SlideShare une entreprise Scribd logo
1  sur  36
Elet-6316: Routing Algorithms & Protocols
           Dr. Driss Benhaddou




              By: Syed Ashar Zia
   Phase I:      Introduction to Wireless
    sensor        networks, its applications,
                  architecture, and
    challenges.

   Phase II:      Routing Protocols
    introduction,
        DSDV, AODV, Cluster-based
             routing.

   Phase III: Performance evaluation of
    AODV           and DSDV through
                      BY: SYED ASHAR ZIA        2
 WSN refers to a network of sensor nodes
  connected through wireless medium.
 WSN is usually a large network
  connecting even more than a thousand
  nodes.
 Sensor nodes are used to monitor, record
  and notify specific conditions at various
  locations.
 Conditions could be
  temperature, humidity, wind, pressure, an
                   BY: SYED ASHAR ZIA         4
   WSN has a wide range of applications,
    such as:
     Military applications,
     Environmental monitoring,
     Industrial sensing,
     Security applications.
   WSN is very useful for monitoring
    remote locations where human access
    is limited or not possible at all.

                         BY: SYED ASHAR ZIA   5
BY: SYED ASHAR ZIA   6
Fig: Sensor Network with Internet access


               BY: SYED ASHAR ZIA          7
   Sensor nodes/End nodes
     Responsible for sensing the conditions.
   Base Station/Sink node
     Collects information from end-nodes.
 Gateways
 Processing Hub
     Processes the collected data at BS.
   Storage Hub

                       BY: SYED ASHAR ZIA       8
BY: SYED ASHAR ZIA   9
    Three layers are added
           in TCP/IP model.

          To increase the
           awareness at the
           nodes.

          Task, Mobility & Power
           are crucial information
           in sensor networks.


BY: SYED ASHAR ZIA                   10
   Architecture
     Energy efficient architecture is priority.
     Compromises could be made on size,
      capacity, cost & speed.

   Routing
     Different from the traditional IP Networks.
     Talking to thousands of nodes makes it
      complex and inefficient at the energy &
      storage level.

                          BY: SYED ASHAR ZIA        11
   Distributed Signal Processing
     Important part at the low-level layer in WSN.
     Provides BS with locations & signal
     identification of nodes, etc.

   Storage & Data retrieval
     Central storage of data from several nodes.
     Storage at nodes requires processing at the
     nodes.


                        BY: SYED ASHAR ZIA            12
   Actuation
     Required action for sensed quantity.
     Such as pointing cameras, alarming sounds,
     opening valves, etc.

   Security
     Attackers may change the behavior of nodes
      leading to change in results.
     Confidentiality, integrity, robustness, and
      authenticity matters in WSN.

                         BY: SYED ASHAR ZIA         13
Routing in WSN


           Network                                               Protocol
           Structure                                             Operation


  Flat     Hierarchical   Location       Negotiation      Multi-path               Query
                                                                       QoS based
Networks    Networks       based           based           based                   based




                                     BY: SYED ASHAR ZIA                                    15
 WSNs are usually ad-hoc in nature.
 Nodes’ communication directly to BS
  defines their MANET (Mobile Ad-hoc
  Network) nature.
 Set of standards are defined for the
  protocols used in Ad-hoc networks
 Mobility of nodes disturbs the
  standards, therefore routing is quiet
  challenging.

                   BY: SYED ASHAR ZIA     16
Proactive/Table
                                             DSDV, FSR, STAR
                         Driven




                         Hybrid                   ZRP

Routing Protocols
  for MANET
                        Reactive/
                                             DSR, AODV, TORA
                    On-demand Driven



                      Cluster-based          LANMAR, CEDAR



                        BY: SYED ASHAR ZIA                     17
   Pro-Active Protocols
     Routing table with all paths maintained at
      each node.
     E.g. DSDV (Direct Sequenced Distance
      Vector)
   Reactive Protocols
     Discovers route when required.
     E.g. AODV (Ad-hoc On-demand Distance
     Vector)
   Hybrid
     Combination of Proactive ZIA Reactive
                       BY: SYED ASHAR
                                      &            18
   Each node maintains a routing table
    containing
     List of all available destinations
     Number distance to each each destination
     Next hop to reach a destination
 The succession of next hops leads to a
  destination
 Each node periodically broadcasts its current
  estimate of the shortest distance to each
  available destination to all of its neighbors
 Typical representative: Distributed Bellman-
                           BY: SYED ASHAR ZIA     19
BY: SYED ASHAR ZIA   20
   Design Goals
     Keeping the simplicity of Bellman-Ford.
     Avoid looping issues
 Route information is transmitted by
  broadcast
 Updates are transmitted periodically or
  immediately when any significant topology
  change is available
     Even sequence no.s are assigned by
      destination
     If a broken link is detected: metric ∞ and
      updated odd sequence no. are assigned by
      detecting host.       BY: SYED ASHAR ZIA     21
   Types of Broadcast updates
     Full Dump:     All information from the
                     transmitting node.
     Incremental: All information that has
      changed                      since the last full
      dump.
     Full dump is transmitted if incremental dump
      exceeds the size of one NPDU.
   Routing Table is maintained with latest
    sequence numbered route and least
    cost metric.
                         BY: SYED ASHAR ZIA              22
 Excellent performance in small
  networks.
 Energy efficient as route processing is
  minimal.
 Routing overhead is approximately
  constant regardless of node movements
  and traffic load.
 Simple implementation using Bellman-
  Ford algorithm.

                   BY: SYED ASHAR ZIA       23
 Bandwidth and size of table increases
  with increasing number of nodes.
 Overhead increases for maintaining
  large no. of nodes, hence degrades the
  performance of network.
 Fails to converge if nodes are changing
  locations quickly.
 Not very efficient in route updating.
 Limits no. of nodes that can join network.

                    BY: SYED ASHAR ZIA         24
 Intended for the networks with thousands
  of nodes.
 It’s a reactive or demand-driven protocol
  which calculates the route when required
  and caches it for further use.
 Routing table only maintains next hop for
  the destination rather than complete
  route.
 Freshness of route is maintained by
  sequence numbers.
                   BY: SYED ASHAR ZIA         25
   Routing Table maintains:
     Destination IP address
     Destination sequence number
     Valid destination sequence number flag
     Other state & routing flags
     Network interface
     Hop count
     Next hop
     Lifetime (route expiration time)


                          BY: SYED ASHAR ZIA   26
   Basic message set
    in AODV includes:
     Hello - For link status
     RREQ - Route
      Request
     RREP - Route Reply
     RERR - Route Error


   Only in case of
    Route is not in table
    and has to be
    discovered.
                                BY: SYED ASHAR ZIA   27
A
          B?

B?
                         B?
               B?

         B?
                    B?        B?

                                   B
A
    A



        A


            A
                B
   Maintenance of Routes is handled very
    efficiently in AODV
     Hello messages broadcast by active nodes
      periodically called HELLO_INTERVAL.
     If no Hello reply from a neighbor within
      DELETE_PERIOD link failure is identified.
     RERR message is broadcasted to other
      neighbors.
     Entries based on that node invalidated.
     Route is rediscovered using RREQ when it is
      required.

                       BY: SYED ASHAR ZIA           30
Simulation done by:
Abdul Hadi Abd Rahman & Zuriati Ahmad Zukarnain
European Journal of Scientific Research
Scenario 1: End-to-End Delay with increasing number of nodes.




In AODV graph fluctuates between 0.3 and 2.4sec while in DSDV it is between
0.005 and 0.008 sec. This shows that route calculation or discovery method in
AODV increases the End-to-End delay.

                                BY: SYED ASHAR ZIA                              32
Scenario 2: Routing Overhead with increasing number of nodes.




Here, three routing protocols are compared, AODV, DSDV and Improved
DSDV. Here, we can see that with increasing no. of nodes routing overhead
increases dramatically in DSDV which causes instability when it’s a large
network.
                                BY: SYED ASHAR ZIA                          33
   Small WSN:
     DSDV is better than AODV.
     Less routing overhead
     Delay is negligible when compared to the
     time it takes to calculate route in AODV.
   Large WSN:
     AODV is better than DSDV
     Efficiently handles mobility and route
      updates.
     Less overhead and appropriate delay.
                        BY: SYED ASHAR ZIA       34
   Routing in Wireless sensor networks – Rachid
    Ennaji & Muhammad Boulmalf – IEEE, 2009
   Performance comparison of AODV, DSDV and I-
    DSDV – Abdul Hadi & Zuriati Ahmed – European
    Journal of Sc. Research
   Group-based clustering RP – Lei Zhang – IEEE,
    2007
   http://www.ece.ul.ie/homepage/tom_newe/RFP05.
    html
   http://www.ece.gatech.edu/research/labs/bwn/WM
    SN/projectdescription.html
   www.authorstream.com
                        BY: SYED ASHAR ZIA           35
BY: SYED ASHAR ZIA   36

Contenu connexe

Tendances

ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS Dushhyant Kumar
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...ArunChokkalingam
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...ArunChokkalingam
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksMd Waresul Islam
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksGodspowerAgbulu
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networksJayesh Rane
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsVirendra Thakur
 
Wireless sensor network applications
Wireless sensor network applicationsWireless sensor network applications
Wireless sensor network applicationsDeepshika Reddy
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocolsMenaga Selvaraj
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor NetworkGanesh Khadsan
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..Chandra Meena
 
Chap 5 (small scale fading)
Chap 5 (small scale fading)Chap 5 (small scale fading)
Chap 5 (small scale fading)asadkhan1327
 
Topology control protocols for WSNs challenges and research opportunities, 14...
Topology control protocols for WSNs challenges and research opportunities, 14...Topology control protocols for WSNs challenges and research opportunities, 14...
Topology control protocols for WSNs challenges and research opportunities, 14...Mohamed Mostafa
 

Tendances (20)

ISSUES IN AD HOC WIRELESS NETWORKS
ISSUES IN  AD HOC WIRELESS  NETWORKS ISSUES IN  AD HOC WIRELESS  NETWORKS
ISSUES IN AD HOC WIRELESS NETWORKS
 
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
WSN network architecture -Sensor Network Scenarios & Transceiver Design Consi...
 
HANDOFF
HANDOFFHANDOFF
HANDOFF
 
Wsn 08
Wsn 08Wsn 08
Wsn 08
 
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts –  ...
WSN NETWORK -MAC PROTOCOLS - Low Duty Cycle Protocols And Wakeup Concepts – ...
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
Security issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networksSecurity issues and attacks in wireless sensor networks
Security issues and attacks in wireless sensor networks
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Security of ad hoc networks
Security of ad hoc networksSecurity of ad hoc networks
Security of ad hoc networks
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
WSN IN IOT
WSN IN IOTWSN IN IOT
WSN IN IOT
 
Wireless sensor network applications
Wireless sensor network applicationsWireless sensor network applications
Wireless sensor network applications
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
WSN presentation
WSN presentationWSN presentation
WSN presentation
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Lecture 11 14. Adhoc routing protocols cont..
Lecture 11 14. Adhoc  routing protocols cont..Lecture 11 14. Adhoc  routing protocols cont..
Lecture 11 14. Adhoc routing protocols cont..
 
Chap 5 (small scale fading)
Chap 5 (small scale fading)Chap 5 (small scale fading)
Chap 5 (small scale fading)
 
Topology control protocols for WSNs challenges and research opportunities, 14...
Topology control protocols for WSNs challenges and research opportunities, 14...Topology control protocols for WSNs challenges and research opportunities, 14...
Topology control protocols for WSNs challenges and research opportunities, 14...
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
DSR Protocol
DSR ProtocolDSR Protocol
DSR Protocol
 

Similaire à Routing in Wireless Sensor Networks

Qo s provisioning for scalable video streaming over ad hoc networks using cro...
Qo s provisioning for scalable video streaming over ad hoc networks using cro...Qo s provisioning for scalable video streaming over ad hoc networks using cro...
Qo s provisioning for scalable video streaming over ad hoc networks using cro...Mshari Alabdulkarim
 
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...ijtsrd
 
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV ProtocolA Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV Protocolijtsrd
 
Computer networks comparison of aodv and olsr in ad hoc networks
Computer networks   comparison of aodv and olsr in ad hoc networksComputer networks   comparison of aodv and olsr in ad hoc networks
Computer networks comparison of aodv and olsr in ad hoc networksAli Haider
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
Comparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOCComparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOCAmitoj Kaur
 
Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...
Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...
Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...IDES Editor
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationPerformance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationIDES Editor
 
Security in Manet Using Fl-Saodv
Security in Manet Using Fl-SaodvSecurity in Manet Using Fl-Saodv
Security in Manet Using Fl-Saodvjournal ijrtem
 
Ad hoc symatric key destribution
Ad hoc symatric key destributionAd hoc symatric key destribution
Ad hoc symatric key destributionsalehsl
 
Ad-Hoc Wireless Network
Ad-Hoc Wireless NetworkAd-Hoc Wireless Network
Ad-Hoc Wireless Networkmdfarhanh1
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioIJLT EMAS
 
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATORPERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATORIAEME Publication
 

Similaire à Routing in Wireless Sensor Networks (20)

Qo s provisioning for scalable video streaming over ad hoc networks using cro...
Qo s provisioning for scalable video streaming over ad hoc networks using cro...Qo s provisioning for scalable video streaming over ad hoc networks using cro...
Qo s provisioning for scalable video streaming over ad hoc networks using cro...
 
A25001003
A25001003A25001003
A25001003
 
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
Performance Comparison of Different Routing Protocols for Wireless Sensor Net...
 
73 77
73 7773 77
73 77
 
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV ProtocolA Study on Ad Hoc on Demand Distance Vector AODV Protocol
A Study on Ad Hoc on Demand Distance Vector AODV Protocol
 
Computer networks comparison of aodv and olsr in ad hoc networks
Computer networks   comparison of aodv and olsr in ad hoc networksComputer networks   comparison of aodv and olsr in ad hoc networks
Computer networks comparison of aodv and olsr in ad hoc networks
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Comparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOCComparison of different MANET routing protocols in wireless ADHOC
Comparison of different MANET routing protocols in wireless ADHOC
 
Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...
Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...
Simulation Based Routing Protocols Evaluation for IEEE 802.15.4 enabled Wirel...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 SimulationPerformance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
Performance Evaluation of ad-hoc Network Routing Protocols using ns2 Simulation
 
Security in Manet Using Fl-Saodv
Security in Manet Using Fl-SaodvSecurity in Manet Using Fl-Saodv
Security in Manet Using Fl-Saodv
 
Ad hoc symatric key destribution
Ad hoc symatric key destributionAd hoc symatric key destribution
Ad hoc symatric key destribution
 
Pres
PresPres
Pres
 
Ad Hoc
Ad HocAd Hoc
Ad Hoc
 
Ad-Hoc Wireless Network
Ad-Hoc Wireless NetworkAd-Hoc Wireless Network
Ad-Hoc Wireless Network
 
Improved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratioImproved aodv based on energy strength and dropping ratio
Improved aodv based on energy strength and dropping ratio
 
Jb2516071610
Jb2516071610Jb2516071610
Jb2516071610
 
Jb2516071610
Jb2516071610Jb2516071610
Jb2516071610
 
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATORPERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
PERFORMANCE ESTIMATION OF ADHOC ROUTING PROTOCOLS WITH NS2 SIMULATOR
 

Routing in Wireless Sensor Networks

  • 1. Elet-6316: Routing Algorithms & Protocols Dr. Driss Benhaddou By: Syed Ashar Zia
  • 2. Phase I: Introduction to Wireless sensor networks, its applications, architecture, and challenges.  Phase II: Routing Protocols introduction, DSDV, AODV, Cluster-based routing.  Phase III: Performance evaluation of AODV and DSDV through BY: SYED ASHAR ZIA 2
  • 3.
  • 4.  WSN refers to a network of sensor nodes connected through wireless medium.  WSN is usually a large network connecting even more than a thousand nodes.  Sensor nodes are used to monitor, record and notify specific conditions at various locations.  Conditions could be temperature, humidity, wind, pressure, an BY: SYED ASHAR ZIA 4
  • 5. WSN has a wide range of applications, such as:  Military applications,  Environmental monitoring,  Industrial sensing,  Security applications.  WSN is very useful for monitoring remote locations where human access is limited or not possible at all. BY: SYED ASHAR ZIA 5
  • 7. Fig: Sensor Network with Internet access BY: SYED ASHAR ZIA 7
  • 8. Sensor nodes/End nodes  Responsible for sensing the conditions.  Base Station/Sink node  Collects information from end-nodes.  Gateways  Processing Hub  Processes the collected data at BS.  Storage Hub BY: SYED ASHAR ZIA 8
  • 10. Three layers are added in TCP/IP model.  To increase the awareness at the nodes.  Task, Mobility & Power are crucial information in sensor networks. BY: SYED ASHAR ZIA 10
  • 11. Architecture  Energy efficient architecture is priority.  Compromises could be made on size, capacity, cost & speed.  Routing  Different from the traditional IP Networks.  Talking to thousands of nodes makes it complex and inefficient at the energy & storage level. BY: SYED ASHAR ZIA 11
  • 12. Distributed Signal Processing  Important part at the low-level layer in WSN.  Provides BS with locations & signal identification of nodes, etc.  Storage & Data retrieval  Central storage of data from several nodes.  Storage at nodes requires processing at the nodes. BY: SYED ASHAR ZIA 12
  • 13. Actuation  Required action for sensed quantity.  Such as pointing cameras, alarming sounds, opening valves, etc.  Security  Attackers may change the behavior of nodes leading to change in results.  Confidentiality, integrity, robustness, and authenticity matters in WSN. BY: SYED ASHAR ZIA 13
  • 14.
  • 15. Routing in WSN Network Protocol Structure Operation Flat Hierarchical Location Negotiation Multi-path Query QoS based Networks Networks based based based based BY: SYED ASHAR ZIA 15
  • 16.  WSNs are usually ad-hoc in nature.  Nodes’ communication directly to BS defines their MANET (Mobile Ad-hoc Network) nature.  Set of standards are defined for the protocols used in Ad-hoc networks  Mobility of nodes disturbs the standards, therefore routing is quiet challenging. BY: SYED ASHAR ZIA 16
  • 17. Proactive/Table DSDV, FSR, STAR Driven Hybrid ZRP Routing Protocols for MANET Reactive/ DSR, AODV, TORA On-demand Driven Cluster-based LANMAR, CEDAR BY: SYED ASHAR ZIA 17
  • 18. Pro-Active Protocols  Routing table with all paths maintained at each node.  E.g. DSDV (Direct Sequenced Distance Vector)  Reactive Protocols  Discovers route when required.  E.g. AODV (Ad-hoc On-demand Distance Vector)  Hybrid  Combination of Proactive ZIA Reactive BY: SYED ASHAR & 18
  • 19. Each node maintains a routing table containing  List of all available destinations  Number distance to each each destination  Next hop to reach a destination  The succession of next hops leads to a destination  Each node periodically broadcasts its current estimate of the shortest distance to each available destination to all of its neighbors  Typical representative: Distributed Bellman- BY: SYED ASHAR ZIA 19
  • 20. BY: SYED ASHAR ZIA 20
  • 21. Design Goals  Keeping the simplicity of Bellman-Ford.  Avoid looping issues  Route information is transmitted by broadcast  Updates are transmitted periodically or immediately when any significant topology change is available  Even sequence no.s are assigned by destination  If a broken link is detected: metric ∞ and updated odd sequence no. are assigned by detecting host. BY: SYED ASHAR ZIA 21
  • 22. Types of Broadcast updates  Full Dump: All information from the transmitting node.  Incremental: All information that has changed since the last full dump.  Full dump is transmitted if incremental dump exceeds the size of one NPDU.  Routing Table is maintained with latest sequence numbered route and least cost metric. BY: SYED ASHAR ZIA 22
  • 23.  Excellent performance in small networks.  Energy efficient as route processing is minimal.  Routing overhead is approximately constant regardless of node movements and traffic load.  Simple implementation using Bellman- Ford algorithm. BY: SYED ASHAR ZIA 23
  • 24.  Bandwidth and size of table increases with increasing number of nodes.  Overhead increases for maintaining large no. of nodes, hence degrades the performance of network.  Fails to converge if nodes are changing locations quickly.  Not very efficient in route updating.  Limits no. of nodes that can join network. BY: SYED ASHAR ZIA 24
  • 25.  Intended for the networks with thousands of nodes.  It’s a reactive or demand-driven protocol which calculates the route when required and caches it for further use.  Routing table only maintains next hop for the destination rather than complete route.  Freshness of route is maintained by sequence numbers. BY: SYED ASHAR ZIA 25
  • 26. Routing Table maintains:  Destination IP address  Destination sequence number  Valid destination sequence number flag  Other state & routing flags  Network interface  Hop count  Next hop  Lifetime (route expiration time) BY: SYED ASHAR ZIA 26
  • 27. Basic message set in AODV includes:  Hello - For link status  RREQ - Route Request  RREP - Route Reply  RERR - Route Error  Only in case of Route is not in table and has to be discovered. BY: SYED ASHAR ZIA 27
  • 28. A B? B? B? B? B? B? B? B
  • 29. A A A A B
  • 30. Maintenance of Routes is handled very efficiently in AODV  Hello messages broadcast by active nodes periodically called HELLO_INTERVAL.  If no Hello reply from a neighbor within DELETE_PERIOD link failure is identified.  RERR message is broadcasted to other neighbors.  Entries based on that node invalidated.  Route is rediscovered using RREQ when it is required. BY: SYED ASHAR ZIA 30
  • 31. Simulation done by: Abdul Hadi Abd Rahman & Zuriati Ahmad Zukarnain European Journal of Scientific Research
  • 32. Scenario 1: End-to-End Delay with increasing number of nodes. In AODV graph fluctuates between 0.3 and 2.4sec while in DSDV it is between 0.005 and 0.008 sec. This shows that route calculation or discovery method in AODV increases the End-to-End delay. BY: SYED ASHAR ZIA 32
  • 33. Scenario 2: Routing Overhead with increasing number of nodes. Here, three routing protocols are compared, AODV, DSDV and Improved DSDV. Here, we can see that with increasing no. of nodes routing overhead increases dramatically in DSDV which causes instability when it’s a large network. BY: SYED ASHAR ZIA 33
  • 34. Small WSN:  DSDV is better than AODV.  Less routing overhead  Delay is negligible when compared to the time it takes to calculate route in AODV.  Large WSN:  AODV is better than DSDV  Efficiently handles mobility and route updates.  Less overhead and appropriate delay. BY: SYED ASHAR ZIA 34
  • 35. Routing in Wireless sensor networks – Rachid Ennaji & Muhammad Boulmalf – IEEE, 2009  Performance comparison of AODV, DSDV and I- DSDV – Abdul Hadi & Zuriati Ahmed – European Journal of Sc. Research  Group-based clustering RP – Lei Zhang – IEEE, 2007  http://www.ece.ul.ie/homepage/tom_newe/RFP05. html  http://www.ece.gatech.edu/research/labs/bwn/WM SN/projectdescription.html  www.authorstream.com BY: SYED ASHAR ZIA 35
  • 36. BY: SYED ASHAR ZIA 36