SlideShare a Scribd company logo
International Journal of Trend in Scientific Research and Development, Volume 1(3), ISSN: 2456-6470
www.ijtsrd.com
IJTSRD | Mar-Apr 2017
Available Online@www.ijtsrd.com 10
Grid-Based Multipath with Congestion Avoidance
Routing Protocol
Dr. Atul M Gosai1
,Lakshdeep M Raval2
1
Associate Professor, 2
Ph.D Scholar,
1,2
Department of Computer Science, Saurashtra University, Rajkot, Gujarat. India.
Abstract— This Paper gives information about Grid base
multipath wireless sensor network. We give a brief
introduction about wireless sensor network, how sensor works
in this network. How the Routing is done and if there is
congestion detected in sensors networks and then how it can be
solved. Routing protocols are also classified in several types
like Proactive, Reactive, and Hybrid in also given here the
details of that. Also here we describe various routing
techniques like Traditional and Current techniques. In flooding
based techniques, sensor broadcast the information and the
destination sensor receives that information. In gossiping
techniques, sensor sends information to neighbour sensor and
so on. In this paper we also see that if any sensor id dies due to
lack of power or any other problems then another path will be
routed. Routing protocols are having 3 types Flat routing,
Hierarchical routing and Location based routing. In Flat
routing SPIN,DD, Rumor routing, etc protocols are used. In
hierarchical routing LEACH, PEGASIS, TEEN protocols are
used. Now a day LEACH and PEGASIS are widely used in
cluster base Wireless Sensor Network. In leach protocol
reduced the path using cluster head formulation in this method
randomly any sensor make the cluster head n send messages in
the network. In pegasis protocol use chaining concept and find
the best path from base station to the destination station.
PEGASIS and LEACH provide best routing techniques in
wireless sensor network but they also have some
disadvantages. We also differentiate flat and hierarchical
routing techniques in which case which one gives best
performances. Here we introduce the readers to Location based
routing protocols GEAR and how it route the path is also
briefly described here.
Keywords— Wireless Sensor Network protocols, GMCAR,
Flooding, Gossiping, SPIN,LEACH, PEGASIS, TEEN
I. INTRODUCTION
Wireless sensor networks (WSN) are a specially distributed
network that is composed of lots of sensor nodes. It is always
deployed in a special area to complete a task of sensing and
monitoring. There are many technical challenges associated
with sensor networks, such as self-organizing algorithm,
energy-efficient routing protocols, data aggregation technology
and network lifetime improvements. The energy for sensor
networks is very important. It is infeasible to replace battery of
sensor. Therefore, conserving energy so as to prolong the
network lifetime is becoming one of the key challenges. Recent
researches have addressed these topics, such as power-aware
channel access, routing and broadcasting, data aggregation
protocol and so on[8, 16]
In this Paper we discuss the how to Sensor Routes the path
of destination in wireless network. Traditional Routing
techniques like Flooding and Gossiping and also discussed
during current routing techniques like Flat routing Techniques,
Hierarchical routing Techniques and Location based routing
Techniques followed by how congestion is avoided in WSN.
Section I is Introduction followed by Section II giving brief
about WSN followed by classification of routing protocols and
discussing about traditional and current routing algorithms in
section III, IV and V. Further, we show our results before
conclusion in Section VI followed by Acknowledgement and
References in Section VII and VIII.
II. WIRELESS SENSOR NETWORK
Wireless grids are wireless computer networks consisting of
different category of electronic devices with the ability to share
their resources with any other device in the network in an ad
hoc comportment. A definition of the wireless grid can be
given as: "Ad hoc, distributed resource-sharing networks
between Different wireless devices. The following key
characteristics further clarify this concept:
• No centralized control
• Small, low powered devices
• Heterogeneous applications and interfaces
• Dynamic and unstable users / resources
A wireless sensor network (WSN)autonomous sensors are
also keep an eye on physical or environmental conditions, such
as temperature, sound, vibration, pressure, motion or pollutants
and to cooperatively pass their data through the network to a
main Machine. [2]
The WSN is built of "nodes" from a few to several hundreds
or even thousands, where each node is connected to one or
sometimes several sensors. Every node contains several parts
like radio transceiver, micro-controller, electronic circuit and
battery for power supply. The cost of sensor nodes is
depending on the energy, memory, computational speed and
communications bandwidth.
One of the biggest limitations of the wired grid is that clients
are forced to be in aunchangingstatic location as the devices
they make use of are to be stiff wired to the grid at all times.
This also has a negative influence on the flexibility and
scalability of the grid; devices can only connect the grid in
locations where the prospective chances exists to physically
connect the device to the grid.[1,4]
Here we show in below figure that how sensors work in
WSN.
International Journal of Trend in Scientific Research and Development, Volume 1(3), ISSN: 2456-6470
www.ijtsrd.com
IJTSRD | Mar-Apr 2017
Available Online@www.ijtsrd.com 11
Figure1: Flowchart explaining working of wireless sensor
networks.
III.CLASSIFICATION OF ROUTING PROTOCOLS
Routing protocols are mainly classified in 3 types are as
follows:
1. Proactive,
2. Reactive, and
3. Hybrid
Here we Show all the Classification in details.
1) Proactive:
In a Proactive Protocol the nodes button on their sensors and
transmitters, sense the surroundings and convey the
information to a BS through the predefined direction. e.g.
The Low Energy Adaptive Clustering hierarchy protocol
(LEACH) utilizes this sort of protocol.
2) Reactive :
If there are impulsive changes in the sensed attribute away
from some pre-determined threshold value, the nodes
instantly react. This type of protocol is used in instance
critical applications. e.g. The Threshold sensitive Energy
Efficient sensor Network (TEEN) is an example of a
reactive protocol.
3) Hybrid :
Hybrid protocols integrate both proactive and reactive
concepts. They first compute the entire available routes and
then improve the routes at the time of routing. e.g. Adaptive
Periodic TEEN(APTEEN) is this type of protocol.
IV.TRADITIONAL ROUTING TECHNIQUES
The Traditional Routing Techniques are also classified as
follows:
1. Flooding and
2. Gossiping
Here we Show Both Techniques in details are as follow;
1) Flooding:
One line of attack is each sensor node broadcast data
packet to its neighbours Sensors and this process carry on
till the data packet reaches the destination node. If the
maximum hop count of the packet is not reached and node
itself is not the destination of the packet, this process
continues. This technique does not require complex
topology maintenance nor route discovery algorithms.
Flooding in presence of all the good points does carry
following disadvantages:
1. Implosion:
This is circumstances when replica messages are sent
to the same node. This occurs when a node receives
carbon copy of the same message from many of its
neighbors.
2. Overlap :
The same incident may be sensed by more than one
node by reason of over lapping of regions of coverage.
This results in their neighbors receiving duplicate reports
of the same incident.
3. Resource Blindness :
The flooding protocol does not reflect on the available
energy at the nodes and results in many surplus transmissions.
So it reduces the network lifetime.
2) Gossiping:
Gossiping is modified version of flooding, where the nodes
do not broadcast a packet, but send packets to a randomly
selected neighbor. This evades the trouble happening due to
Implosion. It takes a long time for a message to propagate
throughout the network. Though gossiping has considerably
lower overhead than flooding, it does not give any assurance
that all nodes of the network will receive the message. It relies
on the random neighbor selection to in due course propagate
the message throughout the network.
The Sensor node transmits the data packet to a randomly
chosen neighbor which in turn selects an additional random
neighbor until the destination node is reached.
V. CURRENT ROUTING TECHNIQUES
In Traditional Routing Techniques there are quite a few
Drawbacks similar to an Implosion, overlap of packets,
resource Blindness etc. To overcome all the disadvantages of
the Traditional Routing techniques other routing techniques
International Journal of Trend in Scientific Research and Development, Volume 1(3), ISSN: 2456-6470
www.ijtsrd.com
IJTSRD | Mar-Apr 2017
Available Online@www.ijtsrd.com 12
and algorithm need to beintroduced and developed that will
make use of a dynamic path and generate dynamic routing
table in accordance with the density of network traffic and will
be capable of finding the best path.
Current Routing Techniques makes use of Classical
mechanisms to relay data in sensor networks without the need
for any routing algorithms and topology maintenance. Current
Routing Techniques which are used in now a days for Routing
in Networks are classified as follows:
1. Flat Routing
a. SPIN (Sensor Protocols for Information Via
Navigation),
b. DD (Directed Diffusion), and
c. Rumor Routing
2. Hierarchical Routing
a. LEACH (Low Energy Adaptive Clustering
Hierarchical ) protocols,
b. PEGASIS (Power Efficient Gathering In Sensor
Information System) Protocols,
c. TEEN or APTEEN (Threshold-Sensitive Energy
Efficient) Protocols.
3. Location Based Routing
a. GEAR (Geographical and Energy Aware
Routing) Protocols,
b. GEM
Now we give details about the working of all protocols:
1. Flat Routing:
Flat routing protocols are primarily those protocols that
don’t work under a predefined network layout and parameter.
They facilitate the delivery of packets among routers through
whichever available path without considering network
hierarchy, distribution and composition.
In the case of Flat Routing Techniques protocols, if any
node needs to transmit data, it first searches for a valid
available route to the Base Station and then transmits the data.
Nodes around the base station may drain their energy quickly
during this process.
Here we discuss some Flat Routing Protocols, that are as
follows:
a. SPIN:
SPIN stands for Sensor Protocols for Information via
Navigation. SPIN belongs to a family of adaptive protocols
also known as Sensor Protocols for Information via
Negotiation. It assigns a high-level name to completely
describe their collection of information called meta-data.
SPIN has three types of messages: ADV,REQ, and DATA. A
sensor node broadcasts an ADV containing meta-data
describing actual data. If a neighbor is interested in the data, it
sends REQ for the data. Only then the sensor node sends the
actual DATA to the neighbor. The neighbor again sends ADVs
to its neighbors and this process continues to disseminate the
data throughout over the network. The simple version is shown
in figure given below in figure 2.
Figure 2: Data passing strategy in SPIN Routing Techniques.
In SPIN protocols topological changes are confined to a small
area. SPIN protocol provides supplementary energy savings
than flooding, and metadata negotiation more or less halves the
redundant data. The main Drawback of SPIN is data
advertisement mechanism cannot guarantee reliable delivery of
data.
b. DD: Direct Diffusion.
DD protocols stands for Directed Diffusion.This protocol is
helpful in scenario where the sensor nodes themselves generate
requests or queries for data sensed by other nodes, instead of
all queries arising only from a Base station. Hence the sink for
the query could be a BS or a sensor node. The direct diffusion
routing protocol improves on data diffusion using interest
gradients. Each sensor node names its data with one or more
attributes and other nodes express their interest depending on
these attributes. Attribute value pairs can be used to describe an
interest in intrusion data.
Directed diffusion differs from SPIN in two aspects.
i. Query method
ii. Communication Method.
In Directed diffusion Techniques data can be send by 3 ways
are as follows:
i. Propagate Interest
ii. Set up Gradients
iii. Through Reinforcement
International Journal of Trend in Scientific Research and Development, Volume 1(3), ISSN: 2456-6470
www.ijtsrd.com
IJTSRD | Mar-Apr 2017
Available Online@www.ijtsrd.com 13
Figure 3: Data passing procedure in DD Routing Techniques.
Directed diffusion may not be applied to all the applications
(e.g., environmental monitoring).In Direct Diffusion
Techniques Matching data to queries might require some extra
overhead.
c. Rumor Routing:
Rumor Routing is an agent supported path creation algorithm.
Agents are long-lived entities created at random by nodes.
These are basically packets which are circulated in the network
to establish shortest path to entities that they encounter across
the network. They can also perform path optimizations for
connection with the nodes they visit. When agent finds a node
whose path to an event is longer than its own, it updates the
nodes routing table.
Figure 4: The way Data pass in Rumor Routing Techniques.
2. Hierarchical Routing:
Hierarchical routing is efficient to execute energy efficient
routing, i.e., higher energy nodes can be used to route and send
the information; low energy nodes are used to perform the
sensing in the area of interest [10].Hierarchical Routing
Techniques are classified as follows:
a. LEACH:
LEACH stands for Low Energy Adaptive Clustering
Hierarchical protocols. LEACH is the earliest proposed single-
hop clustering routing protocol in WSN. It can save the
network energy greatly compared with the non-cluster routing
algorithm. A lot of other clustering algorithms are projected
based on LEACH, such as TEEN (Threshold Sensitive Energy
Efficient Sensor Network Protocol), PEGASIS(Power
Efficient Gathering in Sensor Information
Systems),HEED (Hybrid Energy-Efficient Distributed
Clustering) and so on.[15]
In LEACH code of behavior, all clusters are self-organized;
where every cluster holds back a cluster-head and several non-
clusters head nodes. Cluster-head node drinks more energy
than non-cluster head nodes. With the intention of balancing
network energy expenditure and prolonging the network life
cycle, it selects cluster head randomly and each node has an
equal chance to be cluster-head. The cluster constitution update
continuously in operation and one updating process is called a
round. The cycle of each round contains two stages: set-up
phase and steady-state phase, set-up phase is the establishment
phase of a cluster; steady-state phase is the stable data transfer
phase.
Set-up phase each node generates a random number between
0 to 1, and compares this number with the threshold value T(n)
.If the number is less than T(n) , the node is selected as a
cluster-head.[2]
Once the cluster-head is determined, the cluster-head sends
a broadcast message to the network, announced itself as the
cluster head; each normal node make a decision which cluster
to unite with, in according to the signal strength of the received
message, sends a request message to the corresponding cluster-
head. The cluster-head receives all the messages sent by the
nodes that would like to join in the cluster, confirms them as
members of the cluster, then joins them in the routing table and
allocates TDMA table of slots for the cluster members telling
each member at what time it can transmit data.[3,9,11]
A LEACH protocol is all about progress towards
enhancement of node energy and position information to
improve the LEACH algorithm, proposes energy balanced
clustering algorithm named L-LEACH and LEACH-C.
International Journal of Trend in Scientific Research and Development, Volume 1(3), ISSN: 2456-6470
www.ijtsrd.com
IJTSRD | Mar-Apr 2017
Available Online@www.ijtsrd.com 14
Figure 5: Diff between LEACH And LEACH-C.
In above figure we can see that LEACH distributes more data
per unit energy than MTE. LEACH-C delivers 40% more data
per unit energy than LEACH.LEACH and LEACH-C’s nodes
lifetime is much longer than MTE’s. LEACH can deliver 10
times the amount of effective data to the BS for the same
number of node deaths[5].
Figure 6: Comparison between SPIN,LEACH and
DD.
LEACH protocol has a relatively good function in energy
consumption through dynamic clustering, keeps the data
transmission in cluster which reduces the energy consumption
by communicating directly between nodes and the base station,
but there are still a lot of inadequacies. The LEACH protocol
uses the mechanism of cluster-head rotation, elects cluster-
head randomly, after several rounds of data transmission, the
residual energy of the nodes will have a great difference,
cluster-head or the nodes which are far from the base station
will consume more energy. When transmitting data of the same
length relatively, if they are selected as cluster-heads after that,
they will run out of energy and become invalid. Once the
number of invalid nodes increases, it’ll have a great influence
in the network performance and shorten the life of the network.
Cluster member nodes select the optimal cluster-head based on
the received signal intensity to join in; do not consider the
distance from the node itself to the base station, but considers
the distance to be covered between cluster-head and the base
station. So normal node may chose the cluster-head that is far
away from base station as its optimal cluster-head, this not only
is the heavy burden to the cluster-head but also increases the
extra energy consumption, which is not beneficial to balance
network energy consumption. The protocol assumes that all
nodes begin with the same quantity of energy capacity in each
election round, assuming that being a CH consumes
approximately the same amount of energy for each node.[7,9]
b. PEGASIS:
PEGASIS is stands for Power-Efficient Gathering in Sensor
Information Systems. It is an algorithm based on chain, which
uses greedy algorithm to form data chain. Each node
aggregates data from downstream node and sends it to
upstream node along the chain.[15, 16]
PEGASIS has some advantages when compared with
LEACH: It eradicate the overhead in dynamic formation of
cluster; the distance between nodes on chain is much shorter
than from nodes to cluster heading LEACH and so on.
Therefore, PEGASIS can save much energy. In PEGASIS,
each node communicates only with a close neighbor and takes
turns transmitting to the base station, thus reducing the amount
of energy spent per round. Simulation results show that
PEGASIS performs better than LEACH by about 100% to
300% when 1%, 20%, 50%, and 100% of nodes die for
different network sizes and topologies.
Although PEGASIS has better performance, it also has a
shortcoming: using greedy algorithm to construct chain, which
will result in distance between a pair of sensors that becomes
too long. In this condition, this pair of sensors will consume
much energy than other sensors in transmitting data phase.
Thus, they may probably die early.[12]
Chain construction to construct the chain we start from the
farthest node from the base station, and then greed approach is
used to construct the chain.
Leader of each round is selected randomly. If N is number
of node as selected as head node for some round randomly
selecting head node also provides benefit as it is more likely
for nodes to die at random locations thus providing robust
network.When a node dies chain is reconstructed to bypass the
dead node.Head node receives all the fused data and sends to
the BS.[13]
Figure 7: Chaining Process in PEGASIS
In chaining process, a node will consider average distance of
formed chain. If the distance from neighboring node to its
upstream node is longer than distance thresh (the distance
thresh can obtain from average distance of formed chain), the
closest node is a "farnode". If the closest node joins the chain,
it will emerge as a "long chain". In this condition, the "far
node" will search a nearer node over the formed chain.
Through this method, the new protocol EB-PEGASIS can
avoid "long chain" effectively. It not only save energy on
sensors, but also balance the energy consumption of all
sensornodes.
In below Image we can See that the Percentage of nodes
demise during the transmission. This is a Performance result
for 100m*100m Network with initial energy 5J/Node.
International Journal of Trend in Scientific Research and Development, Volume 1(3), ISSN: 2456-6470
www.ijtsrd.com
IJTSRD | Mar-Apr 2017
Available Online@www.ijtsrd.com 15
Figure 8: Performance chart of nodes death in different
Protocols.
The Disadvantages of PEGASIS protocol is only that
PEGASIS assumes each sensor node is competent to
communicate with the BS directly. We assume that all sensor
nodes have the same level of energy and are likely to die at the
same time [16].
c. TEEN:
TEEN is stands for Threshold-Sensitive Energy Efficient
Protocols. TEEN’S CH sensor sends its members a hard
threshold and a soft threshold. TEEN’S appropriateness for
time-critical sensing applications is admirable. TEEN is also
quite resourceful in terms of energy consumption and response
time. TEEN also allows the user to manage the energy
consumption with precision to suit the application.
In below figure we show comparison of other protocols with
TEEN protocols in the terms of Energy verses number of
Nodes.
Figure 9: Comparison of all protocols in term of energy they
used.
In above figure we show that the TEEN consume awfully
less energy in contrast to the LEACH and LEACH-c Protocols.
So the Life of nodes and network will be extended and
performance will be in good health.
In below figure we can see that Compare to Other Protocols
in TEEN nodes can alive for long time because in TEEN
protocols Energy is not wasted by nodes.
Figure 10: Comparison of all protocols in term of Nodes are
alive.
In below table the differences between flat Routing and
Hierarchical routing techniques are given.
Flat Routing Hierarchical Routing
Contention-based routing reservation-based scheduling
Collision overhead present Collisions avoided
Variable duty cycle by
controlling sleep time of nodes
Reduced duty cycle due to
periodic sleeping
Node on multi hop path
aggregates incoming data from
neighbours
Data aggregation by
clusterhead
Routing can be made optimal
but within added complexity
Simple but non-optimal
routing
Links formed on the fly without
synchronization
Requires global and local
synchronization
Routes formed only in regions
that have data for transmission
Overhead of cluster formation
throughout the network
Latency in waking up
intermediate nodes and setting
up the multipath
Lower latency as multiple
hops network formed by
cluster-heads always available
Energy dissipation depends on
traffic patterns
Energy dissipation is uniform
Energy dissipation adapts to
traffic pattern
Energy dissipation cannot be
controlled
Fairness not guaranteed Far channel allocation
3. Location-based routing:
Location based routing protocols need some location
information of the sensor nodes. Location information can be
obtained from GPS (Global Positioning System) signals,
International Journal of Trend in Scientific Research and Development, Volume 1(3), ISSN: 2456-6470
www.ijtsrd.com
IJTSRD | Mar-Apr 2017
Available Online@www.ijtsrd.com 16
received radio signal strength, etc. Using location information,
an optimal path can be formed without using flooding
techniques.Location Based Routing algorithms are classified as
follows:
a. GEAR:
GEAR stands for Geographic and Energy Aware Routing
protocols. The key scheme is to confine the number of interests
in directed diffusion by only considering a certain region rather
than sending the interests to the whole network. GEAR
protocol keeps an estimated cost and a learning cost balanced
and under the edge.
b. GPRS:
One another Protocols are GPSR, which is designed for general
mobile ad hoc networks. It has two parameters, Uniform
Traffic and Non-uniform Traffic. For uneven traffic
distribution, GEAR delivers 70–80 percent more packets than
GPSR. For uniform traffic pairs GEAR delivers 25–35 percent
more packets than GPSR.[14]
VI.CONCLUSION
In this research we have described the Grid base multipath
congestion avoidance protocols where, we also discussed
different types of protocols that are used in wireless sensor
network for routing and avoiding congestion. We also shown,
how it will pick the finest path for transporting the packet data
from numerous routes. We also described protocols that will
choosesuperlative path for sending data from base station to
destination other than normally opted. In this paper we also
compared all the protocols on the basis of common aspect of
the power consumption and energy draining behavior. We gave
comparative analysis based on the way nodes are used and the
remaining energy left before nodes die because of issues like
instability, delay, interference and continuous scanning for the
networks.
VII. REFERENCES
[1] Robert AklandUttarasawant, Grid-based Coordinated Routing in
Wireless Sensor Networks.
[2] M.J.Handy,M.Haase,D.Timmermann,Low Energy Adaptive Clustring
Hierarchy with Deterministic Cluster-Head Selection
[3] QianLiao,HaoZhu,An Energy Balanced Clusterin Algorithm Based on
LEACH Protocol
[4] Mohammad
asumuzzamanBhuiyan,IqbalGondalJoarderKamruzzaman,Location
Aided Congestion Awae Routing in Wireless Sensor Networks
[5] MortazaFahimiKhatonAbad,Mohammad Ali jabraeiljamali,Modify
LEACH Algorithm for Wireless Sensor Network
[6] Majid I. Khan,Congestion Avoidance and Energy Efficient Routing
Protocol for Wireless Sensor Networks with a Mobile Sink
[7] JaewonKang,BadriNath,YanyongZhang,Shengchaoyu, Adaptive
Resource Control Scheme to Alleviate Congestion in Sensor Netwotks
[8] Lucian Popa,CostinRaiciu,IonStoica,David S. Rosenblum, Redusing
Congestion Effects inWireless Networks by Multipath Routing
[9] Mark A.Perillo,wendiB.Heinzelman, Wireless Sensor Network Prorocols
[10] Bharat Bhargava, Self-Adjusting Congestion Avoidance Routing
Protocol for Ad-Hoc Networks
[11] SinemColeriErgen and PravinVaraiya, TDMA Scheduling Algorithms
for Wireless Sensor Networks
[12] LindseyS:PEGASIS,comput.Syat.Res.Dept.Aeroap.Corp.Angeles.CA.US
A.IEEE Xplore
[13] Jayashree A,G. S. Biradar,V.D.Mytri, Review of Multipath Routing
Protocols in Wireless Multimedia Sensor Network –A Survey
[14] N.NarasimhaDatta and K.Gopinath, A survey of routing algorithms for
wireless sensor networks
[15] Al-Karaki, J. N. and A. E. Kamal, "Routing Techniques in Wireless
Sensor Networks: A Survey", IEEE Wireless Communications, Volume
11, No. 6, Dec. 2004, pp. 6--28.
[16] Shagan Paul Kaur, Mrs.Amandeep Kaur, Review of Power-Efficient
Gathering in Sensor Information System(PEGASIS) for Network
Optimization in WSN, International Journal of Advanced Research in
Computer Science and Software Engineering (IJARCSSE), Volume 4,
Issue 6, June 2014, Pg no. 872 - 877.
Ad

More Related Content

What's hot (20)

WSN presentation
WSN presentationWSN presentation
WSN presentation
Braj Raj Singh
 
Hetrogenous wireless sensor network
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor network
Chinmoy Jena
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Security
ijtsrd
 
50120140506010
5012014050601050120140506010
50120140506010
IAEME Publication
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
Ganesh Khadsan
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network
dilip pareek
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
Karthik
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
IRJET Journal
 
Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technology
Kapil Dev
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
Alexander Decker
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
theijes
 
Wsn ppt original
Wsn ppt originalWsn ppt original
Wsn ppt original
Deepak Kumar Dhal
 
seminar report on wireless Sensor network
seminar report on wireless Sensor networkseminar report on wireless Sensor network
seminar report on wireless Sensor network
Jawhar Ali
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
Devdutta Chakrabarti
 
Wireless sensor networks software architecture
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architecture
Adeel Javaid
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
shashankcsnits
 
Wsn
WsnWsn
Wsn
nishantshah2381
 
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
ijeei-iaes
 
Presentation1
Presentation1Presentation1
Presentation1
Rajat Soni
 
Hetrogenous wireless sensor network
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor network
Chinmoy Jena
 
A Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network SecurityA Review on Wireless Sensor Network Security
A Review on Wireless Sensor Network Security
ijtsrd
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
Ganesh Khadsan
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network
dilip pareek
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
Karthik
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
IRJET Journal
 
Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technology
Kapil Dev
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
Alexander Decker
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
theijes
 
seminar report on wireless Sensor network
seminar report on wireless Sensor networkseminar report on wireless Sensor network
seminar report on wireless Sensor network
Jawhar Ali
 
Wireless sensor networks software architecture
Wireless sensor networks software architectureWireless sensor networks software architecture
Wireless sensor networks software architecture
Adeel Javaid
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
shashankcsnits
 
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
A Comparison of Routing Protocol for WSNs: Redundancy Based Approach A Compar...
ijeei-iaes
 

Similar to Grid-Based Multipath with Congestion Avoidance Routing Protocol (20)

Some Aspects of Wireless Sensor Networks
Some Aspects of Wireless Sensor NetworksSome Aspects of Wireless Sensor Networks
Some Aspects of Wireless Sensor Networks
pijans
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
INFOGAIN PUBLICATION
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
Iasir Journals
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
IJEEE
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
IJMTST Journal
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
ijwmn
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
ijwmn
 
G017344246
G017344246G017344246
G017344246
IOSR Journals
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Network
iosrjce
 
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
IOSR Journals
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
ijtsrd
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
ijcsa
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
ijwmn
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
AM Publications
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
IJEEE
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5
sophiabelthome
 
De3211001104
De3211001104De3211001104
De3211001104
IJMER
 
40120140503011
4012014050301140120140503011
40120140503011
IAEME Publication
 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
IRJET Journal
 
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor Network
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor NetworkEnergy Efficient PEGASIS Routing Protocol in Wireless Sensor Network
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor Network
IRJET Journal
 
Some Aspects of Wireless Sensor Networks
Some Aspects of Wireless Sensor NetworksSome Aspects of Wireless Sensor Networks
Some Aspects of Wireless Sensor Networks
pijans
 
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNsSecure and Efficient DiDrip Protocol for Improving Performance of WSNs
Secure and Efficient DiDrip Protocol for Improving Performance of WSNs
INFOGAIN PUBLICATION
 
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
DATA TRANSMISSION IN WIRELESS SENSOR NETWORKS FOR EFFECTIVE AND SECURE COMMUN...
IJEEE
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
IJMTST Journal
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
ijwmn
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
ijwmn
 
A review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Network
iosrjce
 
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...A Survey of Fuzzy Logic Based Congestion Estimation  Techniques in Wireless S...
A Survey of Fuzzy Logic Based Congestion Estimation Techniques in Wireless S...
IOSR Journals
 
Design Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor NetworkDesign Issues and Applications of Wireless Sensor Network
Design Issues and Applications of Wireless Sensor Network
ijtsrd
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
ijcsa
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
ijwmn
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
AM Publications
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
IJEEE
 
International journal of computer science and innovation vol 2015-n1-paper5
International journal of computer science and innovation  vol 2015-n1-paper5International journal of computer science and innovation  vol 2015-n1-paper5
International journal of computer science and innovation vol 2015-n1-paper5
sophiabelthome
 
De3211001104
De3211001104De3211001104
De3211001104
IJMER
 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
IRJET Journal
 
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor Network
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor NetworkEnergy Efficient PEGASIS Routing Protocol in Wireless Sensor Network
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor Network
IRJET Journal
 
Ad

More from ijtsrd (20)

A Study of School Dropout in Rural Districts of Darjeeling and Its Causes
A Study of School Dropout in Rural Districts of Darjeeling and Its CausesA Study of School Dropout in Rural Districts of Darjeeling and Its Causes
A Study of School Dropout in Rural Districts of Darjeeling and Its Causes
ijtsrd
 
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
ijtsrd
 
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
ijtsrd
 
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
ijtsrd
 
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
ijtsrd
 
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
ijtsrd
 
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
ijtsrd
 
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
ijtsrd
 
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra StateManpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
ijtsrd
 
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
ijtsrd
 
Automatic Accident Detection and Emergency Alert System using IoT
Automatic Accident Detection and Emergency Alert System using IoTAutomatic Accident Detection and Emergency Alert System using IoT
Automatic Accident Detection and Emergency Alert System using IoT
ijtsrd
 
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
ijtsrd
 
The Role of Media in Tribal Health and Educational Progress of Odisha
The Role of Media in Tribal Health and Educational Progress of OdishaThe Role of Media in Tribal Health and Educational Progress of Odisha
The Role of Media in Tribal Health and Educational Progress of Odisha
ijtsrd
 
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
ijtsrd
 
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
ijtsrd
 
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
ijtsrd
 
Performance of Grid Connected Solar PV Power Plant at Clear Sky Day
Performance of Grid Connected Solar PV Power Plant at Clear Sky DayPerformance of Grid Connected Solar PV Power Plant at Clear Sky Day
Performance of Grid Connected Solar PV Power Plant at Clear Sky Day
ijtsrd
 
Vitiligo Treated Homoeopathically A Case Report
Vitiligo Treated Homoeopathically A Case ReportVitiligo Treated Homoeopathically A Case Report
Vitiligo Treated Homoeopathically A Case Report
ijtsrd
 
Vitiligo Treated Homoeopathically A Case Report
Vitiligo Treated Homoeopathically A Case ReportVitiligo Treated Homoeopathically A Case Report
Vitiligo Treated Homoeopathically A Case Report
ijtsrd
 
Uterine Fibroids Homoeopathic Perspectives
Uterine Fibroids Homoeopathic PerspectivesUterine Fibroids Homoeopathic Perspectives
Uterine Fibroids Homoeopathic Perspectives
ijtsrd
 
A Study of School Dropout in Rural Districts of Darjeeling and Its Causes
A Study of School Dropout in Rural Districts of Darjeeling and Its CausesA Study of School Dropout in Rural Districts of Darjeeling and Its Causes
A Study of School Dropout in Rural Districts of Darjeeling and Its Causes
ijtsrd
 
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
Pre extension Demonstration and Evaluation of Soybean Technologies in Fedis D...
ijtsrd
 
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
Pre extension Demonstration and Evaluation of Potato Technologies in Selected...
ijtsrd
 
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
Pre extension Demonstration and Evaluation of Animal Drawn Potato Digger in S...
ijtsrd
 
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
Pre extension Demonstration and Evaluation of Drought Tolerant and Early Matu...
ijtsrd
 
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
Pre extension Demonstration and Evaluation of Double Cropping Practice Legume...
ijtsrd
 
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
Pre extension Demonstration and Evaluation of Common Bean Technology in Low L...
ijtsrd
 
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
Enhancing Image Quality in Compression and Fading Channels A Wavelet Based Ap...
ijtsrd
 
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra StateManpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
Manpower Training and Employee Performance in Mellienium Ltdawka, Anambra State
ijtsrd
 
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
A Statistical Analysis on the Growth Rate of Selected Sectors of Nigerian Eco...
ijtsrd
 
Automatic Accident Detection and Emergency Alert System using IoT
Automatic Accident Detection and Emergency Alert System using IoTAutomatic Accident Detection and Emergency Alert System using IoT
Automatic Accident Detection and Emergency Alert System using IoT
ijtsrd
 
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
Corporate Social Responsibility Dimensions and Corporate Image of Selected Up...
ijtsrd
 
The Role of Media in Tribal Health and Educational Progress of Odisha
The Role of Media in Tribal Health and Educational Progress of OdishaThe Role of Media in Tribal Health and Educational Progress of Odisha
The Role of Media in Tribal Health and Educational Progress of Odisha
ijtsrd
 
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
Advancements and Future Trends in Advanced Quantum Algorithms A Prompt Scienc...
ijtsrd
 
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
A Study on Seismic Analysis of High Rise Building with Mass Irregularities, T...
ijtsrd
 
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
Descriptive Study to Assess the Knowledge of B.Sc. Interns Regarding Biomedic...
ijtsrd
 
Performance of Grid Connected Solar PV Power Plant at Clear Sky Day
Performance of Grid Connected Solar PV Power Plant at Clear Sky DayPerformance of Grid Connected Solar PV Power Plant at Clear Sky Day
Performance of Grid Connected Solar PV Power Plant at Clear Sky Day
ijtsrd
 
Vitiligo Treated Homoeopathically A Case Report
Vitiligo Treated Homoeopathically A Case ReportVitiligo Treated Homoeopathically A Case Report
Vitiligo Treated Homoeopathically A Case Report
ijtsrd
 
Vitiligo Treated Homoeopathically A Case Report
Vitiligo Treated Homoeopathically A Case ReportVitiligo Treated Homoeopathically A Case Report
Vitiligo Treated Homoeopathically A Case Report
ijtsrd
 
Uterine Fibroids Homoeopathic Perspectives
Uterine Fibroids Homoeopathic PerspectivesUterine Fibroids Homoeopathic Perspectives
Uterine Fibroids Homoeopathic Perspectives
ijtsrd
 
Ad

Recently uploaded (20)

Stein, Hunt, Green letter to Congress April 2025
Stein, Hunt, Green letter to Congress April 2025Stein, Hunt, Green letter to Congress April 2025
Stein, Hunt, Green letter to Congress April 2025
Mebane Rash
 
APM Midlands Region April 2025 Sacha Hind Circulated.pdf
APM Midlands Region April 2025 Sacha Hind Circulated.pdfAPM Midlands Region April 2025 Sacha Hind Circulated.pdf
APM Midlands Region April 2025 Sacha Hind Circulated.pdf
Association for Project Management
 
03#UNTAGGED. Generosity in architecture.
03#UNTAGGED. Generosity in architecture.03#UNTAGGED. Generosity in architecture.
03#UNTAGGED. Generosity in architecture.
MCH
 
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public SchoolsK12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
dogden2
 
Introduction-to-Communication-and-Media-Studies-1736283331.pdf
Introduction-to-Communication-and-Media-Studies-1736283331.pdfIntroduction-to-Communication-and-Media-Studies-1736283331.pdf
Introduction-to-Communication-and-Media-Studies-1736283331.pdf
james5028
 
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - WorksheetCBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
Sritoma Majumder
 
Sugar-Sensing Mechanism in plants....pptx
Sugar-Sensing Mechanism in plants....pptxSugar-Sensing Mechanism in plants....pptx
Sugar-Sensing Mechanism in plants....pptx
Dr. Renu Jangid
 
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
larencebapu132
 
How to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odooHow to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odoo
Celine George
 
Presentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem KayaPresentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem Kaya
MIPLM
 
Introduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe EngineeringIntroduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe Engineering
Damian T. Gordon
 
Understanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s GuideUnderstanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s Guide
GS Virdi
 
"Basics of Heterocyclic Compounds and Their Naming Rules"
"Basics of Heterocyclic Compounds and Their Naming Rules""Basics of Heterocyclic Compounds and Their Naming Rules"
"Basics of Heterocyclic Compounds and Their Naming Rules"
rupalinirmalbpharm
 
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar RabbiPresentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Md Shaifullar Rabbi
 
How to Manage Purchase Alternatives in Odoo 18
How to Manage Purchase Alternatives in Odoo 18How to Manage Purchase Alternatives in Odoo 18
How to Manage Purchase Alternatives in Odoo 18
Celine George
 
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptxSCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
Ronisha Das
 
Sinhala_Male_Names.pdf Sinhala_Male_Name
Sinhala_Male_Names.pdf Sinhala_Male_NameSinhala_Male_Names.pdf Sinhala_Male_Name
Sinhala_Male_Names.pdf Sinhala_Male_Name
keshanf79
 
2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx
contactwilliamm2546
 
Engage Donors Through Powerful Storytelling.pdf
Engage Donors Through Powerful Storytelling.pdfEngage Donors Through Powerful Storytelling.pdf
Engage Donors Through Powerful Storytelling.pdf
TechSoup
 
Odoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo SlidesOdoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo Slides
Celine George
 
Stein, Hunt, Green letter to Congress April 2025
Stein, Hunt, Green letter to Congress April 2025Stein, Hunt, Green letter to Congress April 2025
Stein, Hunt, Green letter to Congress April 2025
Mebane Rash
 
03#UNTAGGED. Generosity in architecture.
03#UNTAGGED. Generosity in architecture.03#UNTAGGED. Generosity in architecture.
03#UNTAGGED. Generosity in architecture.
MCH
 
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public SchoolsK12 Tableau Tuesday  - Algebra Equity and Access in Atlanta Public Schools
K12 Tableau Tuesday - Algebra Equity and Access in Atlanta Public Schools
dogden2
 
Introduction-to-Communication-and-Media-Studies-1736283331.pdf
Introduction-to-Communication-and-Media-Studies-1736283331.pdfIntroduction-to-Communication-and-Media-Studies-1736283331.pdf
Introduction-to-Communication-and-Media-Studies-1736283331.pdf
james5028
 
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - WorksheetCBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
CBSE - Grade 8 - Science - Chemistry - Metals and Non Metals - Worksheet
Sritoma Majumder
 
Sugar-Sensing Mechanism in plants....pptx
Sugar-Sensing Mechanism in plants....pptxSugar-Sensing Mechanism in plants....pptx
Sugar-Sensing Mechanism in plants....pptx
Dr. Renu Jangid
 
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
World war-1(Causes & impacts at a glance) PPT by Simanchala Sarab(BABed,sem-4...
larencebapu132
 
How to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odooHow to Set warnings for invoicing specific customers in odoo
How to Set warnings for invoicing specific customers in odoo
Celine George
 
Presentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem KayaPresentation of the MIPLM subject matter expert Erdem Kaya
Presentation of the MIPLM subject matter expert Erdem Kaya
MIPLM
 
Introduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe EngineeringIntroduction to Vibe Coding and Vibe Engineering
Introduction to Vibe Coding and Vibe Engineering
Damian T. Gordon
 
Understanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s GuideUnderstanding P–N Junction Semiconductors: A Beginner’s Guide
Understanding P–N Junction Semiconductors: A Beginner’s Guide
GS Virdi
 
"Basics of Heterocyclic Compounds and Their Naming Rules"
"Basics of Heterocyclic Compounds and Their Naming Rules""Basics of Heterocyclic Compounds and Their Naming Rules"
"Basics of Heterocyclic Compounds and Their Naming Rules"
rupalinirmalbpharm
 
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar RabbiPresentation on Tourism Product Development By Md Shaifullar Rabbi
Presentation on Tourism Product Development By Md Shaifullar Rabbi
Md Shaifullar Rabbi
 
How to Manage Purchase Alternatives in Odoo 18
How to Manage Purchase Alternatives in Odoo 18How to Manage Purchase Alternatives in Odoo 18
How to Manage Purchase Alternatives in Odoo 18
Celine George
 
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptxSCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
SCI BIZ TECH QUIZ (OPEN) PRELIMS XTASY 2025.pptx
Ronisha Das
 
Sinhala_Male_Names.pdf Sinhala_Male_Name
Sinhala_Male_Names.pdf Sinhala_Male_NameSinhala_Male_Names.pdf Sinhala_Male_Name
Sinhala_Male_Names.pdf Sinhala_Male_Name
keshanf79
 
2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx2541William_McCollough_DigitalDetox.docx
2541William_McCollough_DigitalDetox.docx
contactwilliamm2546
 
Engage Donors Through Powerful Storytelling.pdf
Engage Donors Through Powerful Storytelling.pdfEngage Donors Through Powerful Storytelling.pdf
Engage Donors Through Powerful Storytelling.pdf
TechSoup
 
Odoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo SlidesOdoo Inventory Rules and Routes v17 - Odoo Slides
Odoo Inventory Rules and Routes v17 - Odoo Slides
Celine George
 

Grid-Based Multipath with Congestion Avoidance Routing Protocol

  • 1. International Journal of Trend in Scientific Research and Development, Volume 1(3), ISSN: 2456-6470 www.ijtsrd.com IJTSRD | Mar-Apr 2017 Available [email protected] 10 Grid-Based Multipath with Congestion Avoidance Routing Protocol Dr. Atul M Gosai1 ,Lakshdeep M Raval2 1 Associate Professor, 2 Ph.D Scholar, 1,2 Department of Computer Science, Saurashtra University, Rajkot, Gujarat. India. Abstract— This Paper gives information about Grid base multipath wireless sensor network. We give a brief introduction about wireless sensor network, how sensor works in this network. How the Routing is done and if there is congestion detected in sensors networks and then how it can be solved. Routing protocols are also classified in several types like Proactive, Reactive, and Hybrid in also given here the details of that. Also here we describe various routing techniques like Traditional and Current techniques. In flooding based techniques, sensor broadcast the information and the destination sensor receives that information. In gossiping techniques, sensor sends information to neighbour sensor and so on. In this paper we also see that if any sensor id dies due to lack of power or any other problems then another path will be routed. Routing protocols are having 3 types Flat routing, Hierarchical routing and Location based routing. In Flat routing SPIN,DD, Rumor routing, etc protocols are used. In hierarchical routing LEACH, PEGASIS, TEEN protocols are used. Now a day LEACH and PEGASIS are widely used in cluster base Wireless Sensor Network. In leach protocol reduced the path using cluster head formulation in this method randomly any sensor make the cluster head n send messages in the network. In pegasis protocol use chaining concept and find the best path from base station to the destination station. PEGASIS and LEACH provide best routing techniques in wireless sensor network but they also have some disadvantages. We also differentiate flat and hierarchical routing techniques in which case which one gives best performances. Here we introduce the readers to Location based routing protocols GEAR and how it route the path is also briefly described here. Keywords— Wireless Sensor Network protocols, GMCAR, Flooding, Gossiping, SPIN,LEACH, PEGASIS, TEEN I. INTRODUCTION Wireless sensor networks (WSN) are a specially distributed network that is composed of lots of sensor nodes. It is always deployed in a special area to complete a task of sensing and monitoring. There are many technical challenges associated with sensor networks, such as self-organizing algorithm, energy-efficient routing protocols, data aggregation technology and network lifetime improvements. The energy for sensor networks is very important. It is infeasible to replace battery of sensor. Therefore, conserving energy so as to prolong the network lifetime is becoming one of the key challenges. Recent researches have addressed these topics, such as power-aware channel access, routing and broadcasting, data aggregation protocol and so on[8, 16] In this Paper we discuss the how to Sensor Routes the path of destination in wireless network. Traditional Routing techniques like Flooding and Gossiping and also discussed during current routing techniques like Flat routing Techniques, Hierarchical routing Techniques and Location based routing Techniques followed by how congestion is avoided in WSN. Section I is Introduction followed by Section II giving brief about WSN followed by classification of routing protocols and discussing about traditional and current routing algorithms in section III, IV and V. Further, we show our results before conclusion in Section VI followed by Acknowledgement and References in Section VII and VIII. II. WIRELESS SENSOR NETWORK Wireless grids are wireless computer networks consisting of different category of electronic devices with the ability to share their resources with any other device in the network in an ad hoc comportment. A definition of the wireless grid can be given as: "Ad hoc, distributed resource-sharing networks between Different wireless devices. The following key characteristics further clarify this concept: • No centralized control • Small, low powered devices • Heterogeneous applications and interfaces • Dynamic and unstable users / resources A wireless sensor network (WSN)autonomous sensors are also keep an eye on physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants and to cooperatively pass their data through the network to a main Machine. [2] The WSN is built of "nodes" from a few to several hundreds or even thousands, where each node is connected to one or sometimes several sensors. Every node contains several parts like radio transceiver, micro-controller, electronic circuit and battery for power supply. The cost of sensor nodes is depending on the energy, memory, computational speed and communications bandwidth. One of the biggest limitations of the wired grid is that clients are forced to be in aunchangingstatic location as the devices they make use of are to be stiff wired to the grid at all times. This also has a negative influence on the flexibility and scalability of the grid; devices can only connect the grid in locations where the prospective chances exists to physically connect the device to the grid.[1,4] Here we show in below figure that how sensors work in WSN.
  • 2. International Journal of Trend in Scientific Research and Development, Volume 1(3), ISSN: 2456-6470 www.ijtsrd.com IJTSRD | Mar-Apr 2017 Available [email protected] 11 Figure1: Flowchart explaining working of wireless sensor networks. III.CLASSIFICATION OF ROUTING PROTOCOLS Routing protocols are mainly classified in 3 types are as follows: 1. Proactive, 2. Reactive, and 3. Hybrid Here we Show all the Classification in details. 1) Proactive: In a Proactive Protocol the nodes button on their sensors and transmitters, sense the surroundings and convey the information to a BS through the predefined direction. e.g. The Low Energy Adaptive Clustering hierarchy protocol (LEACH) utilizes this sort of protocol. 2) Reactive : If there are impulsive changes in the sensed attribute away from some pre-determined threshold value, the nodes instantly react. This type of protocol is used in instance critical applications. e.g. The Threshold sensitive Energy Efficient sensor Network (TEEN) is an example of a reactive protocol. 3) Hybrid : Hybrid protocols integrate both proactive and reactive concepts. They first compute the entire available routes and then improve the routes at the time of routing. e.g. Adaptive Periodic TEEN(APTEEN) is this type of protocol. IV.TRADITIONAL ROUTING TECHNIQUES The Traditional Routing Techniques are also classified as follows: 1. Flooding and 2. Gossiping Here we Show Both Techniques in details are as follow; 1) Flooding: One line of attack is each sensor node broadcast data packet to its neighbours Sensors and this process carry on till the data packet reaches the destination node. If the maximum hop count of the packet is not reached and node itself is not the destination of the packet, this process continues. This technique does not require complex topology maintenance nor route discovery algorithms. Flooding in presence of all the good points does carry following disadvantages: 1. Implosion: This is circumstances when replica messages are sent to the same node. This occurs when a node receives carbon copy of the same message from many of its neighbors. 2. Overlap : The same incident may be sensed by more than one node by reason of over lapping of regions of coverage. This results in their neighbors receiving duplicate reports of the same incident. 3. Resource Blindness : The flooding protocol does not reflect on the available energy at the nodes and results in many surplus transmissions. So it reduces the network lifetime. 2) Gossiping: Gossiping is modified version of flooding, where the nodes do not broadcast a packet, but send packets to a randomly selected neighbor. This evades the trouble happening due to Implosion. It takes a long time for a message to propagate throughout the network. Though gossiping has considerably lower overhead than flooding, it does not give any assurance that all nodes of the network will receive the message. It relies on the random neighbor selection to in due course propagate the message throughout the network. The Sensor node transmits the data packet to a randomly chosen neighbor which in turn selects an additional random neighbor until the destination node is reached. V. CURRENT ROUTING TECHNIQUES In Traditional Routing Techniques there are quite a few Drawbacks similar to an Implosion, overlap of packets, resource Blindness etc. To overcome all the disadvantages of the Traditional Routing techniques other routing techniques
  • 3. International Journal of Trend in Scientific Research and Development, Volume 1(3), ISSN: 2456-6470 www.ijtsrd.com IJTSRD | Mar-Apr 2017 Available [email protected] 12 and algorithm need to beintroduced and developed that will make use of a dynamic path and generate dynamic routing table in accordance with the density of network traffic and will be capable of finding the best path. Current Routing Techniques makes use of Classical mechanisms to relay data in sensor networks without the need for any routing algorithms and topology maintenance. Current Routing Techniques which are used in now a days for Routing in Networks are classified as follows: 1. Flat Routing a. SPIN (Sensor Protocols for Information Via Navigation), b. DD (Directed Diffusion), and c. Rumor Routing 2. Hierarchical Routing a. LEACH (Low Energy Adaptive Clustering Hierarchical ) protocols, b. PEGASIS (Power Efficient Gathering In Sensor Information System) Protocols, c. TEEN or APTEEN (Threshold-Sensitive Energy Efficient) Protocols. 3. Location Based Routing a. GEAR (Geographical and Energy Aware Routing) Protocols, b. GEM Now we give details about the working of all protocols: 1. Flat Routing: Flat routing protocols are primarily those protocols that don’t work under a predefined network layout and parameter. They facilitate the delivery of packets among routers through whichever available path without considering network hierarchy, distribution and composition. In the case of Flat Routing Techniques protocols, if any node needs to transmit data, it first searches for a valid available route to the Base Station and then transmits the data. Nodes around the base station may drain their energy quickly during this process. Here we discuss some Flat Routing Protocols, that are as follows: a. SPIN: SPIN stands for Sensor Protocols for Information via Navigation. SPIN belongs to a family of adaptive protocols also known as Sensor Protocols for Information via Negotiation. It assigns a high-level name to completely describe their collection of information called meta-data. SPIN has three types of messages: ADV,REQ, and DATA. A sensor node broadcasts an ADV containing meta-data describing actual data. If a neighbor is interested in the data, it sends REQ for the data. Only then the sensor node sends the actual DATA to the neighbor. The neighbor again sends ADVs to its neighbors and this process continues to disseminate the data throughout over the network. The simple version is shown in figure given below in figure 2. Figure 2: Data passing strategy in SPIN Routing Techniques. In SPIN protocols topological changes are confined to a small area. SPIN protocol provides supplementary energy savings than flooding, and metadata negotiation more or less halves the redundant data. The main Drawback of SPIN is data advertisement mechanism cannot guarantee reliable delivery of data. b. DD: Direct Diffusion. DD protocols stands for Directed Diffusion.This protocol is helpful in scenario where the sensor nodes themselves generate requests or queries for data sensed by other nodes, instead of all queries arising only from a Base station. Hence the sink for the query could be a BS or a sensor node. The direct diffusion routing protocol improves on data diffusion using interest gradients. Each sensor node names its data with one or more attributes and other nodes express their interest depending on these attributes. Attribute value pairs can be used to describe an interest in intrusion data. Directed diffusion differs from SPIN in two aspects. i. Query method ii. Communication Method. In Directed diffusion Techniques data can be send by 3 ways are as follows: i. Propagate Interest ii. Set up Gradients iii. Through Reinforcement
  • 4. International Journal of Trend in Scientific Research and Development, Volume 1(3), ISSN: 2456-6470 www.ijtsrd.com IJTSRD | Mar-Apr 2017 Available [email protected] 13 Figure 3: Data passing procedure in DD Routing Techniques. Directed diffusion may not be applied to all the applications (e.g., environmental monitoring).In Direct Diffusion Techniques Matching data to queries might require some extra overhead. c. Rumor Routing: Rumor Routing is an agent supported path creation algorithm. Agents are long-lived entities created at random by nodes. These are basically packets which are circulated in the network to establish shortest path to entities that they encounter across the network. They can also perform path optimizations for connection with the nodes they visit. When agent finds a node whose path to an event is longer than its own, it updates the nodes routing table. Figure 4: The way Data pass in Rumor Routing Techniques. 2. Hierarchical Routing: Hierarchical routing is efficient to execute energy efficient routing, i.e., higher energy nodes can be used to route and send the information; low energy nodes are used to perform the sensing in the area of interest [10].Hierarchical Routing Techniques are classified as follows: a. LEACH: LEACH stands for Low Energy Adaptive Clustering Hierarchical protocols. LEACH is the earliest proposed single- hop clustering routing protocol in WSN. It can save the network energy greatly compared with the non-cluster routing algorithm. A lot of other clustering algorithms are projected based on LEACH, such as TEEN (Threshold Sensitive Energy Efficient Sensor Network Protocol), PEGASIS(Power Efficient Gathering in Sensor Information Systems),HEED (Hybrid Energy-Efficient Distributed Clustering) and so on.[15] In LEACH code of behavior, all clusters are self-organized; where every cluster holds back a cluster-head and several non- clusters head nodes. Cluster-head node drinks more energy than non-cluster head nodes. With the intention of balancing network energy expenditure and prolonging the network life cycle, it selects cluster head randomly and each node has an equal chance to be cluster-head. The cluster constitution update continuously in operation and one updating process is called a round. The cycle of each round contains two stages: set-up phase and steady-state phase, set-up phase is the establishment phase of a cluster; steady-state phase is the stable data transfer phase. Set-up phase each node generates a random number between 0 to 1, and compares this number with the threshold value T(n) .If the number is less than T(n) , the node is selected as a cluster-head.[2] Once the cluster-head is determined, the cluster-head sends a broadcast message to the network, announced itself as the cluster head; each normal node make a decision which cluster to unite with, in according to the signal strength of the received message, sends a request message to the corresponding cluster- head. The cluster-head receives all the messages sent by the nodes that would like to join in the cluster, confirms them as members of the cluster, then joins them in the routing table and allocates TDMA table of slots for the cluster members telling each member at what time it can transmit data.[3,9,11] A LEACH protocol is all about progress towards enhancement of node energy and position information to improve the LEACH algorithm, proposes energy balanced clustering algorithm named L-LEACH and LEACH-C.
  • 5. International Journal of Trend in Scientific Research and Development, Volume 1(3), ISSN: 2456-6470 www.ijtsrd.com IJTSRD | Mar-Apr 2017 Available [email protected] 14 Figure 5: Diff between LEACH And LEACH-C. In above figure we can see that LEACH distributes more data per unit energy than MTE. LEACH-C delivers 40% more data per unit energy than LEACH.LEACH and LEACH-C’s nodes lifetime is much longer than MTE’s. LEACH can deliver 10 times the amount of effective data to the BS for the same number of node deaths[5]. Figure 6: Comparison between SPIN,LEACH and DD. LEACH protocol has a relatively good function in energy consumption through dynamic clustering, keeps the data transmission in cluster which reduces the energy consumption by communicating directly between nodes and the base station, but there are still a lot of inadequacies. The LEACH protocol uses the mechanism of cluster-head rotation, elects cluster- head randomly, after several rounds of data transmission, the residual energy of the nodes will have a great difference, cluster-head or the nodes which are far from the base station will consume more energy. When transmitting data of the same length relatively, if they are selected as cluster-heads after that, they will run out of energy and become invalid. Once the number of invalid nodes increases, it’ll have a great influence in the network performance and shorten the life of the network. Cluster member nodes select the optimal cluster-head based on the received signal intensity to join in; do not consider the distance from the node itself to the base station, but considers the distance to be covered between cluster-head and the base station. So normal node may chose the cluster-head that is far away from base station as its optimal cluster-head, this not only is the heavy burden to the cluster-head but also increases the extra energy consumption, which is not beneficial to balance network energy consumption. The protocol assumes that all nodes begin with the same quantity of energy capacity in each election round, assuming that being a CH consumes approximately the same amount of energy for each node.[7,9] b. PEGASIS: PEGASIS is stands for Power-Efficient Gathering in Sensor Information Systems. It is an algorithm based on chain, which uses greedy algorithm to form data chain. Each node aggregates data from downstream node and sends it to upstream node along the chain.[15, 16] PEGASIS has some advantages when compared with LEACH: It eradicate the overhead in dynamic formation of cluster; the distance between nodes on chain is much shorter than from nodes to cluster heading LEACH and so on. Therefore, PEGASIS can save much energy. In PEGASIS, each node communicates only with a close neighbor and takes turns transmitting to the base station, thus reducing the amount of energy spent per round. Simulation results show that PEGASIS performs better than LEACH by about 100% to 300% when 1%, 20%, 50%, and 100% of nodes die for different network sizes and topologies. Although PEGASIS has better performance, it also has a shortcoming: using greedy algorithm to construct chain, which will result in distance between a pair of sensors that becomes too long. In this condition, this pair of sensors will consume much energy than other sensors in transmitting data phase. Thus, they may probably die early.[12] Chain construction to construct the chain we start from the farthest node from the base station, and then greed approach is used to construct the chain. Leader of each round is selected randomly. If N is number of node as selected as head node for some round randomly selecting head node also provides benefit as it is more likely for nodes to die at random locations thus providing robust network.When a node dies chain is reconstructed to bypass the dead node.Head node receives all the fused data and sends to the BS.[13] Figure 7: Chaining Process in PEGASIS In chaining process, a node will consider average distance of formed chain. If the distance from neighboring node to its upstream node is longer than distance thresh (the distance thresh can obtain from average distance of formed chain), the closest node is a "farnode". If the closest node joins the chain, it will emerge as a "long chain". In this condition, the "far node" will search a nearer node over the formed chain. Through this method, the new protocol EB-PEGASIS can avoid "long chain" effectively. It not only save energy on sensors, but also balance the energy consumption of all sensornodes. In below Image we can See that the Percentage of nodes demise during the transmission. This is a Performance result for 100m*100m Network with initial energy 5J/Node.
  • 6. International Journal of Trend in Scientific Research and Development, Volume 1(3), ISSN: 2456-6470 www.ijtsrd.com IJTSRD | Mar-Apr 2017 Available [email protected] 15 Figure 8: Performance chart of nodes death in different Protocols. The Disadvantages of PEGASIS protocol is only that PEGASIS assumes each sensor node is competent to communicate with the BS directly. We assume that all sensor nodes have the same level of energy and are likely to die at the same time [16]. c. TEEN: TEEN is stands for Threshold-Sensitive Energy Efficient Protocols. TEEN’S CH sensor sends its members a hard threshold and a soft threshold. TEEN’S appropriateness for time-critical sensing applications is admirable. TEEN is also quite resourceful in terms of energy consumption and response time. TEEN also allows the user to manage the energy consumption with precision to suit the application. In below figure we show comparison of other protocols with TEEN protocols in the terms of Energy verses number of Nodes. Figure 9: Comparison of all protocols in term of energy they used. In above figure we show that the TEEN consume awfully less energy in contrast to the LEACH and LEACH-c Protocols. So the Life of nodes and network will be extended and performance will be in good health. In below figure we can see that Compare to Other Protocols in TEEN nodes can alive for long time because in TEEN protocols Energy is not wasted by nodes. Figure 10: Comparison of all protocols in term of Nodes are alive. In below table the differences between flat Routing and Hierarchical routing techniques are given. Flat Routing Hierarchical Routing Contention-based routing reservation-based scheduling Collision overhead present Collisions avoided Variable duty cycle by controlling sleep time of nodes Reduced duty cycle due to periodic sleeping Node on multi hop path aggregates incoming data from neighbours Data aggregation by clusterhead Routing can be made optimal but within added complexity Simple but non-optimal routing Links formed on the fly without synchronization Requires global and local synchronization Routes formed only in regions that have data for transmission Overhead of cluster formation throughout the network Latency in waking up intermediate nodes and setting up the multipath Lower latency as multiple hops network formed by cluster-heads always available Energy dissipation depends on traffic patterns Energy dissipation is uniform Energy dissipation adapts to traffic pattern Energy dissipation cannot be controlled Fairness not guaranteed Far channel allocation 3. Location-based routing: Location based routing protocols need some location information of the sensor nodes. Location information can be obtained from GPS (Global Positioning System) signals,
  • 7. International Journal of Trend in Scientific Research and Development, Volume 1(3), ISSN: 2456-6470 www.ijtsrd.com IJTSRD | Mar-Apr 2017 Available [email protected] 16 received radio signal strength, etc. Using location information, an optimal path can be formed without using flooding techniques.Location Based Routing algorithms are classified as follows: a. GEAR: GEAR stands for Geographic and Energy Aware Routing protocols. The key scheme is to confine the number of interests in directed diffusion by only considering a certain region rather than sending the interests to the whole network. GEAR protocol keeps an estimated cost and a learning cost balanced and under the edge. b. GPRS: One another Protocols are GPSR, which is designed for general mobile ad hoc networks. It has two parameters, Uniform Traffic and Non-uniform Traffic. For uneven traffic distribution, GEAR delivers 70–80 percent more packets than GPSR. For uniform traffic pairs GEAR delivers 25–35 percent more packets than GPSR.[14] VI.CONCLUSION In this research we have described the Grid base multipath congestion avoidance protocols where, we also discussed different types of protocols that are used in wireless sensor network for routing and avoiding congestion. We also shown, how it will pick the finest path for transporting the packet data from numerous routes. We also described protocols that will choosesuperlative path for sending data from base station to destination other than normally opted. In this paper we also compared all the protocols on the basis of common aspect of the power consumption and energy draining behavior. We gave comparative analysis based on the way nodes are used and the remaining energy left before nodes die because of issues like instability, delay, interference and continuous scanning for the networks. VII. REFERENCES [1] Robert AklandUttarasawant, Grid-based Coordinated Routing in Wireless Sensor Networks. [2] M.J.Handy,M.Haase,D.Timmermann,Low Energy Adaptive Clustring Hierarchy with Deterministic Cluster-Head Selection [3] QianLiao,HaoZhu,An Energy Balanced Clusterin Algorithm Based on LEACH Protocol [4] Mohammad asumuzzamanBhuiyan,IqbalGondalJoarderKamruzzaman,Location Aided Congestion Awae Routing in Wireless Sensor Networks [5] MortazaFahimiKhatonAbad,Mohammad Ali jabraeiljamali,Modify LEACH Algorithm for Wireless Sensor Network [6] Majid I. Khan,Congestion Avoidance and Energy Efficient Routing Protocol for Wireless Sensor Networks with a Mobile Sink [7] JaewonKang,BadriNath,YanyongZhang,Shengchaoyu, Adaptive Resource Control Scheme to Alleviate Congestion in Sensor Netwotks [8] Lucian Popa,CostinRaiciu,IonStoica,David S. Rosenblum, Redusing Congestion Effects inWireless Networks by Multipath Routing [9] Mark A.Perillo,wendiB.Heinzelman, Wireless Sensor Network Prorocols [10] Bharat Bhargava, Self-Adjusting Congestion Avoidance Routing Protocol for Ad-Hoc Networks [11] SinemColeriErgen and PravinVaraiya, TDMA Scheduling Algorithms for Wireless Sensor Networks [12] LindseyS:PEGASIS,comput.Syat.Res.Dept.Aeroap.Corp.Angeles.CA.US A.IEEE Xplore [13] Jayashree A,G. S. Biradar,V.D.Mytri, Review of Multipath Routing Protocols in Wireless Multimedia Sensor Network –A Survey [14] N.NarasimhaDatta and K.Gopinath, A survey of routing algorithms for wireless sensor networks [15] Al-Karaki, J. N. and A. E. Kamal, "Routing Techniques in Wireless Sensor Networks: A Survey", IEEE Wireless Communications, Volume 11, No. 6, Dec. 2004, pp. 6--28. [16] Shagan Paul Kaur, Mrs.Amandeep Kaur, Review of Power-Efficient Gathering in Sensor Information System(PEGASIS) for Network Optimization in WSN, International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE), Volume 4, Issue 6, June 2014, Pg no. 872 - 877.