Wireless Sensor Network notes
Wireless Sensor Network notes
UNIT 2
Geographic Routing Protocol
1. Initialization:
● Location Acquisition: Each sensor node obtains its own location information.
This can be achieved through GPS, localization algorithms using anchor nodes
2. Packet Forwarding:
● Greedy Approach: The source node initiates the routing process by examining
its neighbors' locations. It chooses the neighbor closest to the destination based
○ Nearest Neighbor: Selects the neighbor with the shortest physical distance
to the destination.
● Data Packet Structure: The data packet typically includes the source and
destination locations along with the actual payload (data being sent). This allows
● Next Hop Selection: The chosen neighbor becomes the next hop. The packet is
forwarded to this neighbor, and the process repeats. The next hop continues by
examining its own neighbors and selecting the one closest to the destination
based on the same forwarding function.
defined around the destination. Nodes within the GFZ might employ different
transmission errors.
4. Handling Challenges:
● Void Holes: Areas lacking sensor nodes can create regions where no neighbor
come into play. Nodes periodically share location information with neighbors,
allowing for the discovery of alternate paths around the void hole.
Techniques like data fusion from multiple sources or averaging location estimates
Both gossiping and flooding are techniques used for data dissemination in geographical
routing protocols, but they differ in their approach and efficiency. Here's a breakdown:
Flooding
● Concept: In flooding, a node receiving data blindly forwards it to all its neighbors.
This process continues until the data reaches the destination or a pre-defined
● Working:
○ A source node initiates by sending the data packet to all its neighbors.
○ Each neighbor receiving the packet for the first time repeats the process,
reached.
● Advantages:
○ Guaranteed delivery (if the destination is within the network and hop limit).
○ Simple to implement.
● Disadvantages:
○ Implosion: Nodes can receive redundant copies of the same packet from
multiple neighbors.
traffic.
Gossiping
● Working:
○ The source node initiates by sending the data packet to some of its
neighbors.
● Advantages:
compared to flooding.
○ Uncertain delivery: There's no guarantee that the data will reach all
to flooding.
Comparison Chart
The choice between flooding and gossiping depends on your specific needs:
might be suitable.
● For resource-constrained environments like sensor networks, gossiping
guarantees.
Many geographical routing protocols leverage a hybrid approach, using flooding for
initial route discovery and gossiping for updates or data dissemination within
established routes.
Gossiping
Flooding
Designed for networks like wireless sensor networks (WSNs) and mobile ad-hoc
networks (MANETs) where nodes are resource-constrained and rely on batteries. These
decisions about forwarding packets. This helps them choose paths closer to the
nodes before forwarding a packet. This ensures nodes with higher energy levels
● Two-Phase Routing:
geographic information and energy data of its neighbors to select the next
hop that's closer to the destination and has sufficient energy. This process
might be used to deliver the data to the specific destination node within
the region. This avoids unnecessary flooding across the entire network.
shorter paths, GEAR helps conserve energy and extend network lifetime.
● Scalability: Geographic routing inherently scales well as nodes can make
network-wide knowledge.
routing prioritizes the data itself. Here are the key points:
● Focus on Data Attributes: Nodes advertise and request data based on its
they possess the data or can potentially reach a node that does. They store
● Data Aggregation: As data travels back to the sink, intermediate nodes can
● Reinforcement: Once a data source is found, the sink reinforces the path by
unnecessary transmissions.
demands.
● Energy Efficiency: Aggregation reduces data volume, leading to lower energy
consumption.
Directed Diffusion
Unlike traditional routing where specific nodes are addressed, directed diffusion focuses
● Sink Initiates: The process starts at the sink node, which is the point where data
is collected.
description of the desired data. This interest includes attributes and values
specifying what type of data is needed (e.g., temperature > 80 degrees Celsius).
● Interests Propagate: Sensor nodes receiving the interest examine it. If a node
participate.
● Data Generation: Sensor nodes that can directly sense the data required in the
data back towards the sink, following the path created by the interest.
● Data Messages: These are the actual sensor readings or processed information
● Gradients: These represent the path information guiding data flow towards the
sink.
● Energy Efficiency: Nodes only transmit data relevant to the interest, reducing
● Scalability: The protocol can adapt to changing network conditions and data
requirements.
communication overhead.
SPIN in Wireless Sensor Networks (WSNs)
for WSNs to address the crucial challenge of energy conservation. WSNs consist of
These nodes are often battery-powered and deployed in remote locations, making
● For instance, instead of transmitting the raw temperature reading, a node might
2. Data Request (REQ): Neighboring nodes receive the ADV message and
requires information beyond what the metadata offers), it sends a REQ message
3. Data Transmission: Upon receiving a REQ, the source node transmits the
Benefits of SPIN
information reaches only the nodes that need it. This is particularly beneficial in
scenarios where sensor data has varying degrees of importance across the
network.
Addressing Challenges
delivery.
Rumor routing is a data-centric routing protocol specifically designed for WSNs. Unlike
traditional routing protocols that focus on sending data from a specific source to a
specific destination, rumor routing is concerned with events happening within the
Concept:
● The core idea is to establish paths towards ongoing events in the network. These
● Later, when a node has a query related to the specific event, the query can be
Components:
● Agents: These are special long-lived packets that travel through the network.
When an event happens, a node creates an agent and injects it into the network.
● Event Table: Each node maintains a table containing information about local
events and the direction (neighbor) from which it heard about them.
How it Works:
1. Event Detection: When a sensor node detects an event (e.g., temperature rise),
detecting node. This random walk continues for a set number of hops or until a
3. Path Formation: Nodes that receive the agent for the first time add the event
and the direction they received it from (neighbor) to their event table. This
5. Query Routing: The query is forwarded through the network using a random
walk.
6. Event Response: When a node on the pre-established event path (learned from
the agent) receives the query, it can respond with the event details directly (if it
witnessed the event) or forward the query in the direction of the event source
Advantages:
● Energy Efficiency: Compared to flooding the entire network with queries, rumor
relevant events.
● Scalability: The protocol can adapt to network changes and node failures as
Disadvantages:
● Overhead: Creating and propagating agents can introduce some initial overhead
on the network.
● Delivery Reliability: There's no guarantee that a query will always reach the
event source, especially for sparsely populated areas or highly mobile nodes.
The graph compares the efficiency of rumor routing against query flooding in a Wireless
● X-axis: Shows the range or "spread" of rumor routing (likely number of hops
traveled by agents).
Key takeaway: Rumor routing uses fewer transmissions than flooding, especially at a
low range. However, flooding guarantees queries reach all relevant nodes, while rumor
routing's success depends on its range setting. A higher range in rumor routing
Overall, the graph suggests rumor routing offers a good balance between saving energy
(fewer transmissions) and finding the information a node needs (compared to flooding).
Gradient Routing:
Concept:
Gradient routing is a routing protocol designed for WSNs, particularly useful for
single sink node. It works by assigning a scalar value, called a "height," to each sensor
node. These heights create a metaphorical "elevation" in the network, with values
Height Calculation:
The height of a node is calculated using a cost function. This function can consider
● Hop count: Simplest approach, assigns height based on the number of hops from
the sink.
● Energy consumption: Height reflects the energy spent reaching the sink.
Forwarding Process:
With heights assigned, routing becomes straightforward. Each node forwards data to its
neighbor with the lowest height (think "downhill"). This ensures packets travel towards
Benefits:
can recalculate their heights and neighbors can update their forwarding
decisions.
Example:
Imagine a WSN with a central sink (height = 0). Nodes further away are assigned
progressively higher values based on the chosen cost function. When a sensor (height
= 3) needs to send data, it forwards it to its neighbor with the lowest height (e.g., height
= 2). This process continues until the data reaches the sink.
COUGAR
Database Approach:
● Instead of traditional routing protocols where each node needs to know the path
database.
● Users interact with the network using declarative queries, specifying the data
● The network handles the query execution plan, including identifying relevant
Benefits:
Drawbacks:
● Overhead: An additional query layer introduces overhead in terms of energy
ACQUIRE
Core Function:
data delivery path from source (sensor with relevant data) to the sink
Process:
1. Query Initiation: The sink broadcasts a query specifying the desired data type
2. Negotiation: Sensor nodes that possess the requested data or are capable of
includes the data type, cost (energy required for transmission), and reliability of
the path.
3. Path Establishment: Nodes negotiate with their neighbors, evaluating factors like
cost, reliability, and potential for data aggregation (combining data from multiple
Strengths of ACQUIRE:
● Scalability: ACQUIRE adapts well to network size and varying data demands.
Limitations:
energy consumption.
● Latency: Establishing paths through negotiation might add a slight delay to data
delivery.
WSNs:
protocol specifically designed for WSNs to improve their lifetime by optimizing energy
Goal:
LEACH aims to distribute the energy load of data transmission uniformly across the
sensor nodes in the network. This is achieved by creating clusters and assigning
● Base Station (Sink): This is a central point that collects data from the sensor
nodes.
● Cluster Head (CH): These are sensor nodes elected periodically to collect data
from other sensor nodes within their assigned cluster and transmit it to the base
● Cluster Member: These are regular sensor nodes that sense data and transmit it
Operation:
1. Set-up Phase:
head in the current round. This decision is based on a threshold value that
considers the optimal number of cluster heads and the node's residual
energy.
the network.
○ Regular sensor nodes join the cluster of the closest cluster head based on
2. Steady-State Phase:
○ Cluster members transmit their sensed data to their assigned cluster
head.
Benefits:
● Load Balancing: The probabilistic election of cluster heads helps distribute the
Limitations:
● Static Cluster Formation: Clusters remain fixed for a certain period, which might
● Single Base Station: LEACH is primarily designed for networks with a single base
station.
Further Developments:
LEACH has served as a foundation for many improved routing protocols in WSNs.
These protocols address limitations like static clusters and single-hop communication by
another hierarchical routing protocol designed for WSNs. Similar to LEACH, it focuses
Goal:
PEGASIS aims to create a single chain of sensor nodes where data from each node
travels along the chain towards a designated head node responsible for transmitting it to
Network Hierarchy:
● Base Station (Sink): This is a central point that collects data from the sensor
nodes.
● Chain Leader: This is a single sensor node elected at the end of the chain to
Operation:
PEGASIS employs a greedy algorithm to form a chain structure. Here's a simplified
explanation:
1. Each node calculates a probability of becoming the chain leader based on its
distance to the furthest node in the network. Nodes closer to the periphery have
2. Nodes communicate with their neighbors, and each node chooses the neighbor
3. This process continues until all nodes are connected in a single chain, with the
Benefits:
base station, data travels shorter distances along the chain, leading to lower
energy consumption.
Limitations:
● Single Chain: A single long chain might not be optimal for all network
deployments, especially for large and unevenly distributed sensor nodes. Nodes
● Static Chain: Chains are typically reformed periodically, but they might not adapt
node.
● Structure: PEGASIS uses a chain structure, while LEACH uses clusters with
cluster heads.
WSNs compared to LEACH. However, the single chain structure can lead to
There are also several variations of PEGASIS that address limitations like the single
chain by introducing concepts like multi-hop communication or chain breaks for data
Suitability for Less suitable for dynamic Can be adapted with chain
Mobility node movement breaks
cluster heads.
● PEGASIS might be more efficient for very large networks due to its simpler
structure.
● Both protocols have been foundational for further advancements in WSN routing
protocols.