SlideShare a Scribd company logo
1 of 5
Download to read offline
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 02 Pages: 3021-3025 (2016) ISSN: 0975-0290
3021
Qualitative Analysis of Routing Protocols in
WSN
Raghunandan.G.H
Department of Telecommunication, BMS Institute of Technology, Bangalore, India
Email: raghunandangh@bmsit.in
Archana.A.R , Rachana Pai, Raksha Hegde, T.N.Srinidhi
Department of Telecommunication, BMS Institute of Technology, Bangalore, India
Email: ararchana90@gmail.com
--------------------------------------------------------------------ABSTRACT-------------------------------------------------------------
Wireless Sensor Network (WSN) is partially distributed autonomous sensors to monitor physical or
environmental conditions such as temperature, pressure etc. and to cooperatively pass their data through the
network to the central location. The technique referred to as multi-hop wireless communications is used by the
WSN’s to communicate. Due to the limited processing power and the finite power accessible to each sensor nodes,
the application of regular routing techniques is not recommended. Hence recent advances in wireless sensor
networks have made the routing protocols more efficient. This paper surveys and compares the advanced routing
protocols. The three main categories discussed here are flat based, hierarchical based and location based. The
paper concludes with open research issues.
Keywords- Flat based, Hierarchical, Location based, Routing techniques, WSN
--------------------------------------------------------------------------------------------------------------------------------------------
Date of submission: Oct 07, 2016 Date of Acceptance: Oct 20, 2016
--------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
Micro–sensors development in recent times is due to
microelectronic mechanical systems and low power and
highly integrated digital electronics. MEMS are
equipped with data processing and communication
capabilities. The ambient conditions surrounding the
environment are sensed by the sensory circuits and are
converted into electrical signals. Properties of the
objects located and the events happening in the locality
of the sensor are obtained through the processing of
such electrical signals. The radio transmitter collects the
data sent by the sensor and sends it to a command
centre also known as sink. The interest in the possible
use of huge set of disposable unused sensors has
increased because of the decrease in cost of sensors and
size. Many researchers have been carried out the past
years pointing to the potential of collaboration among
sensors in data collecting and processing. The
management and coordination of the sensing activity
and flow of the data to the sink. A network with
wireless links that is created among the sensors by an
ad-hoc technique is the basic set up for such
collaborative distributed sensors. Sensing over larger
geographical region with greater accuracy is possible by
a Wireless Sensor Network which has hundreds or
thousands of these sensor nodes. Many applications that
require operations which are unattended can be
networked through WSN which possess ability to
communicate by an external base station or directly
among each other.
Fig 1. Wireless sensor Network
Sensor node components with each sensor node
comprising of sensors, processors and transmission
mobilizes forms a schematic diagram which is shown in
figure 1. The sensor nodes gather and route the data to
other base stations which have a mobile node capable of
connecting the sensor network to present
communication setup or to the internet which provides
an access to the reported data to the users or directly to
the other sensors. The sensor node has capability to
base its decision of its mission and information it
currently has and its computing communication, energy
resources.
The deployment of the large number of sensor nodes
leads to the close arrangement of the neighboring
nodes. This helps in lowering the power consumption
by the multi hop communication when compared to the
single hop communication. To make the covert
operation desirable the transmission power must be
maintained at a lower level. The signal propagation
effects experienced in long distance wireless
communication can be effectively overcome by the
Usage of multi-hop communication. The requirement
for the low power consumptions on the sensor nodes is
its main drawback. The power sources used in sensor
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 02 Pages: 3021-3025 (2016) ISSN: 0975-0290
3022
nodes are irreplaceable and are limited in number.
Therefore, power conservation should be primarily
focused in order to achieve high quality of service
(QoS). To prolong the network lifetime the nodes must
have inbuilt trade-off mechanisms. This results in the
reduction of transmission delay. Many researches are
progressing towards these developments. In this paper,
survey of protocols and algorithms are proposed for
sensor networks. This paper helps in understanding the
current research issues in this field. This paper also
contains the following: In section2, a brief overview on
the various design issues and routing challenges are
discussed. Three types of protocols and their categories
are summarized in section3.
Fig 2. Components of Sensor Nodes
II. DESIGN ISSUES AND ROUTING
TECHNIQUES.
Various design constraints and architectures are
taken into consideration for sensor networks based on
their applications. The routing protocols perform very
similar to the architecture modeling. Therefore, in this
section we look into the architectural issues and throw
light on their implications.
2.1 Hardware resources limitation: Sensor nodes can
perform limited computational functionalities, as they
have limited processing, storage capacities and energy
capacities. The design of software development and
network protocols for sensor networks face many
challenges offered by hardware constraints along with
considering the energy constraints in sensor nodes. It
also considers the processing and storage capacities of
sensor nodes.
2.2 Node Deployment: One of the most fundamental
issues to be solved in WSNs is Node Deployment. The
complexity of problems in WSNs such as routing, data
fusion, communication etc. can be overcome by the
proper node deployment scheme. This also helps in
reducing the power consumption thereby extending the
life span of WSNs. The node deployments are either
deterministic or random for large scale WSNs. The
parameters with which the performance is measured are
the distance coverage, energy consumption and
message transfer delay.
2.3 Quality of service: Time constraint applications are
bounded by another condition that is bounded latency
for data delivery. In order to extend the total network
lifetime and reduce energy dissipation in the nodes
which are caused when the energy gets depleted, the
network may have to be required to reduce the quality
of the results. This majorly comes into picture in some
of the applications where the data from the moment it is
sensed should be delivered within a certain period of
time otherwise the data will be useless. Hence to
capture this requirement energy efficient routing
protocols are required.
2.4 Adaptability: A node may fail, join, or move in
sensor network which would result in changes in
network topology and node density. It is necessary that
the network protocols designed for sensor networks
should be adaptive to such density and topology
changes.
2.5 Fault tolerance: Sensor nodes are suffered to
failures due to harsh deployment environments and
unattended operations. So the sensor nodes should be
fault tolerant. Sensors have the abilities of self
calibrating, self-testing, self-repairing and self-
recovering.
2.6 Scalability: The number sensor nodes in sensor
networks are in the order of tens, hundreds, or
thousands hence the network protocols designed for
sensor networks should be scalable to different network
sizes.
III. CLASSIFICATION OF ROUTING
PROTOCOLS:
In many different ways we can classify the routing
algorithms for WSNs which is having a large design
space. In general, the classification of routing technique
in WSNs is divided into flat-based routing, hierarchical-
based routing and location-based routing depending on
the network structure.
The first category considered is flat-based or the data-
centric routing protocols. Node centric communication
is not commonly used communication type in WSNs.
Therefore, data centric routing protocols are designed
for WSNs. Flat based routing protocols distribute
information as needed to any router that can be reached
or receive information. Here each router node routinely
collects and distributes routing information with its
neighboring routers. The entire participating node
addressed by flat routing protocol performs an equal
role in the overall routing mechanism.
The next category is hierarchical-based or cluster based
routing protocols. A hierarchical routing protocol
allows an administrator to make best use of his fast
powerful routers in the backbone and the slower, lower
energy routers may be used for network access at the
edge of the network. Some hierarchical routing
protocols also perform route aggregation to reduce the
number of routes advertised. The cluster based routing
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 02 Pages: 3021-3025 (2016) ISSN: 0975-0290
3023
protocols are more advantageous for WSN due to the
higher energy utilization rate and being more scalable.
The last category is the location-based routing protocol.
This type of protocol is used for energy efficiency in
WSNs. The distance between neighboring nodes can be
estimated by incoming signal strength. By exchanging
information between neighbors relative coordinates of
neighboring nodes can be obtained. We can determine
the location of the nodes directly by communicating
with a satellite, using GPS (Global Positioning System)
if small low power GPS receivers are present in the
nodes. Few location-based schemes demand that nodes
should go to sleep when there is no activity in order to
save energy. More the number of inactive nodes more is
the energy saved. By using this type routing
performance can be improved.
IV. COMPARISION OF ROUTING
PROTOCOLS:
In this paper we have compared routing protocols
according to their design characteristics which is shown
in the table below.
4.1 Flat based routing.
 SPIN: Sensor Protocols for Information via
Negotiation.
 Directed diffusion.
 Rumor routing.
 GBR: Gradient Based Routing.
 MCFA: Minimum Cost Forwarding
Algorithm.
 CADR: Constrained Anisotropic Diffusion
Routing.
 COUGAR
 ACQUIRE: ACquire QUery forwarding In
sensoR nEtworks.
4.2 Hierarchical based routing.
 LEACH: Low Energy Adaptive Clustering
Hierarchy.
 TEEN: Threshold Sensitive Energy Efficient
sensor Network.
APTEEN: Adaptive Periodic Threshold
Sensitive Energy Efficient sensor Network.
 PEGASIS: The Power-Efficient Gathering in
Sensor Information Systems.
 MECN: Minimum Energy Communication
Network. SMECN: Small Minimum
Energy Communication Network.
 SOP: Self Organizing Protocol
 HPAR: Hierarchical Power Aware Routing.
 VGA: Virtual Grid Architecture Routing.
 TTDD: Two-Tier Data Communication.
4.3 Location based routing.
 GAF: Geographic Adaptive Fidelity.
 GEAR: Geographic and Energy Aware
Routing.
 SPAN
 GOAFR: The Greedy Other Adaptive Face
Routing.
ROUTING
PROTOCOLS
CLASSIFICATION MOBILITY POWER
USAGE
DATA
AGGREGATION
QoS STATE
COMPLEXITY
SCALABILITY QUERY
BASED
SPIN Flat Possible Limited Yes No Low Limited Yes
Directed
Diffusion
Flat Limited Limited Yes No Low Limited Yes
Rumor
Routing
Flat Very Limited N/A Yes No Low Good Yes
GBR Flat Limited N/A Yes No Low Limited Yes
MCFA Flat No N/A No No Low Good No
CADR Flat No Limited Yes No Low Limited No
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 02 Pages: 3021-3025 (2016) ISSN: 0975-0290
3024
COUGAR Flat No Limited Yes No Low Limited Yes
ACQUIRE Flat Limited N/A Yes No Low Limited Yes
LEACH Hierarchical Fixed BS Maximu
m
Yes No CHs Good No
TEEN &
APTEEN
Hierarchical Fixed BS Maximu
m
Yes No CHs Good No
PEGASIS Hierarchical Fixed BS Maximu
m
No No Low Good No
MECN &
SMECN
Hierarchical No Maximu
m
No No Low Low No
SOP Hierarchical No N/A No No Low Low No
HPAR Hierarchical No N/A No No Low Good No
VGA Hierarchical No N/A Yes No CHs Good No
TTDD Hierarchical Yes Limited No No Moderate Low Possible
GAF Location Limited Limited No No Low Good No
GEAR Location Limited Limited No No Low Limited No
SPAN Location Limited N/A Yes No Low Limited No
GOAFR Location No N/A No No Low Good No
Table 1: Comparison of routing protocols based on their design characteristics
V. RESEARCH ISSUES AND FUTURE
WORKS:
The common problem faced by wireless sensor
networks (WSNs) is energy. When a sensor is drained
out, it can no longer be able to achieve its goal unless
the energy source is replaced. In WSN future works in
routing techniques focuses on different direction which
share the common aim of extending the network
lifetime.
Some of them are:
 Designing more secured and more effective
routing techniques.
 Achieving the density of the sensor nodes.
 To work on accomplishing redundancy and
to employ fault tolerance in an effective
way.
 Reducing delay time and improving energy
efficiency.
 Synchronization of time and location.
 Further work includes research in the
integration of sensor networks using internet
i.e. with wired networks.
VI. CONCLUSION
In recent years routing in sensor networks has
drawn huge attention and introduced new
challenges compared to classic data routing in
wired networks. We have given an extensive
survey on data routing in sensor networks and
categorized the techniques into three main
classification namely flat based, hierarchical-based
and location based in this paper. Even though
many of these routing techniques look favorable,
still they have many complications that required to
be solved in sensor networks. We promoted those
complications and defined some future work issues
in this concern.
REFERENCES
[1]. Ms. Reshma Jayesh Rasal, Dr. Shyamrao V.
Gumaste, Prof. Gajanan S. Deokate, “Survey on
different routing issues and design challenges in WSN”
IJSEAS volume-1, Issue-4, July 2015, ISSN:2395-
3470.
[2]. Manasa.C, Raghunandan.G.H, “A comparative
survey on routing protocols in wireless sensor
networks” 2014.
[3]. Kemal Akkayya, Mohamed Younis, “A survey on
routing protocols on wireless sensor networks in Ad
Hoc Networks 3, 2005, 325-349.
[4]. Ming Liu, Jiannong Cao, Guihai Chen, Xiaomin
Wang, “An Energy-Aware routing protocols in wireless
sensor networks”, Sensors 2009, volume-9, pp. 445-
462.
Int. J. Advanced Networking and Applications
Volume: 08 Issue: 02 Pages: 3021-3025 (2016) ISSN: 0975-0290
3025
[5]. Raghunandan.G.H, “A comparative analysis of
routing techniques for wireless sensor networks”,
Proceedings of the national conference on innovations
in emerging technology, IEEE conference, pp. 17-22
Feb 2011.
[6]. J. Heidemann, D. Estrin, “Geography informed
energy conservation for ad-hoc routing”, Proceedings
ACM/IEEE MobiCom’01, Rome, Italy, July 2001,
pp.70-84.
[7]. S.K. Singh, M.P. Singh, D.K. Singh, “A survey of
energy efficient hierarchical cluster-based routing in
wireless sensor networks”, International Journal of
Advanced Networking and Application (IJANA), sept-
Oct 2010, vol. 02, issue 02, pp. 570-580.
[8]. J. Kulik, W. R. Heinzelman, and H. Balakrishnan:
Negotiation-Based Protocols for Disseminating
Information in Wireless Sensor Networks, Wireless
Networks, vol. 8, pp. 169–85 (2002).
[9]. W. Heinzelman, J. Kulik, and H. Balakrishnan:
Adaptive Protocols for Information Dissemination in
Wireless Sensor Networks, Proc. 5th ACM/IEEE
Mobicom, Seattle, WA, pp. 174–85 (Aug. 1999).
[10]. Jamal N, Al-Karaki, Ahmed E. Kamal,
“Techniques in wireless sensor networks: A Survey.
[11]. D. Braginsky, D. Estrin, “Rumour Routing
algorithm for sensor networks”, Proceedings- The first
Workshop of sensor networks and applications.
[12]. C. Schurgers, M. B. Srivastava, “Energy efficient
routing in wireless sensor networks in the MILCOM
Proceedings on communications for network centric
operations, Creating the Information force, McLean,
VA (2001).
[13]. F. Ye, A. Chen, S. Liu, L. Zhang, “A Scalable
solution to minimum cost forwarding in large sensor
networks”, Proceedings of the tenth International
Conference on Computer Communications and
Networks (ICCCN).
[14]. M. Chu, H. Haussecker, F. Zhao, “Scalable
information driven sensor querying and routing for ad-
hoc Heterogeneous sensor networks, the international
Journal of high performance computing applications,
Vol-16, No. 3, August 2002.
[15] Y. Yao and J. Gehrke: The cougar approach to in
network query processing in sensor networks, in
SIGMOD Record(September 2002).
[16]. N. Sadagopan et al, “The ACQUIRE mechanism
for efficient querying in sensor networks”, in the
Proceedings of the First International Workshop on
protocols in wireless sensor networks.
[17]. A. Manjeshwar, D. P Agarwal, “TEEN: A
routing protocol for enhanced efficiency in wireless
sensor networks”, First International workshop on
parallel and distributed computing issues in
wireless networks and mobile computing, April
2001.
[18]. Raghunandan.G.H, Narendra. K, Varun V, “A
Comparitive Analysis of energy efficient routing
protocols in WSN”, Springer, Volume no.248, pp.399,
2014
Authors Biographies:
Raghunandan G.H received B.E
degree in Electronics and
Communication Engineering from
Visvesvaraya Technological
University. He did his M.Tech in
the field of Digital Electronics and communication
from Visvesvaraya Technological University,
Belgaum. He is currently working as Assistant
Professor in Department of Telecommunication at
BMS Institute of Technology and Management,
Bengaluru. His areas of interest are Wireless Ad-Hoc
and Sensor Networks. He has published 15 papers at
International conferences and 8 papers in International
journals.
Archana A.R is pursuing B.E
degree in Telecommunication from
Visvesvaraya Technological
University. Her area of interest
includes wireless communication
and networking.
Rachana Pai is pursuing B.E
degree in Telecommunication from
Visvesvaraya Technological
University. Her area of interest
includes wireless communication
and networking.
Raksha Hegde is pursuing B.E
degree in Telecommunication from
Visvesvaraya Technological
University. Her area of interest
includes wireless communication
and networking.
T N Srinidhi is pursuing B.E
degree in Telecommunication from
Visvesvaraya Technological
University. Her area of interest
includes WSN.

More Related Content

What's hot

A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...eSAT Journals
 
A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...eSAT Publishing House
 
Sensors 19-03789-v2
Sensors 19-03789-v2Sensors 19-03789-v2
Sensors 19-03789-v2Nitin k
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...IRJET Journal
 
Survey on dynamic source routing, attacks and counter measures in wireless se...
Survey on dynamic source routing, attacks and counter measures in wireless se...Survey on dynamic source routing, attacks and counter measures in wireless se...
Survey on dynamic source routing, attacks and counter measures in wireless se...eSAT Publishing House
 
Performance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksPerformance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksDarpan Dekivadiya
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...IJEEE
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET Journal
 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksIRJET Journal
 
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEYROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEYijscai
 
The Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localizationThe Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localizationIJERA Editor
 
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...IOSR Journals
 
A study on qos aware routing in wireless mesh network
A study on qos aware routing in wireless mesh networkA study on qos aware routing in wireless mesh network
A study on qos aware routing in wireless mesh networkeSAT Publishing House
 
A Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health MonitoringA Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health MonitoringIJEEE
 
Wireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingWireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingIOSR Journals
 
Direct_studies_report13
Direct_studies_report13Direct_studies_report13
Direct_studies_report13Farhad Gholami
 

What's hot (19)

A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...
 
A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...A framework for data traffic in cognitive radio net works using trusted token...
A framework for data traffic in cognitive radio net works using trusted token...
 
Sensors 19-03789-v2
Sensors 19-03789-v2Sensors 19-03789-v2
Sensors 19-03789-v2
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
 
Survey on dynamic source routing, attacks and counter measures in wireless se...
Survey on dynamic source routing, attacks and counter measures in wireless se...Survey on dynamic source routing, attacks and counter measures in wireless se...
Survey on dynamic source routing, attacks and counter measures in wireless se...
 
Cn24588592
Cn24588592Cn24588592
Cn24588592
 
Performance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksPerformance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor Networks
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
 
B0470208027
B0470208027B0470208027
B0470208027
 
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEYROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
ROUTING WIRELESS SENSOR NETWORKS BASED ON SOFT COMPUTING PARADIGMS: SURVEY
 
The Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localizationThe Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localization
 
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
A study on qos aware routing in wireless mesh network
A study on qos aware routing in wireless mesh networkA study on qos aware routing in wireless mesh network
A study on qos aware routing in wireless mesh network
 
A Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health MonitoringA Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health Monitoring
 
Wireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingWireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop Routing
 
Direct_studies_report13
Direct_studies_report13Direct_studies_report13
Direct_studies_report13
 

Viewers also liked

More sustainable Istanbul
More sustainable IstanbulMore sustainable Istanbul
More sustainable IstanbulAhmad Alshaghel
 
Recent publications on management of Brachial plexus injury
Recent publications on management of Brachial plexus injuryRecent publications on management of Brachial plexus injury
Recent publications on management of Brachial plexus injuryDr. PS Bhandari
 
Stick Figure Harry
Stick Figure HarryStick Figure Harry
Stick Figure Harryolafsson
 
Termoregolazione e contabilizzazione in condominio
Termoregolazione e contabilizzazione in condominioTermoregolazione e contabilizzazione in condominio
Termoregolazione e contabilizzazione in condominioChiara Ragazzini
 
हिंदी परीयोजना
हिंदी परीयोजनाहिंदी परीयोजना
हिंदी परीयोजनाJayanthi Rao
 
Marco Teorico
Marco TeoricoMarco Teorico
Marco Teorico7304560
 
Pno livret jeune et priere pasteur-yvan-castanou
Pno livret jeune et priere pasteur-yvan-castanouPno livret jeune et priere pasteur-yvan-castanou
Pno livret jeune et priere pasteur-yvan-castanouYvan CASTANOU
 
Top movies of 2010
Top movies of 2010Top movies of 2010
Top movies of 2010annpl
 
Österreichs Open Access Empfehlungen - Eine Erfolgsgeschichte
Österreichs Open Access Empfehlungen - Eine ErfolgsgeschichteÖsterreichs Open Access Empfehlungen - Eine Erfolgsgeschichte
Österreichs Open Access Empfehlungen - Eine ErfolgsgeschichtePatrick Danowski
 
MATRIC CERTIFICATE
MATRIC CERTIFICATEMATRIC CERTIFICATE
MATRIC CERTIFICATElucky Lucky
 
Internship letter
Internship letterInternship letter
Internship letterAhsan Nawaz
 
Efficiently decoding Reed-Muller codes from random errors
Efficiently decoding Reed-Muller codes from random errorsEfficiently decoding Reed-Muller codes from random errors
Efficiently decoding Reed-Muller codes from random errorscseiitgn
 
IELTS for FSWP in CANADA
IELTS for FSWP in CANADAIELTS for FSWP in CANADA
IELTS for FSWP in CANADAobaied
 
Case DPaschoal - 18ª conferência anual ASUG 2015
Case DPaschoal - 18ª conferência anual ASUG 2015Case DPaschoal - 18ª conferência anual ASUG 2015
Case DPaschoal - 18ª conferência anual ASUG 2015Fluig
 
Handout for the course Abstract Argumentation and Interfaces to Argumentative...
Handout for the course Abstract Argumentation and Interfaces to Argumentative...Handout for the course Abstract Argumentation and Interfaces to Argumentative...
Handout for the course Abstract Argumentation and Interfaces to Argumentative...Federico Cerutti
 
fluig Webinar - Agronegócio
fluig Webinar - Agronegócio fluig Webinar - Agronegócio
fluig Webinar - Agronegócio Fluig
 

Viewers also liked (20)

More sustainable Istanbul
More sustainable IstanbulMore sustainable Istanbul
More sustainable Istanbul
 
Recent publications on management of Brachial plexus injury
Recent publications on management of Brachial plexus injuryRecent publications on management of Brachial plexus injury
Recent publications on management of Brachial plexus injury
 
Stick Figure Harry
Stick Figure HarryStick Figure Harry
Stick Figure Harry
 
Termoregolazione e contabilizzazione in condominio
Termoregolazione e contabilizzazione in condominioTermoregolazione e contabilizzazione in condominio
Termoregolazione e contabilizzazione in condominio
 
Lgpl license (2)
Lgpl license (2)Lgpl license (2)
Lgpl license (2)
 
हिंदी परीयोजना
हिंदी परीयोजनाहिंदी परीयोजना
हिंदी परीयोजना
 
Marco Teorico
Marco TeoricoMarco Teorico
Marco Teorico
 
Oyyal fund raising_2015-16
Oyyal fund raising_2015-16Oyyal fund raising_2015-16
Oyyal fund raising_2015-16
 
Pno livret jeune et priere pasteur-yvan-castanou
Pno livret jeune et priere pasteur-yvan-castanouPno livret jeune et priere pasteur-yvan-castanou
Pno livret jeune et priere pasteur-yvan-castanou
 
Top movies of 2010
Top movies of 2010Top movies of 2010
Top movies of 2010
 
Österreichs Open Access Empfehlungen - Eine Erfolgsgeschichte
Österreichs Open Access Empfehlungen - Eine ErfolgsgeschichteÖsterreichs Open Access Empfehlungen - Eine Erfolgsgeschichte
Österreichs Open Access Empfehlungen - Eine Erfolgsgeschichte
 
MATRIC CERTIFICATE
MATRIC CERTIFICATEMATRIC CERTIFICATE
MATRIC CERTIFICATE
 
Internship letter
Internship letterInternship letter
Internship letter
 
Efficiently decoding Reed-Muller codes from random errors
Efficiently decoding Reed-Muller codes from random errorsEfficiently decoding Reed-Muller codes from random errors
Efficiently decoding Reed-Muller codes from random errors
 
ATPG of reversible circuits
ATPG of reversible circuitsATPG of reversible circuits
ATPG of reversible circuits
 
IELTS for FSWP in CANADA
IELTS for FSWP in CANADAIELTS for FSWP in CANADA
IELTS for FSWP in CANADA
 
Case DPaschoal - 18ª conferência anual ASUG 2015
Case DPaschoal - 18ª conferência anual ASUG 2015Case DPaschoal - 18ª conferência anual ASUG 2015
Case DPaschoal - 18ª conferência anual ASUG 2015
 
Handout for the course Abstract Argumentation and Interfaces to Argumentative...
Handout for the course Abstract Argumentation and Interfaces to Argumentative...Handout for the course Abstract Argumentation and Interfaces to Argumentative...
Handout for the course Abstract Argumentation and Interfaces to Argumentative...
 
Rule Based System
Rule Based SystemRule Based System
Rule Based System
 
fluig Webinar - Agronegócio
fluig Webinar - Agronegócio fluig Webinar - Agronegócio
fluig Webinar - Agronegócio
 

Similar to Qualitative Analysis of Routing Protocols in WSN

EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
 
Study Of Coded Based Mechanism In WSN System
Study Of Coded Based Mechanism In WSN SystemStudy Of Coded Based Mechanism In WSN System
Study Of Coded Based Mechanism In WSN SystemIJERA Editor
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...IRJET Journal
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...IRJET Journal
 
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSijassn
 
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...cscpconf
 
A study on qos aware routing in wireless mesh network
A study on qos aware routing in wireless mesh networkA study on qos aware routing in wireless mesh network
A study on qos aware routing in wireless mesh networkeSAT Journals
 
Challenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksChallenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksAuwal Amshi
 
Comprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolComprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolIJRES Journal
 
Bottleneck Detection Algorithm to Enhance Lifetime of WSN
Bottleneck Detection Algorithm to Enhance Lifetime of WSNBottleneck Detection Algorithm to Enhance Lifetime of WSN
Bottleneck Detection Algorithm to Enhance Lifetime of WSNjosephjonse
 
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSNBOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSNijngnjournal
 
Bottleneck Detection Algorithm to Enhance Lifetime of WSN
Bottleneck Detection Algorithm to Enhance Lifetime of WSNBottleneck Detection Algorithm to Enhance Lifetime of WSN
Bottleneck Detection Algorithm to Enhance Lifetime of WSNjosephjonse
 
Cooperative Data Forwarding In AODV Routing Protocol
Cooperative Data Forwarding In AODV Routing ProtocolCooperative Data Forwarding In AODV Routing Protocol
Cooperative Data Forwarding In AODV Routing ProtocolIOSR Journals
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksMohammad Siraj
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...IRJET Journal
 
IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...
IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...
IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...IRJET Journal
 
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxAd hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxGomathi454280
 
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxAd hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxGomathi454280
 

Similar to Qualitative Analysis of Routing Protocols in WSN (20)

EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
 
Study Of Coded Based Mechanism In WSN System
Study Of Coded Based Mechanism In WSN SystemStudy Of Coded Based Mechanism In WSN System
Study Of Coded Based Mechanism In WSN System
 
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wireless ...
A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wireless ...
 
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for   Wir...
IRJET-A Virtual Grid-Based Dynamic Routes Adjustment (VGDRA) Scheme for Wir...
 
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
 
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
 
file4.pdf
file4.pdffile4.pdf
file4.pdf
 
A study on qos aware routing in wireless mesh network
A study on qos aware routing in wireless mesh networkA study on qos aware routing in wireless mesh network
A study on qos aware routing in wireless mesh network
 
Challenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networksChallenges for routing in wireless sensor networks
Challenges for routing in wireless sensor networks
 
Comprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing ProtocolComprehensive Review on Base Energy Efficient Routing Protocol
Comprehensive Review on Base Energy Efficient Routing Protocol
 
Bottleneck Detection Algorithm to Enhance Lifetime of WSN
Bottleneck Detection Algorithm to Enhance Lifetime of WSNBottleneck Detection Algorithm to Enhance Lifetime of WSN
Bottleneck Detection Algorithm to Enhance Lifetime of WSN
 
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSNBOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
BOTTLENECK DETECTION ALGORITHM TO ENHANCE LIFETIME OF WSN
 
Bottleneck Detection Algorithm to Enhance Lifetime of WSN
Bottleneck Detection Algorithm to Enhance Lifetime of WSNBottleneck Detection Algorithm to Enhance Lifetime of WSN
Bottleneck Detection Algorithm to Enhance Lifetime of WSN
 
Cooperative Data Forwarding In AODV Routing Protocol
Cooperative Data Forwarding In AODV Routing ProtocolCooperative Data Forwarding In AODV Routing Protocol
Cooperative Data Forwarding In AODV Routing Protocol
 
B010130508
B010130508B010130508
B010130508
 
A survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networksA survey on routing algorithms and routing metrics for wireless mesh networks
A survey on routing algorithms and routing metrics for wireless mesh networks
 
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
An Improved Enhanced Real Time Routing Protocol (IERT) for Mobile Wireless Se...
 
IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...
IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...
IRJET- A Study on Hierarchical Cluster based Routing Techniques in Wireless S...
 
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxAd hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
 
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptxAd hoc & WSN Routing protocols (Geetha) (2).pptx
Ad hoc & WSN Routing protocols (Geetha) (2).pptx
 

More from Eswar Publications

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyEswar Publications
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickEswar Publications
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerEswar Publications
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersEswar Publications
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)Eswar Publications
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasEswar Publications
 

More from Eswar Publications (20)

Content-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A SurveyContent-Based Image Retrieval Features: A Survey
Content-Based Image Retrieval Features: A Survey
 
Clickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s ClickClickjacking Attack: Hijacking User’s Click
Clickjacking Attack: Hijacking User’s Click
 
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...
 
Android Based Home-Automation using Microcontroller
Android Based Home-Automation using MicrocontrollerAndroid Based Home-Automation using Microcontroller
Android Based Home-Automation using Microcontroller
 
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...
 
App for Physiological Seed quality Parameters
App for Physiological Seed quality ParametersApp for Physiological Seed quality Parameters
App for Physiological Seed quality Parameters
 
What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...What happens when adaptive video streaming players compete in time-varying ba...
What happens when adaptive video streaming players compete in time-varying ba...
 
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemWLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
 
Spreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case StudySpreading Trade Union Activities through Cyberspace: A Case Study
Spreading Trade Union Activities through Cyberspace: A Case Study
 
Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...Identifying an Appropriate Model for Information Systems Integration in the O...
Identifying an Appropriate Model for Information Systems Integration in the O...
 
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...
 
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkBridging Centrality: Identifying Bridging Nodes in Transportation Network
Bridging Centrality: Identifying Bridging Nodes in Transportation Network
 
A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)A Literature Survey on Internet of Things (IoT)
A Literature Survey on Internet of Things (IoT)
 
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemAutomatic Monitoring of Soil Moisture and Controlling of Irrigation System
Automatic Monitoring of Soil Moisture and Controlling of Irrigation System
 
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelMulti- Level Data Security Model for Big Data on Public Cloud: A New Model
Multi- Level Data Security Model for Big Data on Public Cloud: A New Model
 
Impact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon PerspectivesImpact of Technology on E-Banking; Cameroon Perspectives
Impact of Technology on E-Banking; Cameroon Perspectives
 
Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...Classification Algorithms with Attribute Selection: an evaluation study using...
Classification Algorithms with Attribute Selection: an evaluation study using...
 
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...
 
Network as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC AlgorithmNetwork as a Service Model in Cloud Authentication by HMAC Algorithm
Network as a Service Model in Cloud Authentication by HMAC Algorithm
 
Explosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed AntennasExplosive Detection Approach by Printed Antennas
Explosive Detection Approach by Printed Antennas
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 

Qualitative Analysis of Routing Protocols in WSN

  • 1. Int. J. Advanced Networking and Applications Volume: 08 Issue: 02 Pages: 3021-3025 (2016) ISSN: 0975-0290 3021 Qualitative Analysis of Routing Protocols in WSN Raghunandan.G.H Department of Telecommunication, BMS Institute of Technology, Bangalore, India Email: raghunandangh@bmsit.in Archana.A.R , Rachana Pai, Raksha Hegde, T.N.Srinidhi Department of Telecommunication, BMS Institute of Technology, Bangalore, India Email: ararchana90@gmail.com --------------------------------------------------------------------ABSTRACT------------------------------------------------------------- Wireless Sensor Network (WSN) is partially distributed autonomous sensors to monitor physical or environmental conditions such as temperature, pressure etc. and to cooperatively pass their data through the network to the central location. The technique referred to as multi-hop wireless communications is used by the WSN’s to communicate. Due to the limited processing power and the finite power accessible to each sensor nodes, the application of regular routing techniques is not recommended. Hence recent advances in wireless sensor networks have made the routing protocols more efficient. This paper surveys and compares the advanced routing protocols. The three main categories discussed here are flat based, hierarchical based and location based. The paper concludes with open research issues. Keywords- Flat based, Hierarchical, Location based, Routing techniques, WSN -------------------------------------------------------------------------------------------------------------------------------------------- Date of submission: Oct 07, 2016 Date of Acceptance: Oct 20, 2016 -------------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION Micro–sensors development in recent times is due to microelectronic mechanical systems and low power and highly integrated digital electronics. MEMS are equipped with data processing and communication capabilities. The ambient conditions surrounding the environment are sensed by the sensory circuits and are converted into electrical signals. Properties of the objects located and the events happening in the locality of the sensor are obtained through the processing of such electrical signals. The radio transmitter collects the data sent by the sensor and sends it to a command centre also known as sink. The interest in the possible use of huge set of disposable unused sensors has increased because of the decrease in cost of sensors and size. Many researchers have been carried out the past years pointing to the potential of collaboration among sensors in data collecting and processing. The management and coordination of the sensing activity and flow of the data to the sink. A network with wireless links that is created among the sensors by an ad-hoc technique is the basic set up for such collaborative distributed sensors. Sensing over larger geographical region with greater accuracy is possible by a Wireless Sensor Network which has hundreds or thousands of these sensor nodes. Many applications that require operations which are unattended can be networked through WSN which possess ability to communicate by an external base station or directly among each other. Fig 1. Wireless sensor Network Sensor node components with each sensor node comprising of sensors, processors and transmission mobilizes forms a schematic diagram which is shown in figure 1. The sensor nodes gather and route the data to other base stations which have a mobile node capable of connecting the sensor network to present communication setup or to the internet which provides an access to the reported data to the users or directly to the other sensors. The sensor node has capability to base its decision of its mission and information it currently has and its computing communication, energy resources. The deployment of the large number of sensor nodes leads to the close arrangement of the neighboring nodes. This helps in lowering the power consumption by the multi hop communication when compared to the single hop communication. To make the covert operation desirable the transmission power must be maintained at a lower level. The signal propagation effects experienced in long distance wireless communication can be effectively overcome by the Usage of multi-hop communication. The requirement for the low power consumptions on the sensor nodes is its main drawback. The power sources used in sensor
  • 2. Int. J. Advanced Networking and Applications Volume: 08 Issue: 02 Pages: 3021-3025 (2016) ISSN: 0975-0290 3022 nodes are irreplaceable and are limited in number. Therefore, power conservation should be primarily focused in order to achieve high quality of service (QoS). To prolong the network lifetime the nodes must have inbuilt trade-off mechanisms. This results in the reduction of transmission delay. Many researches are progressing towards these developments. In this paper, survey of protocols and algorithms are proposed for sensor networks. This paper helps in understanding the current research issues in this field. This paper also contains the following: In section2, a brief overview on the various design issues and routing challenges are discussed. Three types of protocols and their categories are summarized in section3. Fig 2. Components of Sensor Nodes II. DESIGN ISSUES AND ROUTING TECHNIQUES. Various design constraints and architectures are taken into consideration for sensor networks based on their applications. The routing protocols perform very similar to the architecture modeling. Therefore, in this section we look into the architectural issues and throw light on their implications. 2.1 Hardware resources limitation: Sensor nodes can perform limited computational functionalities, as they have limited processing, storage capacities and energy capacities. The design of software development and network protocols for sensor networks face many challenges offered by hardware constraints along with considering the energy constraints in sensor nodes. It also considers the processing and storage capacities of sensor nodes. 2.2 Node Deployment: One of the most fundamental issues to be solved in WSNs is Node Deployment. The complexity of problems in WSNs such as routing, data fusion, communication etc. can be overcome by the proper node deployment scheme. This also helps in reducing the power consumption thereby extending the life span of WSNs. The node deployments are either deterministic or random for large scale WSNs. The parameters with which the performance is measured are the distance coverage, energy consumption and message transfer delay. 2.3 Quality of service: Time constraint applications are bounded by another condition that is bounded latency for data delivery. In order to extend the total network lifetime and reduce energy dissipation in the nodes which are caused when the energy gets depleted, the network may have to be required to reduce the quality of the results. This majorly comes into picture in some of the applications where the data from the moment it is sensed should be delivered within a certain period of time otherwise the data will be useless. Hence to capture this requirement energy efficient routing protocols are required. 2.4 Adaptability: A node may fail, join, or move in sensor network which would result in changes in network topology and node density. It is necessary that the network protocols designed for sensor networks should be adaptive to such density and topology changes. 2.5 Fault tolerance: Sensor nodes are suffered to failures due to harsh deployment environments and unattended operations. So the sensor nodes should be fault tolerant. Sensors have the abilities of self calibrating, self-testing, self-repairing and self- recovering. 2.6 Scalability: The number sensor nodes in sensor networks are in the order of tens, hundreds, or thousands hence the network protocols designed for sensor networks should be scalable to different network sizes. III. CLASSIFICATION OF ROUTING PROTOCOLS: In many different ways we can classify the routing algorithms for WSNs which is having a large design space. In general, the classification of routing technique in WSNs is divided into flat-based routing, hierarchical- based routing and location-based routing depending on the network structure. The first category considered is flat-based or the data- centric routing protocols. Node centric communication is not commonly used communication type in WSNs. Therefore, data centric routing protocols are designed for WSNs. Flat based routing protocols distribute information as needed to any router that can be reached or receive information. Here each router node routinely collects and distributes routing information with its neighboring routers. The entire participating node addressed by flat routing protocol performs an equal role in the overall routing mechanism. The next category is hierarchical-based or cluster based routing protocols. A hierarchical routing protocol allows an administrator to make best use of his fast powerful routers in the backbone and the slower, lower energy routers may be used for network access at the edge of the network. Some hierarchical routing protocols also perform route aggregation to reduce the number of routes advertised. The cluster based routing
  • 3. Int. J. Advanced Networking and Applications Volume: 08 Issue: 02 Pages: 3021-3025 (2016) ISSN: 0975-0290 3023 protocols are more advantageous for WSN due to the higher energy utilization rate and being more scalable. The last category is the location-based routing protocol. This type of protocol is used for energy efficiency in WSNs. The distance between neighboring nodes can be estimated by incoming signal strength. By exchanging information between neighbors relative coordinates of neighboring nodes can be obtained. We can determine the location of the nodes directly by communicating with a satellite, using GPS (Global Positioning System) if small low power GPS receivers are present in the nodes. Few location-based schemes demand that nodes should go to sleep when there is no activity in order to save energy. More the number of inactive nodes more is the energy saved. By using this type routing performance can be improved. IV. COMPARISION OF ROUTING PROTOCOLS: In this paper we have compared routing protocols according to their design characteristics which is shown in the table below. 4.1 Flat based routing.  SPIN: Sensor Protocols for Information via Negotiation.  Directed diffusion.  Rumor routing.  GBR: Gradient Based Routing.  MCFA: Minimum Cost Forwarding Algorithm.  CADR: Constrained Anisotropic Diffusion Routing.  COUGAR  ACQUIRE: ACquire QUery forwarding In sensoR nEtworks. 4.2 Hierarchical based routing.  LEACH: Low Energy Adaptive Clustering Hierarchy.  TEEN: Threshold Sensitive Energy Efficient sensor Network. APTEEN: Adaptive Periodic Threshold Sensitive Energy Efficient sensor Network.  PEGASIS: The Power-Efficient Gathering in Sensor Information Systems.  MECN: Minimum Energy Communication Network. SMECN: Small Minimum Energy Communication Network.  SOP: Self Organizing Protocol  HPAR: Hierarchical Power Aware Routing.  VGA: Virtual Grid Architecture Routing.  TTDD: Two-Tier Data Communication. 4.3 Location based routing.  GAF: Geographic Adaptive Fidelity.  GEAR: Geographic and Energy Aware Routing.  SPAN  GOAFR: The Greedy Other Adaptive Face Routing. ROUTING PROTOCOLS CLASSIFICATION MOBILITY POWER USAGE DATA AGGREGATION QoS STATE COMPLEXITY SCALABILITY QUERY BASED SPIN Flat Possible Limited Yes No Low Limited Yes Directed Diffusion Flat Limited Limited Yes No Low Limited Yes Rumor Routing Flat Very Limited N/A Yes No Low Good Yes GBR Flat Limited N/A Yes No Low Limited Yes MCFA Flat No N/A No No Low Good No CADR Flat No Limited Yes No Low Limited No
  • 4. Int. J. Advanced Networking and Applications Volume: 08 Issue: 02 Pages: 3021-3025 (2016) ISSN: 0975-0290 3024 COUGAR Flat No Limited Yes No Low Limited Yes ACQUIRE Flat Limited N/A Yes No Low Limited Yes LEACH Hierarchical Fixed BS Maximu m Yes No CHs Good No TEEN & APTEEN Hierarchical Fixed BS Maximu m Yes No CHs Good No PEGASIS Hierarchical Fixed BS Maximu m No No Low Good No MECN & SMECN Hierarchical No Maximu m No No Low Low No SOP Hierarchical No N/A No No Low Low No HPAR Hierarchical No N/A No No Low Good No VGA Hierarchical No N/A Yes No CHs Good No TTDD Hierarchical Yes Limited No No Moderate Low Possible GAF Location Limited Limited No No Low Good No GEAR Location Limited Limited No No Low Limited No SPAN Location Limited N/A Yes No Low Limited No GOAFR Location No N/A No No Low Good No Table 1: Comparison of routing protocols based on their design characteristics V. RESEARCH ISSUES AND FUTURE WORKS: The common problem faced by wireless sensor networks (WSNs) is energy. When a sensor is drained out, it can no longer be able to achieve its goal unless the energy source is replaced. In WSN future works in routing techniques focuses on different direction which share the common aim of extending the network lifetime. Some of them are:  Designing more secured and more effective routing techniques.  Achieving the density of the sensor nodes.  To work on accomplishing redundancy and to employ fault tolerance in an effective way.  Reducing delay time and improving energy efficiency.  Synchronization of time and location.  Further work includes research in the integration of sensor networks using internet i.e. with wired networks. VI. CONCLUSION In recent years routing in sensor networks has drawn huge attention and introduced new challenges compared to classic data routing in wired networks. We have given an extensive survey on data routing in sensor networks and categorized the techniques into three main classification namely flat based, hierarchical-based and location based in this paper. Even though many of these routing techniques look favorable, still they have many complications that required to be solved in sensor networks. We promoted those complications and defined some future work issues in this concern. REFERENCES [1]. Ms. Reshma Jayesh Rasal, Dr. Shyamrao V. Gumaste, Prof. Gajanan S. Deokate, “Survey on different routing issues and design challenges in WSN” IJSEAS volume-1, Issue-4, July 2015, ISSN:2395- 3470. [2]. Manasa.C, Raghunandan.G.H, “A comparative survey on routing protocols in wireless sensor networks” 2014. [3]. Kemal Akkayya, Mohamed Younis, “A survey on routing protocols on wireless sensor networks in Ad Hoc Networks 3, 2005, 325-349. [4]. Ming Liu, Jiannong Cao, Guihai Chen, Xiaomin Wang, “An Energy-Aware routing protocols in wireless sensor networks”, Sensors 2009, volume-9, pp. 445- 462.
  • 5. Int. J. Advanced Networking and Applications Volume: 08 Issue: 02 Pages: 3021-3025 (2016) ISSN: 0975-0290 3025 [5]. Raghunandan.G.H, “A comparative analysis of routing techniques for wireless sensor networks”, Proceedings of the national conference on innovations in emerging technology, IEEE conference, pp. 17-22 Feb 2011. [6]. J. Heidemann, D. Estrin, “Geography informed energy conservation for ad-hoc routing”, Proceedings ACM/IEEE MobiCom’01, Rome, Italy, July 2001, pp.70-84. [7]. S.K. Singh, M.P. Singh, D.K. Singh, “A survey of energy efficient hierarchical cluster-based routing in wireless sensor networks”, International Journal of Advanced Networking and Application (IJANA), sept- Oct 2010, vol. 02, issue 02, pp. 570-580. [8]. J. Kulik, W. R. Heinzelman, and H. Balakrishnan: Negotiation-Based Protocols for Disseminating Information in Wireless Sensor Networks, Wireless Networks, vol. 8, pp. 169–85 (2002). [9]. W. Heinzelman, J. Kulik, and H. Balakrishnan: Adaptive Protocols for Information Dissemination in Wireless Sensor Networks, Proc. 5th ACM/IEEE Mobicom, Seattle, WA, pp. 174–85 (Aug. 1999). [10]. Jamal N, Al-Karaki, Ahmed E. Kamal, “Techniques in wireless sensor networks: A Survey. [11]. D. Braginsky, D. Estrin, “Rumour Routing algorithm for sensor networks”, Proceedings- The first Workshop of sensor networks and applications. [12]. C. Schurgers, M. B. Srivastava, “Energy efficient routing in wireless sensor networks in the MILCOM Proceedings on communications for network centric operations, Creating the Information force, McLean, VA (2001). [13]. F. Ye, A. Chen, S. Liu, L. Zhang, “A Scalable solution to minimum cost forwarding in large sensor networks”, Proceedings of the tenth International Conference on Computer Communications and Networks (ICCCN). [14]. M. Chu, H. Haussecker, F. Zhao, “Scalable information driven sensor querying and routing for ad- hoc Heterogeneous sensor networks, the international Journal of high performance computing applications, Vol-16, No. 3, August 2002. [15] Y. Yao and J. Gehrke: The cougar approach to in network query processing in sensor networks, in SIGMOD Record(September 2002). [16]. N. Sadagopan et al, “The ACQUIRE mechanism for efficient querying in sensor networks”, in the Proceedings of the First International Workshop on protocols in wireless sensor networks. [17]. A. Manjeshwar, D. P Agarwal, “TEEN: A routing protocol for enhanced efficiency in wireless sensor networks”, First International workshop on parallel and distributed computing issues in wireless networks and mobile computing, April 2001. [18]. Raghunandan.G.H, Narendra. K, Varun V, “A Comparitive Analysis of energy efficient routing protocols in WSN”, Springer, Volume no.248, pp.399, 2014 Authors Biographies: Raghunandan G.H received B.E degree in Electronics and Communication Engineering from Visvesvaraya Technological University. He did his M.Tech in the field of Digital Electronics and communication from Visvesvaraya Technological University, Belgaum. He is currently working as Assistant Professor in Department of Telecommunication at BMS Institute of Technology and Management, Bengaluru. His areas of interest are Wireless Ad-Hoc and Sensor Networks. He has published 15 papers at International conferences and 8 papers in International journals. Archana A.R is pursuing B.E degree in Telecommunication from Visvesvaraya Technological University. Her area of interest includes wireless communication and networking. Rachana Pai is pursuing B.E degree in Telecommunication from Visvesvaraya Technological University. Her area of interest includes wireless communication and networking. Raksha Hegde is pursuing B.E degree in Telecommunication from Visvesvaraya Technological University. Her area of interest includes wireless communication and networking. T N Srinidhi is pursuing B.E degree in Telecommunication from Visvesvaraya Technological University. Her area of interest includes WSN.