No
VGA Hierarchical No N/A Yes No CHs Good No
TTDD Hierarchical Yes Limited No No Moderate Low Possible
GAF Location Limited Limited No No Low Good No
GEAR Location Limited Limited No No Low Limited No
SPAN Location Limited N/A Yes No Low Limited No
GOAFR Location No N/A No No Low Good No
Table 1: Comparison of routing protocols based on their design characteristics
V. RESEARCH ISSUES AND FUTURE
WORKS:
The common problem faced by wireless sensor
networks (WSNs) is energy. When a sensor is drained
out, it can no longer be able to achieve its goal unless
the energy source is replaced. In WSN future works in
routing techniques focuses on different direction which
share the common aim of extending the network
lifetime.
Some of them are:
 Designing more secured and more effective
routing techniques.
 Achieving the density of the sensor nodes.
 To work on accomplishing redundancy and
to employ fault tolerance in an effective
way.
 Reducing delay time and improving energy
efficiency.
 Synchronization of time and location.
 Further work includes research in the
integration of sensor networks using internet
i.e. with wired networks.
VI. CONCLUSION
In recent years routing in sensor networks has
drawn huge attention and introduced new
challenges compared to classic data routing in
wired networks. We have given an extensive
survey on data routing in sensor networks and
categorized the techniques into three main
classification namely flat based, hierarchical-based
and location based in this paper. Even though
many of these routing techniques look favorable,
still they have many complications that required to
be solved in sensor networks. We promoted those
complications and defined some future work issues
in this concern.
REFERENCES
[1]. Ms. Reshma Jayesh Rasal, Dr. Shyamrao V.
Gumaste, Prof. Gajanan S. Deokate, “Survey on
different routing issues and design challenges in WSN”
IJSEAS volume-1, Issue-4, July 2015, ISSN:2395-
3470.
[2]. Manasa.C, Raghunandan.G.H, “A comparative
survey on routing protocols in wireless sensor
networks” 2014.
[3]. Kemal Akkayya, Mohamed Younis, “A survey on
routing protocols on wireless sensor networks in Ad
Hoc Networks 3, 2005, 325-349.
[4]. Ming Liu, Jiannong Cao, Guihai Chen, Xiaomin
Wang, “An Energy-Aware routing protocols in wireless
sensor networks”, Sensors 2009, volume-9, pp. 445-
462.
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 02 Pages: 3021-3025 (2016) ISSN: 0975-0290
3025
[5]. Raghunandan.G.H, “A comparative analysis of
routing techniques for wireless sensor networks”,
Proceedings of the national conference on innovations
in emerging technology, IEEE conference, pp. 17-22
Feb 2011.
[6]. J. Heidemann, D. Estrin, “Geography informed
energy conservation for ad-hoc routing”, Proceedings
ACM/IEEE MobiCom’01, Rome, Italy, July 2001,
pp.70-84.
[7]. S.K. Singh, M.P. Singh, D.K. Singh, “A survey of
energy efficient hierarchical cluster-based routing in
wireless sensor networks”, International Journal of
Advanced Networking and Application (IJANA), sept-
Oct 2010, vol. 02, issue 02, pp. 570-580.
[8]. J. Kulik, W. R. Heinzelman, and H. Balakrishnan:
Negotiation-Based Protocols for Disseminating
Information in Wireless Sensor Networks, Wireless
Networks, vol. 8, pp. 169–85 (2002).
[9]. W. Heinzelman, J. Kulik, and H. Balakrishnan:
Adaptive Protocols for Information Dissemination in
Wireless Sensor Networks, Proc. 5th ACM/IEEE
Mobicom, Seattle, WA, pp. 174–85 (Aug. 1999).
[10]. Jamal N, Al-Karaki, Ahmed E. Kamal,
“Techniques in wireless sensor networks: A Survey.
[11]. D. Braginsky, D. Estrin, “Rumour Routing
algorithm for sensor networks”, Proceedings- The first
Workshop of sensor networks and applications.
[12]. C. Schurgers, M. B. Srivastava, “Energy efficient
routing in wireless sensor networks in the MILCOM
Proceedings on communications for network centric
operations, Creating the Information force, McLean,
VA (2001).
[13]. F. Ye, A. Chen, S. Liu, L. Zhang, “A Scalable
solution to minimum cost forwarding in large sensor
networks”, Proceedings of the tenth International
Conference on Computer Communications and
Networks (ICCCN).
[14]. M. Chu, H. Haussecker, F. Zhao, “Scalable
information driven sensor querying and routing for ad-
hoc Heterogeneous sensor networks, the international
Journal of high performance computing applications,
Vol-16, No. 3, August 2002.
[15] Y. Yao and J. Gehrke: The cougar approach to in
network query processing in sensor networks, in
SIGMOD Record(September 2002).
[16]. N. Sadagopan et al, “The ACQUIRE mechanism
for efficient querying in sensor networks”, in the
Proceedings of the First International Workshop on
protocols in wireless sensor networks.
[17]. A. Manjeshwar, D. P Agarwal, “TEEN: A
routing protocol for enhanced efficiency in wireless
sensor networks”, First International workshop on
parallel and distributed computing issues in
wireless networks and mobile computing, April
2001.
[18]. Raghunandan.G.H, Narendra. K, Varun V, “A
Comparitive Analysis of energy efficient routing
protocols in WSN”, Springer, Volume no.248, pp.399,
2014
Authors Biographies:
Raghunandan G.H received B.E
degree in Electronics and
Communication Engineering from
Visvesvaraya Technological
University. He did his M.Tech in
the field of Digital Electronics and communication
from Visvesvaraya Technological University,
Belgaum. He is currently working as Assistant
Professor in Department of Telecommunication at
BMS Institute of Technology and Management,
Bengaluru. His areas of interest are Wireless Ad-Hoc
and Sensor Networks. He has published 15 papers at
International conferences and 8 papers in International
journals.
Archana A.R is pursuing B.E
degree in Telecommunication from
Visvesvaraya Technological
University. Her area of interest
includes wireless communication
and networking.
Rachana Pai is pursuing B.E
degree in Telecommunication from
Visvesvaraya Technological
University. Her area of interest
includes wireless communication
and networking.
Raksha Hegde is pursuing B.E
degree in Telecommunication from
Visvesvaraya Technological
University. Her area of interest
includes wireless communication
and networking.
T N Srinidhi is pursuing B.E
degree in Telecommunication from
Visvesvaraya Technological
University. Her area of interest
includes WSN.

Recomendados

Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ... por
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...
Dynamic Slot Allocation for Improving Traffic Performance in Wireless Sensor ...IRJET Journal
23 vistas5 diapositivas
0512ijdps26 por
0512ijdps260512ijdps26
0512ijdps26Er_Loveleen
339 vistas20 diapositivas
A Study on Access Point Selection Algorithms in Wireless Mesh Networks por
A Study on Access Point Selection Algorithms in Wireless Mesh NetworksA Study on Access Point Selection Algorithms in Wireless Mesh Networks
A Study on Access Point Selection Algorithms in Wireless Mesh NetworksEswar Publications
278 vistas10 diapositivas
De3211001104 por
De3211001104De3211001104
De3211001104IJMER
380 vistas5 diapositivas
R33092099 por
R33092099R33092099
R33092099IJERA Editor
260 vistas8 diapositivas
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S... por
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET Journal
12 vistas4 diapositivas

Más contenido relacionado

La actualidad más candente

A framework for data traffic in cognitive radio net works using trusted token... por
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...eSAT Journals
84 vistas5 diapositivas
A framework for data traffic in cognitive radio net works using trusted token... por
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...eSAT Publishing House
262 vistas5 diapositivas
Sensors 19-03789-v2 por
Sensors 19-03789-v2Sensors 19-03789-v2
Sensors 19-03789-v2Nitin k
8 vistas32 diapositivas
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network... por
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...IRJET Journal
39 vistas6 diapositivas
Survey on dynamic source routing, attacks and counter measures in wireless se... por
Survey on dynamic source routing, attacks and counter measures in wireless se...Survey on dynamic source routing, attacks and counter measures in wireless se...
Survey on dynamic source routing, attacks and counter measures in wireless se...eSAT Publishing House
547 vistas6 diapositivas
Cn24588592 por
Cn24588592Cn24588592
Cn24588592IJERA Editor
193 vistas5 diapositivas

La actualidad más candente(19)

A framework for data traffic in cognitive radio net works using trusted token... por eSAT Journals
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...
eSAT Journals84 vistas
A framework for data traffic in cognitive radio net works using trusted token... por eSAT Publishing House
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...
Sensors 19-03789-v2 por Nitin k
Sensors 19-03789-v2Sensors 19-03789-v2
Sensors 19-03789-v2
Nitin k8 vistas
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network... por IRJET Journal
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
IRJET Journal39 vistas
Survey on dynamic source routing, attacks and counter measures in wireless se... por eSAT Publishing House
Survey on dynamic source routing, attacks and counter measures in wireless se...Survey on dynamic source routing, attacks and counter measures in wireless se...
Survey on dynamic source routing, attacks and counter measures in wireless se...
Performance Analysis of Routing Protocols of Wireless Sensor Networks por Darpan Dekivadiya
Performance Analysis of Routing Protocols of Wireless Sensor NetworksPerformance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor Networks
Darpan Dekivadiya6.5K vistas
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O... por IJEEE
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
IJEEE 305 vistas
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security por IRJET Journal
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET Journal17 vistas
Node Deployment Technique using Wireless Sensor Networks por IRJET Journal
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
IRJET Journal51 vistas
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY por ijscai
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEYROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
ijscai1.3K vistas
The Expansion of 3D wireless sensor network Bumps localization por IJERA Editor
The Expansion of 3D wireless sensor network Bumps localizationThe Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localization
IJERA Editor225 vistas
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne... por IOSR Journals
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
IOSR Journals676 vistas
A Survey of Routing Protocols for Structural Health Monitoring por IJEEE
A Survey of Routing Protocols for Structural Health MonitoringA Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health Monitoring
IJEEE 317 vistas
Wireless Sensor Network Using Six Sigma Multi Hop Routing por IOSR Journals
Wireless Sensor Network Using Six Sigma Multi Hop RoutingWireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop Routing
IOSR Journals452 vistas

Destacado

More sustainable Istanbul por
More sustainable IstanbulMore sustainable Istanbul
More sustainable IstanbulAhmad Alshaghel
332 vistas11 diapositivas
Recent publications on management of Brachial plexus injury por
Recent publications on management of Brachial plexus injuryRecent publications on management of Brachial plexus injury
Recent publications on management of Brachial plexus injuryDr. PS Bhandari
172 vistas1 diapositiva
Stick Figure Harry por
Stick Figure HarryStick Figure Harry
Stick Figure Harryolafsson
413 vistas10 diapositivas
Termoregolazione e contabilizzazione in condominio por
Termoregolazione e contabilizzazione in condominioTermoregolazione e contabilizzazione in condominio
Termoregolazione e contabilizzazione in condominioChiara Ragazzini
171 vistas20 diapositivas
Lgpl license (2) por
Lgpl license (2)Lgpl license (2)
Lgpl license (2)Anu M Vijayan
209 vistas7 diapositivas
हिंदी परीयोजना por
हिंदी परीयोजनाहिंदी परीयोजना
हिंदी परीयोजनाJayanthi Rao
761 vistas10 diapositivas

Destacado(20)

Recent publications on management of Brachial plexus injury por Dr. PS Bhandari
Recent publications on management of Brachial plexus injuryRecent publications on management of Brachial plexus injury
Recent publications on management of Brachial plexus injury
Dr. PS Bhandari172 vistas
Stick Figure Harry por olafsson
Stick Figure HarryStick Figure Harry
Stick Figure Harry
olafsson413 vistas
Termoregolazione e contabilizzazione in condominio por Chiara Ragazzini
Termoregolazione e contabilizzazione in condominioTermoregolazione e contabilizzazione in condominio
Termoregolazione e contabilizzazione in condominio
Chiara Ragazzini171 vistas
हिंदी परीयोजना por Jayanthi Rao
हिंदी परीयोजनाहिंदी परीयोजना
हिंदी परीयोजना
Jayanthi Rao761 vistas
Marco Teorico por 7304560
Marco TeoricoMarco Teorico
Marco Teorico
73045601.2K vistas
Pno livret jeune et priere pasteur-yvan-castanou por Yvan CASTANOU
Pno livret jeune et priere pasteur-yvan-castanouPno livret jeune et priere pasteur-yvan-castanou
Pno livret jeune et priere pasteur-yvan-castanou
Yvan CASTANOU1.6K vistas
Top movies of 2010 por annpl
Top movies of 2010Top movies of 2010
Top movies of 2010
annpl257 vistas
Österreichs Open Access Empfehlungen - Eine Erfolgsgeschichte por Patrick Danowski
Österreichs Open Access Empfehlungen - Eine ErfolgsgeschichteÖsterreichs Open Access Empfehlungen - Eine Erfolgsgeschichte
Österreichs Open Access Empfehlungen - Eine Erfolgsgeschichte
Patrick Danowski676 vistas
MATRIC CERTIFICATE por lucky Lucky
MATRIC CERTIFICATEMATRIC CERTIFICATE
MATRIC CERTIFICATE
lucky Lucky268 vistas
Efficiently decoding Reed-Muller codes from random errors por cseiitgn
Efficiently decoding Reed-Muller codes from random errorsEfficiently decoding Reed-Muller codes from random errors
Efficiently decoding Reed-Muller codes from random errors
cseiitgn615 vistas
IELTS for FSWP in CANADA por obaied
IELTS for FSWP in CANADAIELTS for FSWP in CANADA
IELTS for FSWP in CANADA
obaied1.3K vistas
Case DPaschoal - 18ª conferência anual ASUG 2015 por Fluig
Case DPaschoal - 18ª conferência anual ASUG 2015Case DPaschoal - 18ª conferência anual ASUG 2015
Case DPaschoal - 18ª conferência anual ASUG 2015
Fluig1.4K vistas
Handout for the course Abstract Argumentation and Interfaces to Argumentative... por Federico Cerutti
Handout for the course Abstract Argumentation and Interfaces to Argumentative...Handout for the course Abstract Argumentation and Interfaces to Argumentative...
Handout for the course Abstract Argumentation and Interfaces to Argumentative...
Federico Cerutti567 vistas
fluig Webinar - Agronegócio por Fluig
fluig Webinar - Agronegócio fluig Webinar - Agronegócio
fluig Webinar - Agronegócio
Fluig484 vistas

Similar a Qualitative Analysis of Routing Protocols in WSN

EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY por
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
2K vistas16 diapositivas
Study Of Coded Based Mechanism In WSN System por
Study Of Coded Based Mechanism In WSN SystemStudy Of Coded Based Mechanism In WSN System
Study Of Coded Based Mechanism In WSN SystemIJERA Editor
31 vistas6 diapositivas
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ... por
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...IRJET Journal
46 vistas5 diapositivas
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir... por
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...IRJET Journal
47 vistas5 diapositivas
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS por
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSijassn
1.4K vistas12 diapositivas
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN... por
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...cscpconf
73 vistas15 diapositivas

Similar a Qualitative Analysis of Routing Protocols in WSN(20)

EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY por ijcsa
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
ijcsa2K vistas
Study Of Coded Based Mechanism In WSN System por IJERA Editor
Study Of Coded Based Mechanism In WSN SystemStudy Of Coded Based Mechanism In WSN System
Study Of Coded Based Mechanism In WSN System
IJERA Editor31 vistas
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ... por IRJET Journal
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
IRJET Journal46 vistas
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir... por IRJET Journal
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET Journal47 vistas
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS por ijassn
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
ijassn1.4K vistas
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN... por cscpconf
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
cscpconf73 vistas
A study on qos aware routing in wireless mesh network por eSAT Journals
A study on qos aware routing in wireless mesh networkA study on qos aware routing in wireless mesh network
A study on qos aware routing in wireless mesh network
eSAT Journals48 vistas
Challenges for routing in wireless sensor networks por Auwal Amshi
Challenges for routing in wireless sensor networksChallenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networks
Auwal Amshi144 vistas
Comprehensive Review on Base Energy Efficient Routing Protocol por IJRES Journal
Comprehensive Review on Base Energy Efficient Routing ProtocolComprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing Protocol
IJRES Journal184 vistas
Bottleneck Detection Algorithm to Enhance Lifetime of WSN por josephjonse
Bottleneck Detection Algorithm to Enhance Lifetime of WSNBottleneck Detection Algorithm to Enhance Lifetime of WSN
Bottleneck Detection Algorithm to Enhance Lifetime of WSN
josephjonse3 vistas
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN por ijngnjournal
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSNBOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
ijngnjournal78 vistas
Bottleneck Detection Algorithm to Enhance Lifetime of WSN por josephjonse
Bottleneck Detection Algorithm to Enhance Lifetime of WSNBottleneck Detection Algorithm to Enhance Lifetime of WSN
Bottleneck Detection Algorithm to Enhance Lifetime of WSN
josephjonse32 vistas
Cooperative Data Forwarding In AODV Routing Protocol por IOSR Journals
Cooperative Data Forwarding In AODV Routing ProtocolCooperative Data Forwarding In AODV Routing Protocol
Cooperative Data Forwarding In AODV Routing Protocol
IOSR Journals97 vistas
A survey on routing algorithms and routing metrics for wireless mesh networks por Mohammad Siraj
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networks
Mohammad Siraj1.1K vistas
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se... por IRJET Journal
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
IRJET Journal29 vistas
IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S... por IRJET Journal
IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...
IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...
IRJET Journal7 vistas
Ad hoc & WSN Routing protocols (Geetha) (2).pptx por Gomathi454280
Ad hoc & WSN Routing protocols (Geetha) (2).pptxAd hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
Gomathi4542803 vistas
Ad hoc & WSN Routing protocols (Geetha) (2).pptx por Gomathi454280
Ad hoc & WSN Routing protocols (Geetha) (2).pptxAd hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
Gomathi4542803 vistas

Más de Eswar Publications

Content-Based Image Retrieval Features: A Survey por
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyEswar Publications
622 vistas17 diapositivas
Clickjacking Attack: Hijacking User’s Click por
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickEswar Publications
240 vistas6 diapositivas
Performance Analysis of Audio and Video Synchronization using Spreaded Code D... por
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
164 vistas7 diapositivas
Android Based Home-Automation using Microcontroller por
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerEswar Publications
134 vistas4 diapositivas
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle... por
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
89 vistas7 diapositivas
App for Physiological Seed quality Parameters por
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersEswar Publications
102 vistas4 diapositivas

Más de Eswar Publications(20)

Content-Based Image Retrieval Features: A Survey por Eswar Publications
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
Eswar Publications622 vistas
Clickjacking Attack: Hijacking User’s Click por Eswar Publications
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
Eswar Publications240 vistas
Performance Analysis of Audio and Video Synchronization using Spreaded Code D... por Eswar Publications
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Eswar Publications164 vistas
Android Based Home-Automation using Microcontroller por Eswar Publications
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
Eswar Publications134 vistas
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle... por Eswar Publications
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Eswar Publications89 vistas
App for Physiological Seed quality Parameters por Eswar Publications
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
Eswar Publications102 vistas
What happens when adaptive video streaming players compete in time-varying ba... por Eswar Publications
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
Eswar Publications152 vistas
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System por Eswar Publications
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
Eswar Publications77 vistas
Spreading Trade Union Activities through Cyberspace: A Case Study por Eswar Publications
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
Eswar Publications88 vistas
Identifying an Appropriate Model for Information Systems Integration in the O... por Eswar Publications
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
Eswar Publications118 vistas
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance... por Eswar Publications
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Eswar Publications56 vistas
Bridging Centrality: Identifying Bridging Nodes in Transportation Network por Eswar Publications
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Eswar Publications74 vistas
A Literature Survey on Internet of Things (IoT) por Eswar Publications
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
Eswar Publications1.9K vistas
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System por Eswar Publications
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Eswar Publications813 vistas
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model por Eswar Publications
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Eswar Publications48 vistas
Impact of Technology on E-Banking; Cameroon Perspectives por Eswar Publications
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
Eswar Publications167 vistas
Classification Algorithms with Attribute Selection: an evaluation study using... por Eswar Publications
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
Eswar Publications131 vistas
Mining Frequent Patterns and Associations from the Smart meters using Bayesia... por Eswar Publications
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Eswar Publications126 vistas
Network as a Service Model in Cloud Authentication by HMAC Algorithm por Eswar Publications
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Eswar Publications44 vistas
Explosive Detection Approach by Printed Antennas por Eswar Publications
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
Eswar Publications92 vistas

Último

Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates por
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesShapeBlue
178 vistas15 diapositivas
NTGapps NTG LowCode Platform por
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform Mustafa Kuğu
287 vistas30 diapositivas
Why and How CloudStack at weSystems - Stephan Bienek - weSystems por
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsShapeBlue
172 vistas13 diapositivas
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online por
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineShapeBlue
154 vistas19 diapositivas
State of the Union - Rohit Yadav - Apache CloudStack por
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStackShapeBlue
218 vistas53 diapositivas
Uni Systems for Power Platform.pptx por
Uni Systems for Power Platform.pptxUni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptxUni Systems S.M.S.A.
60 vistas21 diapositivas

Último(20)

Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates por ShapeBlue
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates
ShapeBlue178 vistas
NTGapps NTG LowCode Platform por Mustafa Kuğu
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu287 vistas
Why and How CloudStack at weSystems - Stephan Bienek - weSystems por ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue172 vistas
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online por ShapeBlue
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online
ShapeBlue154 vistas
State of the Union - Rohit Yadav - Apache CloudStack por ShapeBlue
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStack
ShapeBlue218 vistas
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... por ShapeBlue
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
ShapeBlue113 vistas
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ por ShapeBlue
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
ShapeBlue58 vistas
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ... por ShapeBlue
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
ShapeBlue48 vistas
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue por ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
ShapeBlue191 vistas
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT por ShapeBlue
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITUpdates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
ShapeBlue138 vistas
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ... por ShapeBlue
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
ShapeBlue121 vistas
Future of AR - Facebook Presentation por Rob McCarty
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
Rob McCarty54 vistas
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O... por ShapeBlue
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
ShapeBlue59 vistas
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... por ShapeBlue
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
ShapeBlue69 vistas
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue por ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue68 vistas
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... por The Digital Insurer
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
Digital Personal Data Protection (DPDP) Practical Approach For CISOs por Priyanka Aash
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash103 vistas
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue por ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueCloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
ShapeBlue63 vistas

Qualitative Analysis of Routing Protocols in WSN

  • 1. Int. J. Advanced Networking and Applications Volume: 08 Issue: 02 Pages: 3021-3025 (2016) ISSN: 0975-0290 3021 Qualitative Analysis of Routing Protocols in WSN Raghunandan.G.H Department of Telecommunication, BMS Institute of Technology, Bangalore, India Email: raghunandangh@bmsit.in Archana.A.R , Rachana Pai, Raksha Hegde, T.N.Srinidhi Department of Telecommunication, BMS Institute of Technology, Bangalore, India Email: ararchana90@gmail.com --------------------------------------------------------------------ABSTRACT------------------------------------------------------------- Wireless Sensor Network (WSN) is partially distributed autonomous sensors to monitor physical or environmental conditions such as temperature, pressure etc. and to cooperatively pass their data through the network to the central location. The technique referred to as multi-hop wireless communications is used by the WSN’s to communicate. Due to the limited processing power and the finite power accessible to each sensor nodes, the application of regular routing techniques is not recommended. Hence recent advances in wireless sensor networks have made the routing protocols more efficient. This paper surveys and compares the advanced routing protocols. The three main categories discussed here are flat based, hierarchical based and location based. The paper concludes with open research issues. Keywords- Flat based, Hierarchical, Location based, Routing techniques, WSN -------------------------------------------------------------------------------------------------------------------------------------------- Date of submission: Oct 07, 2016 Date of Acceptance: Oct 20, 2016 -------------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION Micro–sensors development in recent times is due to microelectronic mechanical systems and low power and highly integrated digital electronics. MEMS are equipped with data processing and communication capabilities. The ambient conditions surrounding the environment are sensed by the sensory circuits and are converted into electrical signals. Properties of the objects located and the events happening in the locality of the sensor are obtained through the processing of such electrical signals. The radio transmitter collects the data sent by the sensor and sends it to a command centre also known as sink. The interest in the possible use of huge set of disposable unused sensors has increased because of the decrease in cost of sensors and size. Many researchers have been carried out the past years pointing to the potential of collaboration among sensors in data collecting and processing. The management and coordination of the sensing activity and flow of the data to the sink. A network with wireless links that is created among the sensors by an ad-hoc technique is the basic set up for such collaborative distributed sensors. Sensing over larger geographical region with greater accuracy is possible by a Wireless Sensor Network which has hundreds or thousands of these sensor nodes. Many applications that require operations which are unattended can be networked through WSN which possess ability to communicate by an external base station or directly among each other. Fig 1. Wireless sensor Network Sensor node components with each sensor node comprising of sensors, processors and transmission mobilizes forms a schematic diagram which is shown in figure 1. The sensor nodes gather and route the data to other base stations which have a mobile node capable of connecting the sensor network to present communication setup or to the internet which provides an access to the reported data to the users or directly to the other sensors. The sensor node has capability to base its decision of its mission and information it currently has and its computing communication, energy resources. The deployment of the large number of sensor nodes leads to the close arrangement of the neighboring nodes. This helps in lowering the power consumption by the multi hop communication when compared to the single hop communication. To make the covert operation desirable the transmission power must be maintained at a lower level. The signal propagation effects experienced in long distance wireless communication can be effectively overcome by the Usage of multi-hop communication. The requirement for the low power consumptions on the sensor nodes is its main drawback. The power sources used in sensor
  • 2. Int. J. Advanced Networking and Applications Volume: 08 Issue: 02 Pages: 3021-3025 (2016) ISSN: 0975-0290 3022 nodes are irreplaceable and are limited in number. Therefore, power conservation should be primarily focused in order to achieve high quality of service (QoS). To prolong the network lifetime the nodes must have inbuilt trade-off mechanisms. This results in the reduction of transmission delay. Many researches are progressing towards these developments. In this paper, survey of protocols and algorithms are proposed for sensor networks. This paper helps in understanding the current research issues in this field. This paper also contains the following: In section2, a brief overview on the various design issues and routing challenges are discussed. Three types of protocols and their categories are summarized in section3. Fig 2. Components of Sensor Nodes II. DESIGN ISSUES AND ROUTING TECHNIQUES. Various design constraints and architectures are taken into consideration for sensor networks based on their applications. The routing protocols perform very similar to the architecture modeling. Therefore, in this section we look into the architectural issues and throw light on their implications. 2.1 Hardware resources limitation: Sensor nodes can perform limited computational functionalities, as they have limited processing, storage capacities and energy capacities. The design of software development and network protocols for sensor networks face many challenges offered by hardware constraints along with considering the energy constraints in sensor nodes. It also considers the processing and storage capacities of sensor nodes. 2.2 Node Deployment: One of the most fundamental issues to be solved in WSNs is Node Deployment. The complexity of problems in WSNs such as routing, data fusion, communication etc. can be overcome by the proper node deployment scheme. This also helps in reducing the power consumption thereby extending the life span of WSNs. The node deployments are either deterministic or random for large scale WSNs. The parameters with which the performance is measured are the distance coverage, energy consumption and message transfer delay. 2.3 Quality of service: Time constraint applications are bounded by another condition that is bounded latency for data delivery. In order to extend the total network lifetime and reduce energy dissipation in the nodes which are caused when the energy gets depleted, the network may have to be required to reduce the quality of the results. This majorly comes into picture in some of the applications where the data from the moment it is sensed should be delivered within a certain period of time otherwise the data will be useless. Hence to capture this requirement energy efficient routing protocols are required. 2.4 Adaptability: A node may fail, join, or move in sensor network which would result in changes in network topology and node density. It is necessary that the network protocols designed for sensor networks should be adaptive to such density and topology changes. 2.5 Fault tolerance: Sensor nodes are suffered to failures due to harsh deployment environments and unattended operations. So the sensor nodes should be fault tolerant. Sensors have the abilities of self calibrating, self-testing, self-repairing and self- recovering. 2.6 Scalability: The number sensor nodes in sensor networks are in the order of tens, hundreds, or thousands hence the network protocols designed for sensor networks should be scalable to different network sizes. III. CLASSIFICATION OF ROUTING PROTOCOLS: In many different ways we can classify the routing algorithms for WSNs which is having a large design space. In general, the classification of routing technique in WSNs is divided into flat-based routing, hierarchical- based routing and location-based routing depending on the network structure. The first category considered is flat-based or the data- centric routing protocols. Node centric communication is not commonly used communication type in WSNs. Therefore, data centric routing protocols are designed for WSNs. Flat based routing protocols distribute information as needed to any router that can be reached or receive information. Here each router node routinely collects and distributes routing information with its neighboring routers. The entire participating node addressed by flat routing protocol performs an equal role in the overall routing mechanism. The next category is hierarchical-based or cluster based routing protocols. A hierarchical routing protocol allows an administrator to make best use of his fast powerful routers in the backbone and the slower, lower energy routers may be used for network access at the edge of the network. Some hierarchical routing protocols also perform route aggregation to reduce the number of routes advertised. The cluster based routing
  • 3. Int. J. Advanced Networking and Applications Volume: 08 Issue: 02 Pages: 3021-3025 (2016) ISSN: 0975-0290 3023 protocols are more advantageous for WSN due to the higher energy utilization rate and being more scalable. The last category is the location-based routing protocol. This type of protocol is used for energy efficiency in WSNs. The distance between neighboring nodes can be estimated by incoming signal strength. By exchanging information between neighbors relative coordinates of neighboring nodes can be obtained. We can determine the location of the nodes directly by communicating with a satellite, using GPS (Global Positioning System) if small low power GPS receivers are present in the nodes. Few location-based schemes demand that nodes should go to sleep when there is no activity in order to save energy. More the number of inactive nodes more is the energy saved. By using this type routing performance can be improved. IV. COMPARISION OF ROUTING PROTOCOLS: In this paper we have compared routing protocols according to their design characteristics which is shown in the table below. 4.1 Flat based routing.  SPIN: Sensor Protocols for Information via Negotiation.  Directed diffusion.  Rumor routing.  GBR: Gradient Based Routing.  MCFA: Minimum Cost Forwarding Algorithm.  CADR: Constrained Anisotropic Diffusion Routing.  COUGAR  ACQUIRE: ACquire QUery forwarding In sensoR nEtworks. 4.2 Hierarchical based routing.  LEACH: Low Energy Adaptive Clustering Hierarchy.  TEEN: Threshold Sensitive Energy Efficient sensor Network. APTEEN: Adaptive Periodic Threshold Sensitive Energy Efficient sensor Network.  PEGASIS: The Power-Efficient Gathering in Sensor Information Systems.  MECN: Minimum Energy Communication Network. SMECN: Small Minimum Energy Communication Network.  SOP: Self Organizing Protocol  HPAR: Hierarchical Power Aware Routing.  VGA: Virtual Grid Architecture Routing.  TTDD: Two-Tier Data Communication. 4.3 Location based routing.  GAF: Geographic Adaptive Fidelity.  GEAR: Geographic and Energy Aware Routing.  SPAN  GOAFR: The Greedy Other Adaptive Face Routing. ROUTING PROTOCOLS CLASSIFICATION MOBILITY POWER USAGE DATA AGGREGATION QoS STATE COMPLEXITY SCALABILITY QUERY BASED SPIN Flat Possible Limited Yes No Low Limited Yes Directed Diffusion Flat Limited Limited Yes No Low Limited Yes Rumor Routing Flat Very Limited N/A Yes No Low Good Yes GBR Flat Limited N/A Yes No Low Limited Yes MCFA Flat No N/A No No Low Good No CADR Flat No Limited Yes No Low Limited No
  • 4. Int. J. Advanced Networking and Applications Volume: 08 Issue: 02 Pages: 3021-3025 (2016) ISSN: 0975-0290 3024 COUGAR Flat No Limited Yes No Low Limited Yes ACQUIRE Flat Limited N/A Yes No Low Limited Yes LEACH Hierarchical Fixed BS Maximu m Yes No CHs Good No TEEN & APTEEN Hierarchical Fixed BS Maximu m Yes No CHs Good No PEGASIS Hierarchical Fixed BS Maximu m No No Low Good No MECN & SMECN Hierarchical No Maximu m No No Low Low No SOP Hierarchical No N/A No No Low Low No HPAR Hierarchical No N/A No No Low Good No VGA Hierarchical No N/A Yes No CHs Good No TTDD Hierarchical Yes Limited No No Moderate Low Possible GAF Location Limited Limited No No Low Good No GEAR Location Limited Limited No No Low Limited No SPAN Location Limited N/A Yes No Low Limited No GOAFR Location No N/A No No Low Good No Table 1: Comparison of routing protocols based on their design characteristics V. RESEARCH ISSUES AND FUTURE WORKS: The common problem faced by wireless sensor networks (WSNs) is energy. When a sensor is drained out, it can no longer be able to achieve its goal unless the energy source is replaced. In WSN future works in routing techniques focuses on different direction which share the common aim of extending the network lifetime. Some of them are:  Designing more secured and more effective routing techniques.  Achieving the density of the sensor nodes.  To work on accomplishing redundancy and to employ fault tolerance in an effective way.  Reducing delay time and improving energy efficiency.  Synchronization of time and location.  Further work includes research in the integration of sensor networks using internet i.e. with wired networks. VI. CONCLUSION In recent years routing in sensor networks has drawn huge attention and introduced new challenges compared to classic data routing in wired networks. We have given an extensive survey on data routing in sensor networks and categorized the techniques into three main classification namely flat based, hierarchical-based and location based in this paper. Even though many of these routing techniques look favorable, still they have many complications that required to be solved in sensor networks. We promoted those complications and defined some future work issues in this concern. REFERENCES [1]. Ms. Reshma Jayesh Rasal, Dr. Shyamrao V. Gumaste, Prof. Gajanan S. Deokate, “Survey on different routing issues and design challenges in WSN” IJSEAS volume-1, Issue-4, July 2015, ISSN:2395- 3470. [2]. Manasa.C, Raghunandan.G.H, “A comparative survey on routing protocols in wireless sensor networks” 2014. [3]. Kemal Akkayya, Mohamed Younis, “A survey on routing protocols on wireless sensor networks in Ad Hoc Networks 3, 2005, 325-349. [4]. Ming Liu, Jiannong Cao, Guihai Chen, Xiaomin Wang, “An Energy-Aware routing protocols in wireless sensor networks”, Sensors 2009, volume-9, pp. 445- 462.
  • 5. Int. J. Advanced Networking and Applications Volume: 08 Issue: 02 Pages: 3021-3025 (2016) ISSN: 0975-0290 3025 [5]. Raghunandan.G.H, “A comparative analysis of routing techniques for wireless sensor networks”, Proceedings of the national conference on innovations in emerging technology, IEEE conference, pp. 17-22 Feb 2011. [6]. J. Heidemann, D. Estrin, “Geography informed energy conservation for ad-hoc routing”, Proceedings ACM/IEEE MobiCom’01, Rome, Italy, July 2001, pp.70-84. [7]. S.K. Singh, M.P. Singh, D.K. Singh, “A survey of energy efficient hierarchical cluster-based routing in wireless sensor networks”, International Journal of Advanced Networking and Application (IJANA), sept- Oct 2010, vol. 02, issue 02, pp. 570-580. [8]. J. Kulik, W. R. Heinzelman, and H. Balakrishnan: Negotiation-Based Protocols for Disseminating Information in Wireless Sensor Networks, Wireless Networks, vol. 8, pp. 169–85 (2002). [9]. W. Heinzelman, J. Kulik, and H. Balakrishnan: Adaptive Protocols for Information Dissemination in Wireless Sensor Networks, Proc. 5th ACM/IEEE Mobicom, Seattle, WA, pp. 174–85 (Aug. 1999). [10]. Jamal N, Al-Karaki, Ahmed E. Kamal, “Techniques in wireless sensor networks: A Survey. [11]. D. Braginsky, D. Estrin, “Rumour Routing algorithm for sensor networks”, Proceedings- The first Workshop of sensor networks and applications. [12]. C. Schurgers, M. B. Srivastava, “Energy efficient routing in wireless sensor networks in the MILCOM Proceedings on communications for network centric operations, Creating the Information force, McLean, VA (2001). [13]. F. Ye, A. Chen, S. Liu, L. Zhang, “A Scalable solution to minimum cost forwarding in large sensor networks”, Proceedings of the tenth International Conference on Computer Communications and Networks (ICCCN). [14]. M. Chu, H. Haussecker, F. Zhao, “Scalable information driven sensor querying and routing for ad- hoc Heterogeneous sensor networks, the international Journal of high performance computing applications, Vol-16, No. 3, August 2002. [15] Y. Yao and J. Gehrke: The cougar approach to in network query processing in sensor networks, in SIGMOD Record(September 2002). [16]. N. Sadagopan et al, “The ACQUIRE mechanism for efficient querying in sensor networks”, in the Proceedings of the First International Workshop on protocols in wireless sensor networks. [17]. A. Manjeshwar, D. P Agarwal, “TEEN: A routing protocol for enhanced efficiency in wireless sensor networks”, First International workshop on parallel and distributed computing issues in wireless networks and mobile computing, April 2001. [18]. Raghunandan.G.H, Narendra. K, Varun V, “A Comparitive Analysis of energy efficient routing protocols in WSN”, Springer, Volume no.248, pp.399, 2014 Authors Biographies: Raghunandan G.H received B.E degree in Electronics and Communication Engineering from Visvesvaraya Technological University. He did his M.Tech in the field of Digital Electronics and communication from Visvesvaraya Technological University, Belgaum. He is currently working as Assistant Professor in Department of Telecommunication at BMS Institute of Technology and Management, Bengaluru. His areas of interest are Wireless Ad-Hoc and Sensor Networks. He has published 15 papers at International conferences and 8 papers in International journals. Archana A.R is pursuing B.E degree in Telecommunication from Visvesvaraya Technological University. Her area of interest includes wireless communication and networking. Rachana Pai is pursuing B.E degree in Telecommunication from Visvesvaraya Technological University. Her area of interest includes wireless communication and networking. Raksha Hegde is pursuing B.E degree in Telecommunication from Visvesvaraya Technological University. Her area of interest includes wireless communication and networking. T N Srinidhi is pursuing B.E degree in Telecommunication from Visvesvaraya Technological University. Her area of interest includes WSN.