Академический Документы
Профессиональный Документы
Культура Документы
Networks: A Survey
SLIET, Longowal
1
Outline
Introduction
Challenges in WSNs
Categorization based on Network Structure
Flat based Routing Protocols
Hierarchical based Routing Protocols
Location based Routing Protocols
Comparison
Conclusion
2
Introduction
Applications
Components
Architecture
3
Challenges in WSNs
Deployment of nodes
Conservation of energy
Fault tolerance
Scalability
Quality of service
Topology maintenance
4
Taxonomy- Network Structure
based Categorization
Routing
Protocols
Hierarchical Location
Flat based
based based
Routing
Routing Routing
Block Chain
Negotiation Diffusion Data centric Grid Cluster Flooding Virtual Area Optimal
Cluster Cluster
based based based based based based Path based
based based
5
Flat based Routing Protocol
• Flooding
• Gossiping
6
Negotiation based Routing- SPIN
7
Negotiation based Routing- SPIN
8
Diffusion based Routing-Directed Diffusion
Directed Diffusion
– Uses a naming scheme for the data to save energy
– Attribute-value pairs for data and queries on-demand (Interests)
– Interests are broadcasted by the sink (query) to its neighbors
(caching), which can do in-network aggregation
– Gradients = reply links to an interest (path establishment)
9
Diffusion based Routing-Energy Aware Routing
Energy-aware Routing
–Occasional use of a set of sub-optimal paths
–Multiple paths used with certain probability
–Increase of the total lifetime of the network
–Hinders the ability for recovering from node
failure
–Requires address mechanism Complicate
setup
10
Diffusion based Routing-Rumor Routing
Rumor Routing
–Variation of Directed Diffusion
–Flood the events instead of the queries
–Creation of an event generation of a long live
packet travel through the network (agent)
–Nodes save the event in a local table
–When a node receives query checks its table
and returns source – destination path
11
Data centric protocols- COUGAR
COUGAR
– Views the network as a huge distributed database.
– Declarative queries to abstract query processing from network layer functions.
– Introduces a new query layer.
– Leader node performs data aggregation and transmits to the sink.
Disadvantages
– Additional query layer brings overhead in terms of energy consumption and
storage
– In network data computation requires synchronization (i.e. wait for all data before
sending data)
– Dynamically maintenance of leader nodes to prevent failure
12
Data centric protocols- ACQUIRE
13
Hierarchical based Routing
Advantages
– Completely distributed
– No global knowledge of the network
– Increases the lifetime of the network
Disadvantages
– Uses single-hop routing within cluster not applicable to networks in
large regions
– Dynamic clustering brings extra overhead (advertisements, etc)
15
Block Cluster based- TEEN and APTEEN
16
Grid Cluster based-PANEL
The message ends, when it reaches the node which is closest to the reference point.
The process continues until the boundary of WSN is reached
TTDD is best suitable for the applications which are event driven but not for
applications requiring continuous information.
18
Chain Cluster based-PEGASIS
The WS nodes are organized in the form of a chain for the transmission and
aggregation of the data.
The formation of chain starts from the farthest node from sink and its closest
neighbor is selected as next node in the chain and so on.
The end node must be the sink and the node before sink acts as a leader of the node.
Operations like data processing and aggregation are done by leader node.
However, PEGASIS is not suitable for the networks with dynamic or time varying
topology.
19
Chain Cluster based-CCS
Extension of PEGASIS
Choose BS effectively.
WSN is divided into number of concentric circles around the BS, each
representing different cluster levels
Each cluster have one CH and CHs of different levels communicate with
each other to transmit data from one level to another and ultimately to BS
20
Location based Routing Protocols
21
Flooding restriction based
• Guarantees transmission
• Rectangular region created using source and target as two opposite vertices
22
Virtual area partition based-GAF
23
Virtual area partition based-GROUP
CH receives the queries from all nodes in its cluster and forwards
them to the respective destination node using the location
information.
Each node has its own location information and also location
information of all WS nodes in cluster is known to CH.
To select the next node, two costs are calculated: learned cost and estimated cost.
The estimated cost is used to find the next node which is closest to the target region
using two factors, residual energy and its distance to the destination.
After reaching the target region, the information is transmitted using restricted
flooding methods and recursive geographic forwarding.
This approach is better suitable for the applications where the nodes are densely
deployed.
26
Comparison
Routing Data Query
Classification Mobility Power usage Localization Scalability
protocols aggregation based
Flat/
SPIN Yes Limited Yes No Limited Yes
Negotiation based
Flat/
DD Limited Limited Yes Yes Limited Yes
Diffusion based
Flat/
RR No N/A Yes No Good Yes
Diffusion based
Flat/
COUGAR No Limited Yes No Limited Yes
Data Centric
Flat/
ACQUIRE Limited N/A Yes No Limited Yes
Data Centric
Hierarchical/
LEACH Fixed BS Maximum Yes Yes Good No
Block based
Hierarchical/
TEEN Fixed BS Maximum Yes Yes Good No
Block based
Hierarchical/
PANEL Yes Limited No Yes Low No
Grid based
Hierarchical/
TTDD Yes Limited No No Low No
Grid based
Hierarchical/
PEGASIS Fixed BS Maximum No Yes Good No
Chain based
Hierarchical/
CCS Fixed BS Maximum No Yes Good No
Chain based
Location based/
GAF Limited Limited No No Good No
Area partition
Location based/
GRID No Limited No Yes Good Yes
Area partition
Location based/
GPSR Limited Limited No No Limited No
Optimal Path
Location based/
GEAR Limited Limited No No Limited No
Optimal Path
27
An Illustration
• Also, one can think of deploying lightweight sensors inside the tornado.
28
Conclusion
We hope that the taxonomy presented in this paper can help the
researchers and designer for selecting an appropriate routing
protocol for specific application.
29
THANKS
30