SlideShare a Scribd company logo
1
Protocols for Wireless
Sensor Networks
By: Debabrata Singh
Dept. of CSIT,ITER
SOA University, Bhubaneswar
Mail: debabratasingh@soa.ac.in
2
Outline
 Introduction
 Flat Routing Protocols
 Directed Diffusion
 SPIN(Sensor Protocol for Information via Negotiation. )
 Hierarchical Routing Protocols
 LEACH(Low-energy adaptive clustering hierarchy)
 PEGASIS(Power Efficient Gathering in Sensor Information
Systems )
 TEEN(Threshold-sensitive energy efficient sensor network
(TEEN))
 Topic for Discussion
 References
3
Introduction to WSNs
 A sensor network is a computer network of
many, spacially distributed devices using
sensors to monitor conditions at different
locations.
 Involve three areas: sensing,
communications, and computation.
4
Introduction to WSNs
 Sensor nodes scattered in a sensor field
 Each nodes has the capabilities to collect data and route data
back to the sink (Base Station).
 Protocols and algorithms with self-organization capabilities.
5
Introduction - WSNs Topology
 Issues related to topology maintenance and change in
three phases:
 Pre-deployment and deployment phase:
 Sensor nodes can be either thrown in mass or placed one by one in
the sensor field.
 Post-deployment phase:
 Topology changes are due to change nodes' position, reachability,
available energy, malfunctioning, and task details.
 Re-deployment of additional nodes phase:
 Additional sensor nodes can be redeployed at any time to replace
malfunctioning nodes or due to changes in task dynamics.
6
Types of Routing Protocol for WSN
 Single-hop Networks
 The network consists of n nodes, and packets are
transmitted from sources to destinations directly.
 Multi-hop Networks
 The final destination of a packet might not be reached
directly and the other nodes can be used to route the
packet to the final destination.
7
Flat Routing Protocols
 Flat Networks
 Every incoming packet is sent out on every
outgoing line except the one it arrived on.
 Vast numbers of duplicate packets are
generated.
 Routing Protocols: Directed Diffusion, SPIN.
8
The Directed Diffusion Protocol
 Directed Diffusion consists of several
elements:
Interests
Data messages
Gradients
Reinforcements
9
Directed Diffusion - Interest
Propagation
 The sink periodically
broadcasts an interest
message to each of its
neighbors.
 Every node maintains
an interest cache.
10
Directed Diffusion - Gradient
Establishment
 That every pair of
neighboring nodes
establishes a gradient
toward each other.
 This technique can
enable fast recovery
from failed paths or
reinforcement of
empirically better paths.
11
Directed Diffusion - Data
Propagation
 A sensor node that detects a target, it
computes the highest requested event rate
among all its outgoing gradients.
 To resend a received data message, a
node needs to examine the matching
interest entry's gradient list.
12
Directed Diffusion - Reinforcement
 The node might choose
that neighbor from
whom it first received
the latest event
matching the interest to
reinforce.
 It is very reactive to
changes in path quality.
13
The SPIN Protocol
 Sensor Protocols for Information via
Negotiation.
 Start with a source node sending its data
to all of its neighbors.
14
SPIN - Flooding deficiencies
 Implosion & Overlap
(a)
(a)
(a)
A
B C
D
(a)
(r, s)(q, r)
A B
C
q s
r
Implosion Problem Overlap Problem
15
SPIN-1 - three types of messages
 ADV
 When a SPIN node has data to share, it can advertise
an ADV message containing meta-data.
 REQ
 A SPIN node sends an REQ message when it wishes
to receive some actual data.
 DATA
 DATA messages contain actual sensor data with a
meta-data header.
16
ADVREQ
The SPIN-1 Protocol
 Steps
B A
C
D
E
F
DATA
ADV
ADV
ADV
ADVREQ
REQ
DATA
DATA
17
The SPIN-2 Protocol
 When energy is plentiful, SPIN-2 nodes
communicate using the same 3-stage
protocol as SPIN-1 nodes.
 When a SPIN-2 node observes that its
energy is approaching a low-energy
threshold, it adapts by reducing its
participation in the protocol.
18
Hierarchical Routing Protocols
 Hierarchical Networks
The main aim of hierarchical routing is to
efficiently maintain the energy consumption of
sensor nodes.
Performing data aggregation and fusion in
order to decrease the number of transmitted
messages to the sink.
Routing Protocols: LEACH, PEGASIS, TEEN.
19
The LEACH Protocol
 Low-Energy Adaptive Clustering Hierarchy.
 Distributed cluster formation technique
that enables self-organization of large
numbers of nodes.
20
LEACH - Cluster
 Algorithms for adapting clusters and rotating cluster
head positions to evenly distribute the energy load
among all the nodes.
 The nodes organize themselves into local clusters, with
one node acting as the cluster head.
 The cluster head performs signal processing functions
on the data, and transmits data to the remote BS.
21
LEACH - Set-up phase
 Cluster Head
 Each cluster head node broadcasts an advertisement
message (ADV) let all the other nodes that they have
chosen this role for the current round.
 Non-Cluster Head
 They transmits a join-request message (Join-REQ)
back to the chosen cluster head.
22
LEACH - Set-up phase
 The cluster head node sets up a TDMA
schedule and transmits this schedule to the
nodes in the cluster.
 Ensures that there are no collisions among data
messages.
 Allows the radio components to be turned off at
all times except during their transmit time.
23
LEACH - Steady-state phase
 Broken into frames, where nodes send
their data to the cluster head at most once
per frame during their allocated
transmission slot.
 Once the cluster head receives all the data,
it performs data aggregation.
24
LEACH - Time line
 Time line showing LEACH operation
NCH1 NCH2 … … … NCHm-1 NCHm
Slot for NCH2
Frame
ADV Join-REQ SCH
Set-up phase
25
The PEGASIS Protocol
 Power-Efficient GAthering in Sensor
Information Systems.
 The key idea in PEGASIS is to form a
chain among the sensor nodes so that
each node will receive from and
transmit to a close neighbor.
26
PEGASIS - Chain
 The nodes will be organized to form a
chain, which can either be accomplished
by the sensor nodes themselves using a
greedy algorithm starting from some node.
 When a node dies, the chain is
reconstructed in the same manner to
bypass the dead node.
27
PEGASIS - Leader
 The main idea in PEGASIS is for each node to
receive from and transmit to close neighbors
and take turns being the leader for transmission
to the BS.
 Nodes take turns transmitting to the BS, and we
will use node number i mod N (N represents the
number of nodes) to transmit to the BS in round i.
28
PEGASIS - Token
 Token passing approach
N0 N1 N2 N3 N4
BS
Token
Data
29
The TEEN Protocol
 Threshold sensitive Energy Efficient sensor Network
protocol.
 Proactive Protocols (LEACH)
 The nodes in this network periodically switch on their sensors
and transmitters, sense the environment and transmit the data of
interest.
 Reactive Protocols (TEEN)
 The nodes react immediately to sudden and drastic changes in
the value of a sensed attribute.
30
TEEN - Functioning
 At every cluster change time, the cluster-head
broadcasts to its members
 Hard Threshold (HT)
 This is a threshold value for the sensed attribute.
 It is the absolute value of the attribute beyond which, the
node sensing this value must switch on its transmitter and
report to its cluster head.
 Soft Threshold (ST)
 This is a small change in the value of the sensed attribute
which triggers the node to switch on its transmitter and
transmit.
31
TEEN - Hard Threshold
 The first time a parameter from the
attribute set reaches its hard threshold
value, the node switches on its transmitter
and sends the sensed data.
 The sensed value is stored in an internal
variable in the node, called the sensed
value (SV).
32
TEEN - Soft Threshold
 The nodes will next transmit data in the
current cluster period, only when both the
following conditions are true:
The current value of the sensed attribute is
greater than the hard threshold.
The current value of the sensed attribute
differs from SV by an amount equal to or
greater than the soft threshold.
33
TEEN - Drawback
 If the thresholds are not reached, the user
will not get any data from the network at all
and will not come to know even if all the
nodes die.
 This scheme practical implementation
would have to ensure that there are no
collisions in the cluster.
34
References
 I.F. Akyildiz, W. Su*, Y. Sankarasubramaniam, and E. Cayirci,
 "Wireless sensor networks: a survey".
 K. Akkaya, M. Younis,
 "A Survey on Routing Protocols for Wireless Sensor Networks".
 J.N. Al-Karaki, A.E. Kamal,
 "Routing Techniques in Wireless Sensor Networks".
 C. Intanagonwiwat, R. Govindan, and D. Estrin,
 "Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks".
 W. Heinzelman, J. Kulik, and H. Balakrishnan,
 "Adaptive Protocols for Information Dissemination in Wireless Sensor Networks".
 W. Heinzelman, A. Chandrakasan, and H. Balakrishnan,
 "An Application-Specific Protocol Architecture for Wireless Microsensor Networks".
 S. Lindsey and C. Raghavendra,
 "PEGASIS: Power-Efficient Gathering in Sensor Information Systems".
 A. Manjeshwar and D. Agrawal,
 "TEEN: A Routing Protocol for Enhanced Efficiency in Wireless Sensor Networks".
Ad

More Related Content

What's hot (20)

Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
DeepaDasarathan
 
Routing Protocols in WSN
Routing Protocols in WSNRouting Protocols in WSN
Routing Protocols in WSN
Darpan Dekivadiya
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
Yara Ali
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
Menaga Selvaraj
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
juno susi
 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocols
Darwin Nesakumar
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
Habibur Rahman
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-ppt
Swathi Ch
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
Mahbubur Rahman
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
ArunChokkalingam
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
rajivagarwal23dei
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
Chandra Meena
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
DeepaDasarathan
 
SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLS
juno susi
 
Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & Pegasis
ReenaShekar
 
Global state routing
Global state routingGlobal state routing
Global state routing
Tata Consultancy Service Limited
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
PeriyanayagiS
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
Virendra Thakur
 
Wsn 08
Wsn 08Wsn 08
Wsn 08
hinalala
 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
Darpan Dekivadiya
 
Energy consumption of wsn
Energy consumption of wsnEnergy consumption of wsn
Energy consumption of wsn
DeepaDasarathan
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
Yara Ali
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
Menaga Selvaraj
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
juno susi
 
Schedule and Contention based MAC protocols
Schedule and Contention based MAC protocolsSchedule and Contention based MAC protocols
Schedule and Contention based MAC protocols
Darwin Nesakumar
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
Habibur Rahman
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-ppt
Swathi Ch
 
Geographic Routing in WSN
Geographic Routing in WSNGeographic Routing in WSN
Geographic Routing in WSN
Mahbubur Rahman
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
ArunChokkalingam
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
rajivagarwal23dei
 
Lecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc networkLecture 5 6 .ad hoc network
Lecture 5 6 .ad hoc network
Chandra Meena
 
SENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLSSENSOR NETWORK PLATFORMS AND TOOLS
SENSOR NETWORK PLATFORMS AND TOOLS
juno susi
 
Sensor Networks Introduction and Architecture
Sensor Networks Introduction and ArchitectureSensor Networks Introduction and Architecture
Sensor Networks Introduction and Architecture
PeriyanayagiS
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
Virendra Thakur
 

Similar to Protocols for wireless sensor networks (20)

Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
ijsrd.com
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
IJERA Editor
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Editor IJCATR
 
D031202018023
D031202018023D031202018023
D031202018023
ijceronline
 
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkAnalysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
IJMER
 
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Alexander Decker
 
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
ijtsrd
 
Final PPT.pptx
Final PPT.pptxFinal PPT.pptx
Final PPT.pptx
ShrutiGupta858540
 
A04560105
A04560105A04560105
A04560105
IOSR-JEN
 
I04503075078
I04503075078I04503075078
I04503075078
ijceronline
 
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor Network
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor NetworkEnergy Efficient PEGASIS Routing Protocol in Wireless Sensor Network
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor Network
IRJET Journal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
ijsrd.com
 
Energy efficient routing_in_wireless_sensor_networks
Energy efficient routing_in_wireless_sensor_networksEnergy efficient routing_in_wireless_sensor_networks
Energy efficient routing_in_wireless_sensor_networks
Gr Patel
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
ijsrd.com
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEEC
Yogesh Fulara
 
Ppt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th semPpt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th sem
shikhathegreat
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
Elham Hormozi
 
Jm2416491652
Jm2416491652Jm2416491652
Jm2416491652
IJERA Editor
 
A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network
IJORCS
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
ijsrd.com
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Editor IJCATR
 
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor NetworkAnalysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
Analysis of Cluster Based Anycast Routing Protocol for Wireless Sensor Network
IJMER
 
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Alexander Decker
 
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
Energy Efficient Routing Strategies for Large Scale Wireless Sensor in Hetero...
ijtsrd
 
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor Network
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor NetworkEnergy Efficient PEGASIS Routing Protocol in Wireless Sensor Network
Energy Efficient PEGASIS Routing Protocol in Wireless Sensor Network
IRJET Journal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
ijsrd.com
 
Energy efficient routing_in_wireless_sensor_networks
Energy efficient routing_in_wireless_sensor_networksEnergy efficient routing_in_wireless_sensor_networks
Energy efficient routing_in_wireless_sensor_networks
Gr Patel
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
ijsrd.com
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEEC
Yogesh Fulara
 
Ppt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th semPpt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th sem
shikhathegreat
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
Elham Hormozi
 
A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network A Survey on Clustering Techniques for Wireless Sensor Network
A Survey on Clustering Techniques for Wireless Sensor Network
IJORCS
 
Ad

Recently uploaded (20)

Avnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights FlyerAvnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights Flyer
WillDavies22
 
Introduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptxIntroduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptx
AS1920
 
Raish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdfRaish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdf
RaishKhanji
 
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
inmishra17121973
 
15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...
IJCSES Journal
 
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptxExplainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
MahaveerVPandit
 
Compiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptxCompiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptx
RushaliDeshmukh2
 
Data Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptxData Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptx
RushaliDeshmukh2
 
Value Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous SecurityValue Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous Security
Marc Hornbeek
 
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdffive-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
AdityaSharma944496
 
fluke dealers in bangalore..............
fluke dealers in bangalore..............fluke dealers in bangalore..............
fluke dealers in bangalore..............
Haresh Vaswani
 
ELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdfELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdf
Shiju Jacob
 
Smart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineeringSmart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineering
rushikeshnavghare94
 
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design ThinkingDT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DhruvChotaliya2
 
introduction to machine learining for beginers
introduction to machine learining for beginersintroduction to machine learining for beginers
introduction to machine learining for beginers
JoydebSheet
 
some basics electrical and electronics knowledge
some basics electrical and electronics knowledgesome basics electrical and electronics knowledge
some basics electrical and electronics knowledge
nguyentrungdo88
 
Compiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptxCompiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptx
RushaliDeshmukh2
 
Artificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptxArtificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptx
aditichinar
 
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Journal of Soft Computing in Civil Engineering
 
π0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalizationπ0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalization
NABLAS株式会社
 
Avnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights FlyerAvnet Silica's PCIM 2025 Highlights Flyer
Avnet Silica's PCIM 2025 Highlights Flyer
WillDavies22
 
Introduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptxIntroduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptx
AS1920
 
Raish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdfRaish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdf
RaishKhanji
 
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
inmishra17121973
 
15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...
IJCSES Journal
 
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptxExplainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
MahaveerVPandit
 
Compiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptxCompiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptx
RushaliDeshmukh2
 
Data Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptxData Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptx
RushaliDeshmukh2
 
Value Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous SecurityValue Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous Security
Marc Hornbeek
 
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdffive-year-soluhhhhhhhhhhhhhhhhhtions.pdf
five-year-soluhhhhhhhhhhhhhhhhhtions.pdf
AdityaSharma944496
 
fluke dealers in bangalore..............
fluke dealers in bangalore..............fluke dealers in bangalore..............
fluke dealers in bangalore..............
Haresh Vaswani
 
ELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdfELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdf
Shiju Jacob
 
Smart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineeringSmart Storage Solutions.pptx for production engineering
Smart Storage Solutions.pptx for production engineering
rushikeshnavghare94
 
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design ThinkingDT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DhruvChotaliya2
 
introduction to machine learining for beginers
introduction to machine learining for beginersintroduction to machine learining for beginers
introduction to machine learining for beginers
JoydebSheet
 
some basics electrical and electronics knowledge
some basics electrical and electronics knowledgesome basics electrical and electronics knowledge
some basics electrical and electronics knowledge
nguyentrungdo88
 
Compiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptxCompiler Design_Lexical Analysis phase.pptx
Compiler Design_Lexical Analysis phase.pptx
RushaliDeshmukh2
 
Artificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptxArtificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptx
aditichinar
 
π0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalizationπ0.5: a Vision-Language-Action Model with Open-World Generalization
π0.5: a Vision-Language-Action Model with Open-World Generalization
NABLAS株式会社
 
Ad

Protocols for wireless sensor networks

  • 1. 1 Protocols for Wireless Sensor Networks By: Debabrata Singh Dept. of CSIT,ITER SOA University, Bhubaneswar Mail: [email protected]
  • 2. 2 Outline  Introduction  Flat Routing Protocols  Directed Diffusion  SPIN(Sensor Protocol for Information via Negotiation. )  Hierarchical Routing Protocols  LEACH(Low-energy adaptive clustering hierarchy)  PEGASIS(Power Efficient Gathering in Sensor Information Systems )  TEEN(Threshold-sensitive energy efficient sensor network (TEEN))  Topic for Discussion  References
  • 3. 3 Introduction to WSNs  A sensor network is a computer network of many, spacially distributed devices using sensors to monitor conditions at different locations.  Involve three areas: sensing, communications, and computation.
  • 4. 4 Introduction to WSNs  Sensor nodes scattered in a sensor field  Each nodes has the capabilities to collect data and route data back to the sink (Base Station).  Protocols and algorithms with self-organization capabilities.
  • 5. 5 Introduction - WSNs Topology  Issues related to topology maintenance and change in three phases:  Pre-deployment and deployment phase:  Sensor nodes can be either thrown in mass or placed one by one in the sensor field.  Post-deployment phase:  Topology changes are due to change nodes' position, reachability, available energy, malfunctioning, and task details.  Re-deployment of additional nodes phase:  Additional sensor nodes can be redeployed at any time to replace malfunctioning nodes or due to changes in task dynamics.
  • 6. 6 Types of Routing Protocol for WSN  Single-hop Networks  The network consists of n nodes, and packets are transmitted from sources to destinations directly.  Multi-hop Networks  The final destination of a packet might not be reached directly and the other nodes can be used to route the packet to the final destination.
  • 7. 7 Flat Routing Protocols  Flat Networks  Every incoming packet is sent out on every outgoing line except the one it arrived on.  Vast numbers of duplicate packets are generated.  Routing Protocols: Directed Diffusion, SPIN.
  • 8. 8 The Directed Diffusion Protocol  Directed Diffusion consists of several elements: Interests Data messages Gradients Reinforcements
  • 9. 9 Directed Diffusion - Interest Propagation  The sink periodically broadcasts an interest message to each of its neighbors.  Every node maintains an interest cache.
  • 10. 10 Directed Diffusion - Gradient Establishment  That every pair of neighboring nodes establishes a gradient toward each other.  This technique can enable fast recovery from failed paths or reinforcement of empirically better paths.
  • 11. 11 Directed Diffusion - Data Propagation  A sensor node that detects a target, it computes the highest requested event rate among all its outgoing gradients.  To resend a received data message, a node needs to examine the matching interest entry's gradient list.
  • 12. 12 Directed Diffusion - Reinforcement  The node might choose that neighbor from whom it first received the latest event matching the interest to reinforce.  It is very reactive to changes in path quality.
  • 13. 13 The SPIN Protocol  Sensor Protocols for Information via Negotiation.  Start with a source node sending its data to all of its neighbors.
  • 14. 14 SPIN - Flooding deficiencies  Implosion & Overlap (a) (a) (a) A B C D (a) (r, s)(q, r) A B C q s r Implosion Problem Overlap Problem
  • 15. 15 SPIN-1 - three types of messages  ADV  When a SPIN node has data to share, it can advertise an ADV message containing meta-data.  REQ  A SPIN node sends an REQ message when it wishes to receive some actual data.  DATA  DATA messages contain actual sensor data with a meta-data header.
  • 16. 16 ADVREQ The SPIN-1 Protocol  Steps B A C D E F DATA ADV ADV ADV ADVREQ REQ DATA DATA
  • 17. 17 The SPIN-2 Protocol  When energy is plentiful, SPIN-2 nodes communicate using the same 3-stage protocol as SPIN-1 nodes.  When a SPIN-2 node observes that its energy is approaching a low-energy threshold, it adapts by reducing its participation in the protocol.
  • 18. 18 Hierarchical Routing Protocols  Hierarchical Networks The main aim of hierarchical routing is to efficiently maintain the energy consumption of sensor nodes. Performing data aggregation and fusion in order to decrease the number of transmitted messages to the sink. Routing Protocols: LEACH, PEGASIS, TEEN.
  • 19. 19 The LEACH Protocol  Low-Energy Adaptive Clustering Hierarchy.  Distributed cluster formation technique that enables self-organization of large numbers of nodes.
  • 20. 20 LEACH - Cluster  Algorithms for adapting clusters and rotating cluster head positions to evenly distribute the energy load among all the nodes.  The nodes organize themselves into local clusters, with one node acting as the cluster head.  The cluster head performs signal processing functions on the data, and transmits data to the remote BS.
  • 21. 21 LEACH - Set-up phase  Cluster Head  Each cluster head node broadcasts an advertisement message (ADV) let all the other nodes that they have chosen this role for the current round.  Non-Cluster Head  They transmits a join-request message (Join-REQ) back to the chosen cluster head.
  • 22. 22 LEACH - Set-up phase  The cluster head node sets up a TDMA schedule and transmits this schedule to the nodes in the cluster.  Ensures that there are no collisions among data messages.  Allows the radio components to be turned off at all times except during their transmit time.
  • 23. 23 LEACH - Steady-state phase  Broken into frames, where nodes send their data to the cluster head at most once per frame during their allocated transmission slot.  Once the cluster head receives all the data, it performs data aggregation.
  • 24. 24 LEACH - Time line  Time line showing LEACH operation NCH1 NCH2 … … … NCHm-1 NCHm Slot for NCH2 Frame ADV Join-REQ SCH Set-up phase
  • 25. 25 The PEGASIS Protocol  Power-Efficient GAthering in Sensor Information Systems.  The key idea in PEGASIS is to form a chain among the sensor nodes so that each node will receive from and transmit to a close neighbor.
  • 26. 26 PEGASIS - Chain  The nodes will be organized to form a chain, which can either be accomplished by the sensor nodes themselves using a greedy algorithm starting from some node.  When a node dies, the chain is reconstructed in the same manner to bypass the dead node.
  • 27. 27 PEGASIS - Leader  The main idea in PEGASIS is for each node to receive from and transmit to close neighbors and take turns being the leader for transmission to the BS.  Nodes take turns transmitting to the BS, and we will use node number i mod N (N represents the number of nodes) to transmit to the BS in round i.
  • 28. 28 PEGASIS - Token  Token passing approach N0 N1 N2 N3 N4 BS Token Data
  • 29. 29 The TEEN Protocol  Threshold sensitive Energy Efficient sensor Network protocol.  Proactive Protocols (LEACH)  The nodes in this network periodically switch on their sensors and transmitters, sense the environment and transmit the data of interest.  Reactive Protocols (TEEN)  The nodes react immediately to sudden and drastic changes in the value of a sensed attribute.
  • 30. 30 TEEN - Functioning  At every cluster change time, the cluster-head broadcasts to its members  Hard Threshold (HT)  This is a threshold value for the sensed attribute.  It is the absolute value of the attribute beyond which, the node sensing this value must switch on its transmitter and report to its cluster head.  Soft Threshold (ST)  This is a small change in the value of the sensed attribute which triggers the node to switch on its transmitter and transmit.
  • 31. 31 TEEN - Hard Threshold  The first time a parameter from the attribute set reaches its hard threshold value, the node switches on its transmitter and sends the sensed data.  The sensed value is stored in an internal variable in the node, called the sensed value (SV).
  • 32. 32 TEEN - Soft Threshold  The nodes will next transmit data in the current cluster period, only when both the following conditions are true: The current value of the sensed attribute is greater than the hard threshold. The current value of the sensed attribute differs from SV by an amount equal to or greater than the soft threshold.
  • 33. 33 TEEN - Drawback  If the thresholds are not reached, the user will not get any data from the network at all and will not come to know even if all the nodes die.  This scheme practical implementation would have to ensure that there are no collisions in the cluster.
  • 34. 34 References  I.F. Akyildiz, W. Su*, Y. Sankarasubramaniam, and E. Cayirci,  "Wireless sensor networks: a survey".  K. Akkaya, M. Younis,  "A Survey on Routing Protocols for Wireless Sensor Networks".  J.N. Al-Karaki, A.E. Kamal,  "Routing Techniques in Wireless Sensor Networks".  C. Intanagonwiwat, R. Govindan, and D. Estrin,  "Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks".  W. Heinzelman, J. Kulik, and H. Balakrishnan,  "Adaptive Protocols for Information Dissemination in Wireless Sensor Networks".  W. Heinzelman, A. Chandrakasan, and H. Balakrishnan,  "An Application-Specific Protocol Architecture for Wireless Microsensor Networks".  S. Lindsey and C. Raghavendra,  "PEGASIS: Power-Efficient Gathering in Sensor Information Systems".  A. Manjeshwar and D. Agrawal,  "TEEN: A Routing Protocol for Enhanced Efficiency in Wireless Sensor Networks".