SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
Indonesian Journal of Electrical Engineering and Informatics (IJEEI)
Vol. 2, No. 1, March 2014, pp. 48~55
ISSN: 2089-3272  48
Received January 9, 2014; Revised February 13, 2014; Accepted February 25, 2014
A Comparison of Routing Protocol for WSNs:
Redundancy Based Approach
Anand Prakash
Invertis University, Bareilly, India
Email: Anand.anandprakash@gmail.com
Abstract
Wireless Sensor Networks (WSNs) with their dynamic applications gained a tremendous attention
of researchers. Constant monitoring of critical situations attracted researchers to utilize WSNs at vast
platforms. The main focus in WSNs is to enhance network localization as much as one could, for efficient
and optimal utilization of resources. Different approaches based upon redundancy are proposed for
optimum functionality. Localization is always related with redundancy of sensor nodes deployed at remote
areas for constant and fault tolerant monitoring. In this work, we propose a comparison of classic flooding
and the gossip protocol for homogenous networks which enhances stability and throughput quiet
significantly.
Keywords: Wireless Sensor Network, Protocol, Message broadcasting, Classic Flooding, Gossiping
flooding
1. Introduction
Wireless sensor network is a collection of sensor nodes organized into a cooperative
network [2]. Each sensor node consists of processing capability (one or more microcontroller,
CPUs or DSP chips), may contain multiple types of memory ( program, data and flash
memories), have a RF transceiver (either with a omni-directional or directional antenna), have a
power source (batteries or solar cells), and accommodate various sensors and actuators. The
node communicate wirelessly and often self-organized after being deployed in an ad hoc
fashion. WSNs are an infrastructure comprised of sensing (measuring), computing, and
communication element that give an administrator the ability to instrument, observe, and react
to event and phenomena in a specified environment.
Figure 1. General model of Wireless Sensor Networks
There are four basic components in a sensor network:
1) An assembly of distributed or localized sensors.
2) An interconnecting network (usually, but not always, wireless based).
3) A central point of information clustering.
 ISSN: 2089-3272
IJEEI Vol. 2, No. 1, March 2014 : 48 – 55
49
4) A set of computing resources at the central point (or beyond) to handle data correlation,
event trending, status querying, and data mining
2. Architecture of WSNs
Wireless sensor networks consist of individual nodes that are able to interact with the
environment by sensing or controlling physical parameters. These nodes have to collaborate to
full fill their tasks. The nodes are interlinked together and by using wireless links each node is
able to communicate and collaborate with each other. The wireless sensor network and the
classical infrastructure comprises of the standard components like sensor nodes (used as
source, sink/actuators), gateways, Internet, and satellite link, etc.
Figure 2. Sensor network communication architecture
There are many other architecture of wireless sensor network which are shown below.
A. Homogeneous network
In Homogeneous network sensor nodes or sensor field transmit data to base station.
This base station forward that data over internet and from internet specific user can access the
data. This type of. are classified under homogeneous network
B. Heterogeneous network
In Heterogeneous network sensor node or senor field transmit data to internet via base
station and from internet the shared to different user by different means like Wi-Fi, W-Max and
on any personal network. This type is classified under Heterogeneous network
C. Ad-Hoc network
In Ad-Hoc network the data transmit from sensor to internet and a server receive that
data which is shared by N number of user that are wirelessly connected to server. This type is
classified under Ad-Hoc network
3. Protocol in Wireless Sensor Network
During previous research, many differences have been observed, generally, between
flat and hierarchical rout- ing protocols and, exactly, between these researched routing
protocols. In this paper, we choose Gossip- ing as a target protocol to conduct our research and
some extensions. Firstly a technical glimpse on Gossiping: Gossiping is a data-relay protocol,
based on a Flooding protocol, and does not need routing tables or topology maintenance [10]. It
was produced as an enhancement for Flooding and to overcome the drawbacks of Flooding,
i.e., implosion [11]. In Flooding, a node broadcasts the data to all of its neighbors even if the
receiving node has just received the same data from another node. The broadcasting will
IJEEI ISSN: 2089-3272 
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach (Anand Prakash)
50
continue until the data is received by the destination [12]. However, in Gossiping, a node
randomly chooses one of its neighbors to forward the packet to, once the selected neighbor
node receives the packet it, in turn, chooses another random neighbor and forwards the packet
to it. This process will continue until the destination or number of hops has been exceeded. As a
result, only the selected nodes/neighbors will forward the received packet to the sink [13]. Unlike
Flooding, Gossiping operates well in a one-to-one communication scenario but it does not in a
one-to-many.
4. Message Broadcasting
Wireless sensor networks (WSNs) consist of sensor nodes that broadcast a message
within a network [2]. Efficient broadcasting is a key requirement in sensor networks and has
been a focal point of research over the last few years. There are many challenging tasks in the
network, including redundancy control and sensor node localization that mainly depend on
broadcasting. Each sensor node in the network is equipped with the memory, radio frequency
transceiver, and power source to broadcast wirelessly over a specified protocol. The success of
wireless sensor networks mainly depend on message forwarding/broadcasting from one node to
another node [6]. And the efficiency of message broadcast depend on the protocol which are
used. In this paper we compared redundancy factor of broadcasting protocol that is classic
flooding protocol and gossip protocol to control redundancy and improve localization in WSNs.
The proposed results incorporates the benefits of the gossip protocol for optimizing message
broadcasting within the network over classic flooding.
5. Message Broadcast Through Classic Flooding
Classic flooding is a protocol which is used to broadcast message in WSNs. This
protocol state that in a wireless sensor networks when nodes are randomly placed and the main
node get message from system and distribute it to other placed node and there is no set pattern
of distribution as shown in figure 3.
Figure 3. Classic flooding
As we can observe in figure 6 the system is transmitting data to main node (M). This
main node (M) distribute it over network that is from main node (M) to sub node (N1) or from
main node (M) to sub node (N2) or to both nodes (N1 & N2). Further sub node (N1) transmit it to
other nodes in network including sub node (N2) similarly sub node (N2) transmit it to other
nodes in network including sub node (N1). As observed there is no set pattern of broadcasting
message that is any node is transmitting to any node this leads to increase in redundancy over
network.
 ISSN: 2089-3272
IJEEI Vol. 2, No. 1, March 2014 : 48 – 55
51
6. Message Broadcast through Gossip Protocol
Gossip protocol is a protocol which is used to broadcast message in WSNs [1]. Gossip
is a probability based protocol. Whenever a sensor node wishes to send a message, it randomly
selects a neighboring sensor node. On receiving the message for the first time the neighboring
sensor node keep the track of messages it has already received and repeats this process to
send message to neighboring node. In gossip protocol every sensor node if receive the same
message twice, it is discarded. In order to achieve this, each sensor node has to keep the track
of messages it has already received. Besides this the gossip protocol also performs tasks to
help the inter process interaction for information exchange between networks where the sensor
node failure is quite frequent as shown in figure 4.
Figure 4. Gossip protocol
As we can observe that system data to main node (M) now this sensor node (M) has to
keep the track of messages it received. Now this sensor node (M) randomly selects a
neighboring sensor node (N1). Upon receiving the message for the first time node (N1) keep
record of receive message and forward the message to other neighboring node (N2). On
receiving the message for the first time the sensor node (N2) keep the track of messages it has
received. If any sensor node receive the same message twice, it is discarded. Thus redundancy
reduces and message is forwarded efficiently.
7. Comparative Analysis
We have compared the both protocol for total number of event 1 and varied total node
from 10 to 200. For both protocol the result are shown below.
Classic Flooding Protocol
Case A: -Implementation of Classic flooding for total event 1 and total node 10 over width of
600m and height of 500m
IJEEI ISSN: 2089-3272 
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach (Anand Prakash)
52
Figure 5. Classic flooding for event = 1 and nodes = 10
Case B: - Implementation of Classic flooding protocol for total event 1 and total node 200 over
width of 600m and height of 500m
Figure 6. Classic flooding for event = 1 and nodes = 200
Gossip Protocol.
Case A: -Implementation of Gossip protocol for total event 1 and total node 10 over width of
600m and height of 500m
Figure 7. Gossip protocol for event = 1 and nodes = 10
 ISSN: 2089-3272
IJEEI Vol. 2, No. 1, March 2014 : 48 – 55
53
Case B: -Implementation of Gossip protocol for total event 1 and total node 200 over width of
600m and height of 500m
Figure 8. Gossip Protocol for event = 1 and nodes = 10
Graph Analysis of Classic Flooding Protocol and Gossip Protocol for number of event 1 and
number of nodes 200
Figure 9. Classic Flooding Graph at 200 nodes
Figure 10. Gossip Protocol Graph at 200 nodes
IJEEI ISSN: 2089-3272 
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach (Anand Prakash)
54
Analysis of redundant counts receive in both protocol with nodes varying from 10 to 200 is
shown in Table 1 and Table 2.
Table 1. Classic Flooding protocol
Sense Counts
Transmit
Counts
Receive
Counts
Receive
Redundant
Counts
9 9 4 0
18 19 14 04
27 29 27 27
35 38 37 63
45 48 47 132
54 58 58 205
60 69 69 317
70 79 79 435
80 89 89 633
90 99 100 775
98 109 110 944
108 119 120 1213
115 129 130 1412
124 139 140 1652
133 149 150 1926
142 159 160 2176
152 169 170 2475
159 179 180 2730
169 189 190 3062
177 199 200 3339
Table 2. Gossip Protocol
Sense Counts
Transmit
Counts
Receive
Counts
Receive
Redundant
Counts
9 20 3 10
19 40 17 21
25 60 26 33
31 80 31 49
39 100 43 57
46 120 46 74
54 140 52 88
61 160 60 100
68 180 70 110
75 200 81 119
84 220 90 130
91 240 99 141
99 260 102 158
107 280 113 167
114 300 122 178
123 320 122 198
131 340 129 211
139 360 144 216
145 380 152 228
152 400 158 242
8. Conclusion
As we can observe redundant count in classic flooding protocol and Gossip Protocol are
shown below in Table 3 and Table 4.
Table 3. Classic Flooding
Protocol
Number Of
Event
Number of
nodes
Redundancy
Classic
Flooding
1 10 0
Classic
Flooding
1 200 3339
 ISSN: 2089-3272
IJEEI Vol. 2, No. 1, March 2014 : 48 – 55
55
Table 4. Gossip Protocol
Protocol
Number Of
Event
Number of
nodes
Redundancy
Gossip
Protocol
1 10 10
Gossip
Protocol
1 200 242
When number of nodes are 200in network the redundant counts of classic flooding is
3339 which is very much greater that redundant counts of gossip flooding which is 242 hence
gossip flooding is much better than classic flooding because redundancy factor decrease in
gossip protocol hence message forwarding is more efficiently done using gossip protocol.
References
[1] AM Kermarrec, MV Steen. Gossiping In Distributed System. Operating System Review. 2007; 41(5):
2-7.
[2] IF Akyildiz, W Su, YS Sankarasubramaniam, E Cayiric. A Survey on Sensor Network. IEEE
Communication Magazine. 2004; 40(8): 102-114.
[3] G Mao, B Fidan, Brian DO Anderson. Sensor Network Localization. The International Journal of
Computer and Telecommunications Networking. 2007; 51: 2529-2553.
[4] Chadni and K Singh. Estimation Scheme with Improved Accuracy. International Journal of Science
and Emerging Technology with Latest Trend. 2012; 3(1): 9-18.
[5] Weng Chon Ao, Kwang-Cheng Chen. Error Control for Local Broadcasting in Heterogeneous Wireless
Ad Hoc Networks. IEEE Transactions on Communications. 2013; 61(4): 1510-1519.
[6] Y Liang, H Vincent Poor, L Ying. Secure Communication Over Wireless Broadcast Network: Stability
And Utility. IEEE Transactions on Information Forensics and Security. 2011; 6(3): 682-692.
[7] Geir Egeland, Paal E Engelstad. The Economy of Redundancy in Wireless Multi-Hop Networks. In
Proceeding of IEEE WCNC. 2009.
[8] Majid Khabbazian, Vijay K Bhargava. Reducing Broadcast Redundancy in WirelessAd Hoc Networks.
In Proceeding of IEEE Globecom. 2007.
[9] H Modares, R Salleh, A Moravejosharieh. Overview of Security Issues in Wireless Sensor Network. In
Proceeding of Third International Conference on Computational Intelligence, Modelling and Simulation
IEEE. 2011: 308-311.
[10] Ian F Akyildiz, MC Vuran, B Akan, Weilian Su. Wireless Sensor Network: A Survey Revisited.
Computer Networks Journal. 1-39.
[11] F Wang, J Liu. Networked Wireless Sensor Data Collection: Issues, Challenges, and Approaches.
IEEE Communications Surveys & Tutorials. 2011; 13(4); 673-687.
[12] K Islam, W Shen, X Wang. Wireless Sensor Network Reliability and Security in Factory Automation: A
Survey Systems. IEEE Transactions on Systems, Man and Cybernetics, Part C: Applications and
Reviews. 2012; 42(6): 1243-1256.
[13] M Erol-Kantarci, HT Mouftah, S Oktug. A Survey of Architectures and Localization Techniques for
Underwater Acoustic Sensor Networks. IEEE Communications Surveys & Tutorials. 2011; 13(3): 487-
502.
[14] Zhenjiang Li Yunhao Liu. Rendered Path: Range-Free Localization in Anisotropic Sensor Networks
With Holes. IEEE Transactions on Networking. 2010; 18(1): 20-332.
[15] N Salman, M Ghogho, AH Kemp. Optimized Low Complexity Sensor Node Positioning in Wireless
Sensor Networks. IEEE Sensors Journal. 2013; 14(1): 39-46.
[16] Chih-Yung Chang Chih-Yu Lin, Chao-Tsun Chang. Tone-Based Localization for Distinguishing
Relative Locations in Wireless Sensor Networks. IEEE Sensors Journal. 2012; 12(5): 1058-1070.
[17] YW Xiaoli, G Leus. Robust Time-Based Localization for Asynchronous Networks. IEEE Transactions
on Signal Processing. 2011; 59(9): 4397-4410.

Weitere ähnliche Inhalte

Was ist angesagt?

Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor networkshashankcsnits
 
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...paperpublications3
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingHabibur Rahman
 
Energy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksEnergy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksSpandan Spandy
 
Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...eSAT Publishing House
 
Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network dilip pareek
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkijwmn
 
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkAnalysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkIJMER
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...IJERA Editor
 
2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stackSyed Ariful Islam Emon
 
Energy saving Wireless Sensor Networks using Kerberos
Energy saving Wireless Sensor Networks using KerberosEnergy saving Wireless Sensor Networks using Kerberos
Energy saving Wireless Sensor Networks using KerberosEditor IJCATR
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsPvrtechnologies Nellore
 
AODV protocol and Black Hole attack
AODV protocol and Black Hole attackAODV protocol and Black Hole attack
AODV protocol and Black Hole attackRaj Sikarwar
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...IJEEE
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECYogesh Fulara
 

Was ist angesagt? (20)

Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
 
i2ct_submission_105
i2ct_submission_105i2ct_submission_105
i2ct_submission_105
 
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
An Adaptive Mobility Based Attack Detection Mechanism to Detect Selective For...
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
 
Ba24345348
Ba24345348Ba24345348
Ba24345348
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
 
iPGCON14_134
iPGCON14_134iPGCON14_134
iPGCON14_134
 
Energy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksEnergy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networks
 
Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...Secure data storage over distributed nodes in network through broadcast techn...
Secure data storage over distributed nodes in network through broadcast techn...
 
Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
 
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkAnalysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
 
2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack2015 11-07 -ad_hoc__network architectures and protocol stack
2015 11-07 -ad_hoc__network architectures and protocol stack
 
Energy saving Wireless Sensor Networks using Kerberos
Energy saving Wireless Sensor Networks using KerberosEnergy saving Wireless Sensor Networks using Kerberos
Energy saving Wireless Sensor Networks using Kerberos
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systems
 
AODV protocol and Black Hole attack
AODV protocol and Black Hole attackAODV protocol and Black Hole attack
AODV protocol and Black Hole attack
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEEC
 

Ähnlich wie A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Comparison of Routing Protocol for WSNs: Redundancy Based Approach

Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networkspijans
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKIJNSA Journal
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocolijtsrd
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsINFOGAIN PUBLICATION
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkAM Publications
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...journalBEEI
 
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...ijtsrd
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNijsrd.com
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...IJEEE
 
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...IOSR Journals
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsmmjalbiaty
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Networkiosrjce
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5sophiabelthome
 
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Editor IJMTER
 
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKComplete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKRutvik Pensionwar
 

Ähnlich wie A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Comparison of Routing Protocol for WSNs: Redundancy Based Approach (20)

Ijnsa050209
Ijnsa050209Ijnsa050209
Ijnsa050209
 
Some aspects of wireless sensor networks
Some aspects of wireless sensor networksSome aspects of wireless sensor networks
Some aspects of wireless sensor networks
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocol
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
 
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Rou...
 
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
 
MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...
MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...
MANAGING INTERFERENCE IN COLLABORATIVE NETWORKS BY FLOW CONTROL AND SIGNAL PO...
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
 
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraints
 
G017344246
G017344246G017344246
G017344246
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Network
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5
 
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
 
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKComplete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 

Mehr von ijeei-iaes

An Heterogeneous Population-Based Genetic Algorithm for Data Clustering
An Heterogeneous Population-Based Genetic Algorithm for Data ClusteringAn Heterogeneous Population-Based Genetic Algorithm for Data Clustering
An Heterogeneous Population-Based Genetic Algorithm for Data Clusteringijeei-iaes
 
Development of a Wireless Sensors Network for Greenhouse Monitoring and Control
Development of a Wireless Sensors Network for Greenhouse Monitoring and ControlDevelopment of a Wireless Sensors Network for Greenhouse Monitoring and Control
Development of a Wireless Sensors Network for Greenhouse Monitoring and Controlijeei-iaes
 
Analysis of Genetic Algorithm for Effective power Delivery and with Best Upsurge
Analysis of Genetic Algorithm for Effective power Delivery and with Best UpsurgeAnalysis of Genetic Algorithm for Effective power Delivery and with Best Upsurge
Analysis of Genetic Algorithm for Effective power Delivery and with Best Upsurgeijeei-iaes
 
Design for Postplacement Mousing based on GSM in Long-Distance
Design for Postplacement Mousing based on GSM in Long-DistanceDesign for Postplacement Mousing based on GSM in Long-Distance
Design for Postplacement Mousing based on GSM in Long-Distanceijeei-iaes
 
Investigation of TTMC-SVPWM Strategies for Diode Clamped and Cascaded H-bridg...
Investigation of TTMC-SVPWM Strategies for Diode Clamped and Cascaded H-bridg...Investigation of TTMC-SVPWM Strategies for Diode Clamped and Cascaded H-bridg...
Investigation of TTMC-SVPWM Strategies for Diode Clamped and Cascaded H-bridg...ijeei-iaes
 
Optimal Power Flow with Reactive Power Compensation for Cost And Loss Minimiz...
Optimal Power Flow with Reactive Power Compensation for Cost And Loss Minimiz...Optimal Power Flow with Reactive Power Compensation for Cost And Loss Minimiz...
Optimal Power Flow with Reactive Power Compensation for Cost And Loss Minimiz...ijeei-iaes
 
Mitigation of Power Quality Problems Using Custom Power Devices: A Review
Mitigation of Power Quality Problems Using Custom Power Devices: A ReviewMitigation of Power Quality Problems Using Custom Power Devices: A Review
Mitigation of Power Quality Problems Using Custom Power Devices: A Reviewijeei-iaes
 
Comparison of Dynamic Stability Response of A SMIB with PI and Fuzzy Controll...
Comparison of Dynamic Stability Response of A SMIB with PI and Fuzzy Controll...Comparison of Dynamic Stability Response of A SMIB with PI and Fuzzy Controll...
Comparison of Dynamic Stability Response of A SMIB with PI and Fuzzy Controll...ijeei-iaes
 
Embellished Particle Swarm Optimization Algorithm for Solving Reactive Power ...
Embellished Particle Swarm Optimization Algorithm for Solving Reactive Power ...Embellished Particle Swarm Optimization Algorithm for Solving Reactive Power ...
Embellished Particle Swarm Optimization Algorithm for Solving Reactive Power ...ijeei-iaes
 
Intelligent Management on the Home Consumers with Zero Energy Consumption
Intelligent Management on the Home Consumers with Zero Energy ConsumptionIntelligent Management on the Home Consumers with Zero Energy Consumption
Intelligent Management on the Home Consumers with Zero Energy Consumptionijeei-iaes
 
Analysing Transportation Data with Open Source Big Data Analytic Tools
Analysing Transportation Data with Open Source Big Data Analytic ToolsAnalysing Transportation Data with Open Source Big Data Analytic Tools
Analysing Transportation Data with Open Source Big Data Analytic Toolsijeei-iaes
 
A Pattern Classification Based approach for Blur Classification
A Pattern Classification Based approach for Blur ClassificationA Pattern Classification Based approach for Blur Classification
A Pattern Classification Based approach for Blur Classificationijeei-iaes
 
Computing Some Degree-Based Topological Indices of Graphene
Computing Some Degree-Based Topological Indices of GrapheneComputing Some Degree-Based Topological Indices of Graphene
Computing Some Degree-Based Topological Indices of Grapheneijeei-iaes
 
A Lyapunov Based Approach to Enchance Wind Turbine Stability
A Lyapunov Based Approach to Enchance Wind Turbine StabilityA Lyapunov Based Approach to Enchance Wind Turbine Stability
A Lyapunov Based Approach to Enchance Wind Turbine Stabilityijeei-iaes
 
Fuzzy Control of a Large Crane Structure
Fuzzy Control of a Large Crane StructureFuzzy Control of a Large Crane Structure
Fuzzy Control of a Large Crane Structureijeei-iaes
 
Site Diversity Technique Application on Rain Attenuation for Lagos
Site Diversity Technique Application on Rain Attenuation for LagosSite Diversity Technique Application on Rain Attenuation for Lagos
Site Diversity Technique Application on Rain Attenuation for Lagosijeei-iaes
 
Impact of Next Generation Cognitive Radio Network on the Wireless Green Eco s...
Impact of Next Generation Cognitive Radio Network on the Wireless Green Eco s...Impact of Next Generation Cognitive Radio Network on the Wireless Green Eco s...
Impact of Next Generation Cognitive Radio Network on the Wireless Green Eco s...ijeei-iaes
 
Music Recommendation System with User-based and Item-based Collaborative Filt...
Music Recommendation System with User-based and Item-based Collaborative Filt...Music Recommendation System with User-based and Item-based Collaborative Filt...
Music Recommendation System with User-based and Item-based Collaborative Filt...ijeei-iaes
 
A Real-Time Implementation of Moving Object Action Recognition System Based o...
A Real-Time Implementation of Moving Object Action Recognition System Based o...A Real-Time Implementation of Moving Object Action Recognition System Based o...
A Real-Time Implementation of Moving Object Action Recognition System Based o...ijeei-iaes
 
Wireless Sensor Network for Radiation Detection
Wireless Sensor Network for Radiation DetectionWireless Sensor Network for Radiation Detection
Wireless Sensor Network for Radiation Detectionijeei-iaes
 

Mehr von ijeei-iaes (20)

An Heterogeneous Population-Based Genetic Algorithm for Data Clustering
An Heterogeneous Population-Based Genetic Algorithm for Data ClusteringAn Heterogeneous Population-Based Genetic Algorithm for Data Clustering
An Heterogeneous Population-Based Genetic Algorithm for Data Clustering
 
Development of a Wireless Sensors Network for Greenhouse Monitoring and Control
Development of a Wireless Sensors Network for Greenhouse Monitoring and ControlDevelopment of a Wireless Sensors Network for Greenhouse Monitoring and Control
Development of a Wireless Sensors Network for Greenhouse Monitoring and Control
 
Analysis of Genetic Algorithm for Effective power Delivery and with Best Upsurge
Analysis of Genetic Algorithm for Effective power Delivery and with Best UpsurgeAnalysis of Genetic Algorithm for Effective power Delivery and with Best Upsurge
Analysis of Genetic Algorithm for Effective power Delivery and with Best Upsurge
 
Design for Postplacement Mousing based on GSM in Long-Distance
Design for Postplacement Mousing based on GSM in Long-DistanceDesign for Postplacement Mousing based on GSM in Long-Distance
Design for Postplacement Mousing based on GSM in Long-Distance
 
Investigation of TTMC-SVPWM Strategies for Diode Clamped and Cascaded H-bridg...
Investigation of TTMC-SVPWM Strategies for Diode Clamped and Cascaded H-bridg...Investigation of TTMC-SVPWM Strategies for Diode Clamped and Cascaded H-bridg...
Investigation of TTMC-SVPWM Strategies for Diode Clamped and Cascaded H-bridg...
 
Optimal Power Flow with Reactive Power Compensation for Cost And Loss Minimiz...
Optimal Power Flow with Reactive Power Compensation for Cost And Loss Minimiz...Optimal Power Flow with Reactive Power Compensation for Cost And Loss Minimiz...
Optimal Power Flow with Reactive Power Compensation for Cost And Loss Minimiz...
 
Mitigation of Power Quality Problems Using Custom Power Devices: A Review
Mitigation of Power Quality Problems Using Custom Power Devices: A ReviewMitigation of Power Quality Problems Using Custom Power Devices: A Review
Mitigation of Power Quality Problems Using Custom Power Devices: A Review
 
Comparison of Dynamic Stability Response of A SMIB with PI and Fuzzy Controll...
Comparison of Dynamic Stability Response of A SMIB with PI and Fuzzy Controll...Comparison of Dynamic Stability Response of A SMIB with PI and Fuzzy Controll...
Comparison of Dynamic Stability Response of A SMIB with PI and Fuzzy Controll...
 
Embellished Particle Swarm Optimization Algorithm for Solving Reactive Power ...
Embellished Particle Swarm Optimization Algorithm for Solving Reactive Power ...Embellished Particle Swarm Optimization Algorithm for Solving Reactive Power ...
Embellished Particle Swarm Optimization Algorithm for Solving Reactive Power ...
 
Intelligent Management on the Home Consumers with Zero Energy Consumption
Intelligent Management on the Home Consumers with Zero Energy ConsumptionIntelligent Management on the Home Consumers with Zero Energy Consumption
Intelligent Management on the Home Consumers with Zero Energy Consumption
 
Analysing Transportation Data with Open Source Big Data Analytic Tools
Analysing Transportation Data with Open Source Big Data Analytic ToolsAnalysing Transportation Data with Open Source Big Data Analytic Tools
Analysing Transportation Data with Open Source Big Data Analytic Tools
 
A Pattern Classification Based approach for Blur Classification
A Pattern Classification Based approach for Blur ClassificationA Pattern Classification Based approach for Blur Classification
A Pattern Classification Based approach for Blur Classification
 
Computing Some Degree-Based Topological Indices of Graphene
Computing Some Degree-Based Topological Indices of GrapheneComputing Some Degree-Based Topological Indices of Graphene
Computing Some Degree-Based Topological Indices of Graphene
 
A Lyapunov Based Approach to Enchance Wind Turbine Stability
A Lyapunov Based Approach to Enchance Wind Turbine StabilityA Lyapunov Based Approach to Enchance Wind Turbine Stability
A Lyapunov Based Approach to Enchance Wind Turbine Stability
 
Fuzzy Control of a Large Crane Structure
Fuzzy Control of a Large Crane StructureFuzzy Control of a Large Crane Structure
Fuzzy Control of a Large Crane Structure
 
Site Diversity Technique Application on Rain Attenuation for Lagos
Site Diversity Technique Application on Rain Attenuation for LagosSite Diversity Technique Application on Rain Attenuation for Lagos
Site Diversity Technique Application on Rain Attenuation for Lagos
 
Impact of Next Generation Cognitive Radio Network on the Wireless Green Eco s...
Impact of Next Generation Cognitive Radio Network on the Wireless Green Eco s...Impact of Next Generation Cognitive Radio Network on the Wireless Green Eco s...
Impact of Next Generation Cognitive Radio Network on the Wireless Green Eco s...
 
Music Recommendation System with User-based and Item-based Collaborative Filt...
Music Recommendation System with User-based and Item-based Collaborative Filt...Music Recommendation System with User-based and Item-based Collaborative Filt...
Music Recommendation System with User-based and Item-based Collaborative Filt...
 
A Real-Time Implementation of Moving Object Action Recognition System Based o...
A Real-Time Implementation of Moving Object Action Recognition System Based o...A Real-Time Implementation of Moving Object Action Recognition System Based o...
A Real-Time Implementation of Moving Object Action Recognition System Based o...
 
Wireless Sensor Network for Radiation Detection
Wireless Sensor Network for Radiation DetectionWireless Sensor Network for Radiation Detection
Wireless Sensor Network for Radiation Detection
 

Kürzlich hochgeladen

Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf203318pmpc
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086anil_gaur
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projectssmsksolar
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 

Kürzlich hochgeladen (20)

Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 

A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Comparison of Routing Protocol for WSNs: Redundancy Based Approach

  • 1. Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol. 2, No. 1, March 2014, pp. 48~55 ISSN: 2089-3272  48 Received January 9, 2014; Revised February 13, 2014; Accepted February 25, 2014 A Comparison of Routing Protocol for WSNs: Redundancy Based Approach Anand Prakash Invertis University, Bareilly, India Email: Anand.anandprakash@gmail.com Abstract Wireless Sensor Networks (WSNs) with their dynamic applications gained a tremendous attention of researchers. Constant monitoring of critical situations attracted researchers to utilize WSNs at vast platforms. The main focus in WSNs is to enhance network localization as much as one could, for efficient and optimal utilization of resources. Different approaches based upon redundancy are proposed for optimum functionality. Localization is always related with redundancy of sensor nodes deployed at remote areas for constant and fault tolerant monitoring. In this work, we propose a comparison of classic flooding and the gossip protocol for homogenous networks which enhances stability and throughput quiet significantly. Keywords: Wireless Sensor Network, Protocol, Message broadcasting, Classic Flooding, Gossiping flooding 1. Introduction Wireless sensor network is a collection of sensor nodes organized into a cooperative network [2]. Each sensor node consists of processing capability (one or more microcontroller, CPUs or DSP chips), may contain multiple types of memory ( program, data and flash memories), have a RF transceiver (either with a omni-directional or directional antenna), have a power source (batteries or solar cells), and accommodate various sensors and actuators. The node communicate wirelessly and often self-organized after being deployed in an ad hoc fashion. WSNs are an infrastructure comprised of sensing (measuring), computing, and communication element that give an administrator the ability to instrument, observe, and react to event and phenomena in a specified environment. Figure 1. General model of Wireless Sensor Networks There are four basic components in a sensor network: 1) An assembly of distributed or localized sensors. 2) An interconnecting network (usually, but not always, wireless based). 3) A central point of information clustering.
  • 2.  ISSN: 2089-3272 IJEEI Vol. 2, No. 1, March 2014 : 48 – 55 49 4) A set of computing resources at the central point (or beyond) to handle data correlation, event trending, status querying, and data mining 2. Architecture of WSNs Wireless sensor networks consist of individual nodes that are able to interact with the environment by sensing or controlling physical parameters. These nodes have to collaborate to full fill their tasks. The nodes are interlinked together and by using wireless links each node is able to communicate and collaborate with each other. The wireless sensor network and the classical infrastructure comprises of the standard components like sensor nodes (used as source, sink/actuators), gateways, Internet, and satellite link, etc. Figure 2. Sensor network communication architecture There are many other architecture of wireless sensor network which are shown below. A. Homogeneous network In Homogeneous network sensor nodes or sensor field transmit data to base station. This base station forward that data over internet and from internet specific user can access the data. This type of. are classified under homogeneous network B. Heterogeneous network In Heterogeneous network sensor node or senor field transmit data to internet via base station and from internet the shared to different user by different means like Wi-Fi, W-Max and on any personal network. This type is classified under Heterogeneous network C. Ad-Hoc network In Ad-Hoc network the data transmit from sensor to internet and a server receive that data which is shared by N number of user that are wirelessly connected to server. This type is classified under Ad-Hoc network 3. Protocol in Wireless Sensor Network During previous research, many differences have been observed, generally, between flat and hierarchical rout- ing protocols and, exactly, between these researched routing protocols. In this paper, we choose Gossip- ing as a target protocol to conduct our research and some extensions. Firstly a technical glimpse on Gossiping: Gossiping is a data-relay protocol, based on a Flooding protocol, and does not need routing tables or topology maintenance [10]. It was produced as an enhancement for Flooding and to overcome the drawbacks of Flooding, i.e., implosion [11]. In Flooding, a node broadcasts the data to all of its neighbors even if the receiving node has just received the same data from another node. The broadcasting will
  • 3. IJEEI ISSN: 2089-3272  A Comparison of Routing Protocol for WSNs: Redundancy Based Approach (Anand Prakash) 50 continue until the data is received by the destination [12]. However, in Gossiping, a node randomly chooses one of its neighbors to forward the packet to, once the selected neighbor node receives the packet it, in turn, chooses another random neighbor and forwards the packet to it. This process will continue until the destination or number of hops has been exceeded. As a result, only the selected nodes/neighbors will forward the received packet to the sink [13]. Unlike Flooding, Gossiping operates well in a one-to-one communication scenario but it does not in a one-to-many. 4. Message Broadcasting Wireless sensor networks (WSNs) consist of sensor nodes that broadcast a message within a network [2]. Efficient broadcasting is a key requirement in sensor networks and has been a focal point of research over the last few years. There are many challenging tasks in the network, including redundancy control and sensor node localization that mainly depend on broadcasting. Each sensor node in the network is equipped with the memory, radio frequency transceiver, and power source to broadcast wirelessly over a specified protocol. The success of wireless sensor networks mainly depend on message forwarding/broadcasting from one node to another node [6]. And the efficiency of message broadcast depend on the protocol which are used. In this paper we compared redundancy factor of broadcasting protocol that is classic flooding protocol and gossip protocol to control redundancy and improve localization in WSNs. The proposed results incorporates the benefits of the gossip protocol for optimizing message broadcasting within the network over classic flooding. 5. Message Broadcast Through Classic Flooding Classic flooding is a protocol which is used to broadcast message in WSNs. This protocol state that in a wireless sensor networks when nodes are randomly placed and the main node get message from system and distribute it to other placed node and there is no set pattern of distribution as shown in figure 3. Figure 3. Classic flooding As we can observe in figure 6 the system is transmitting data to main node (M). This main node (M) distribute it over network that is from main node (M) to sub node (N1) or from main node (M) to sub node (N2) or to both nodes (N1 & N2). Further sub node (N1) transmit it to other nodes in network including sub node (N2) similarly sub node (N2) transmit it to other nodes in network including sub node (N1). As observed there is no set pattern of broadcasting message that is any node is transmitting to any node this leads to increase in redundancy over network.
  • 4.  ISSN: 2089-3272 IJEEI Vol. 2, No. 1, March 2014 : 48 – 55 51 6. Message Broadcast through Gossip Protocol Gossip protocol is a protocol which is used to broadcast message in WSNs [1]. Gossip is a probability based protocol. Whenever a sensor node wishes to send a message, it randomly selects a neighboring sensor node. On receiving the message for the first time the neighboring sensor node keep the track of messages it has already received and repeats this process to send message to neighboring node. In gossip protocol every sensor node if receive the same message twice, it is discarded. In order to achieve this, each sensor node has to keep the track of messages it has already received. Besides this the gossip protocol also performs tasks to help the inter process interaction for information exchange between networks where the sensor node failure is quite frequent as shown in figure 4. Figure 4. Gossip protocol As we can observe that system data to main node (M) now this sensor node (M) has to keep the track of messages it received. Now this sensor node (M) randomly selects a neighboring sensor node (N1). Upon receiving the message for the first time node (N1) keep record of receive message and forward the message to other neighboring node (N2). On receiving the message for the first time the sensor node (N2) keep the track of messages it has received. If any sensor node receive the same message twice, it is discarded. Thus redundancy reduces and message is forwarded efficiently. 7. Comparative Analysis We have compared the both protocol for total number of event 1 and varied total node from 10 to 200. For both protocol the result are shown below. Classic Flooding Protocol Case A: -Implementation of Classic flooding for total event 1 and total node 10 over width of 600m and height of 500m
  • 5. IJEEI ISSN: 2089-3272  A Comparison of Routing Protocol for WSNs: Redundancy Based Approach (Anand Prakash) 52 Figure 5. Classic flooding for event = 1 and nodes = 10 Case B: - Implementation of Classic flooding protocol for total event 1 and total node 200 over width of 600m and height of 500m Figure 6. Classic flooding for event = 1 and nodes = 200 Gossip Protocol. Case A: -Implementation of Gossip protocol for total event 1 and total node 10 over width of 600m and height of 500m Figure 7. Gossip protocol for event = 1 and nodes = 10
  • 6.  ISSN: 2089-3272 IJEEI Vol. 2, No. 1, March 2014 : 48 – 55 53 Case B: -Implementation of Gossip protocol for total event 1 and total node 200 over width of 600m and height of 500m Figure 8. Gossip Protocol for event = 1 and nodes = 10 Graph Analysis of Classic Flooding Protocol and Gossip Protocol for number of event 1 and number of nodes 200 Figure 9. Classic Flooding Graph at 200 nodes Figure 10. Gossip Protocol Graph at 200 nodes
  • 7. IJEEI ISSN: 2089-3272  A Comparison of Routing Protocol for WSNs: Redundancy Based Approach (Anand Prakash) 54 Analysis of redundant counts receive in both protocol with nodes varying from 10 to 200 is shown in Table 1 and Table 2. Table 1. Classic Flooding protocol Sense Counts Transmit Counts Receive Counts Receive Redundant Counts 9 9 4 0 18 19 14 04 27 29 27 27 35 38 37 63 45 48 47 132 54 58 58 205 60 69 69 317 70 79 79 435 80 89 89 633 90 99 100 775 98 109 110 944 108 119 120 1213 115 129 130 1412 124 139 140 1652 133 149 150 1926 142 159 160 2176 152 169 170 2475 159 179 180 2730 169 189 190 3062 177 199 200 3339 Table 2. Gossip Protocol Sense Counts Transmit Counts Receive Counts Receive Redundant Counts 9 20 3 10 19 40 17 21 25 60 26 33 31 80 31 49 39 100 43 57 46 120 46 74 54 140 52 88 61 160 60 100 68 180 70 110 75 200 81 119 84 220 90 130 91 240 99 141 99 260 102 158 107 280 113 167 114 300 122 178 123 320 122 198 131 340 129 211 139 360 144 216 145 380 152 228 152 400 158 242 8. Conclusion As we can observe redundant count in classic flooding protocol and Gossip Protocol are shown below in Table 3 and Table 4. Table 3. Classic Flooding Protocol Number Of Event Number of nodes Redundancy Classic Flooding 1 10 0 Classic Flooding 1 200 3339
  • 8.  ISSN: 2089-3272 IJEEI Vol. 2, No. 1, March 2014 : 48 – 55 55 Table 4. Gossip Protocol Protocol Number Of Event Number of nodes Redundancy Gossip Protocol 1 10 10 Gossip Protocol 1 200 242 When number of nodes are 200in network the redundant counts of classic flooding is 3339 which is very much greater that redundant counts of gossip flooding which is 242 hence gossip flooding is much better than classic flooding because redundancy factor decrease in gossip protocol hence message forwarding is more efficiently done using gossip protocol. References [1] AM Kermarrec, MV Steen. Gossiping In Distributed System. Operating System Review. 2007; 41(5): 2-7. [2] IF Akyildiz, W Su, YS Sankarasubramaniam, E Cayiric. A Survey on Sensor Network. IEEE Communication Magazine. 2004; 40(8): 102-114. [3] G Mao, B Fidan, Brian DO Anderson. Sensor Network Localization. The International Journal of Computer and Telecommunications Networking. 2007; 51: 2529-2553. [4] Chadni and K Singh. Estimation Scheme with Improved Accuracy. International Journal of Science and Emerging Technology with Latest Trend. 2012; 3(1): 9-18. [5] Weng Chon Ao, Kwang-Cheng Chen. Error Control for Local Broadcasting in Heterogeneous Wireless Ad Hoc Networks. IEEE Transactions on Communications. 2013; 61(4): 1510-1519. [6] Y Liang, H Vincent Poor, L Ying. Secure Communication Over Wireless Broadcast Network: Stability And Utility. IEEE Transactions on Information Forensics and Security. 2011; 6(3): 682-692. [7] Geir Egeland, Paal E Engelstad. The Economy of Redundancy in Wireless Multi-Hop Networks. In Proceeding of IEEE WCNC. 2009. [8] Majid Khabbazian, Vijay K Bhargava. Reducing Broadcast Redundancy in WirelessAd Hoc Networks. In Proceeding of IEEE Globecom. 2007. [9] H Modares, R Salleh, A Moravejosharieh. Overview of Security Issues in Wireless Sensor Network. In Proceeding of Third International Conference on Computational Intelligence, Modelling and Simulation IEEE. 2011: 308-311. [10] Ian F Akyildiz, MC Vuran, B Akan, Weilian Su. Wireless Sensor Network: A Survey Revisited. Computer Networks Journal. 1-39. [11] F Wang, J Liu. Networked Wireless Sensor Data Collection: Issues, Challenges, and Approaches. IEEE Communications Surveys & Tutorials. 2011; 13(4); 673-687. [12] K Islam, W Shen, X Wang. Wireless Sensor Network Reliability and Security in Factory Automation: A Survey Systems. IEEE Transactions on Systems, Man and Cybernetics, Part C: Applications and Reviews. 2012; 42(6): 1243-1256. [13] M Erol-Kantarci, HT Mouftah, S Oktug. A Survey of Architectures and Localization Techniques for Underwater Acoustic Sensor Networks. IEEE Communications Surveys & Tutorials. 2011; 13(3): 487- 502. [14] Zhenjiang Li Yunhao Liu. Rendered Path: Range-Free Localization in Anisotropic Sensor Networks With Holes. IEEE Transactions on Networking. 2010; 18(1): 20-332. [15] N Salman, M Ghogho, AH Kemp. Optimized Low Complexity Sensor Node Positioning in Wireless Sensor Networks. IEEE Sensors Journal. 2013; 14(1): 39-46. [16] Chih-Yung Chang Chih-Yu Lin, Chao-Tsun Chang. Tone-Based Localization for Distinguishing Relative Locations in Wireless Sensor Networks. IEEE Sensors Journal. 2012; 12(5): 1058-1070. [17] YW Xiaoli, G Leus. Robust Time-Based Localization for Asynchronous Networks. IEEE Transactions on Signal Processing. 2011; 59(9): 4397-4410.