Professional Documents
Culture Documents
Abstract:
A wireless sensor network is a large aggregation of sensor motes with boundary of power
supply and constrained computational capability. Due to the restricted transmission range and
large density of sensor motes, packet forwarding in sensor networks is usually performed
through multi-hop data transmission. Geographic routing is the technique to deliver a message to
a node in a network over multiple hops. The problem of geographic routing is that packets may
be routed to a dead end. This is called as void problem. The void may be a calamity area where
all sensors are destroyed, or it may be a bay where the sensors cannot survive. Once a packet is
routed to the dead end, it cannot continue further. Our existing method, hybrid source routing
protocol (HSR) can effectively avoid the void, to ensure data transmission. Furthermore, due to
mobility of the nodes more energy is consumed. So in the proposed system a new technique
lightweight proactive source routing (LPSR) protocol is considered. A Statistical result shows
that when compared to the existing method there is less energy consumption, less overhead and
high network lifetime in the proposed system.
The emerging field of wireless sensor destination. While the capabilities of any
networks combines sensing, computation, single device are minimal, the composition
and communication into a single tiny device. of hundreds of devices offers radical new
protocols, these devices form a sea of wireless sensor networks lies in the ability to
connectivity that extends the reach of deploy large numbers of tiny nodes that
cyberspace out into the physical world. As assemble and configure themselves. Usage
water flows to fill every room of a scenarios for these devices range from real-
connectivity will seek out and exploit any environmental conditions, to ubiquitous
equipment. While often referred to as and communicating with each other via
wireless sensor networks, they can also wireless transceivers. The collected data will
control actuators that extend control from be delivered to one or more sinks, generally
cyberspace into the physical world. via multi-hop communication. The sensor
nodes are typically expected to operate with
batteries and are often deployed to not-
easily-accessible or hostile environment,
sometimes in large quantities. It can be
difficult or impossible to replace the
Fig 1.1 Data Communication
batteries of the sensor nodes. On the other
Fig 1.1 illustrates that the Current wireless hand, the sink is typically rich in energy.
systems only scratch the surface of Since the sensor energy is the most precious
possibilities emerging from the integration resource in the WSN, efficient utilization of
of low-power communication, sensing, the energy to prolong the network lifetime
energy storage, and computation. Future has been the focus of much of the research
devices will continue to be smaller, cheaper on the WSN.The communications in the
and longer lasting. Generally, when people WSN has the many-to-one property in that
consider wireless devices they think of items data from a large number of sensor nodes
such as cell phones, personal digital tend to be concentrated into a few sinks.
assistants, or laptops with 802.11. These Since multi-hop routing is generally needed
items costs hundreds of dollars, target for distant sensor nodes from the sinks to
specialized applications, and rely on the pre- save energy, the nodes near a sink can be
deployment of extensive infrastructure burdened with relaying a large amount of
support. In contrast, wireless sensor traffic from other nodes.
networks use small, low-cost embedded Geographicrouting (alsocalled georouting
devices for a wide range of applications and or position-basedrouting)is a routing
do not rely on any pre-existing principle that relies on geographic position
infrastructure. Wireless sensor network information. It is mainly proposed
(WSN) consists of sensor nodes capable of for wireless networks and based on the idea
collecting information from the environment that the source sends a message to the
geographic location of the destination and delivery ratio, average hop is increased
instead of using the network address. in the proposed work.
. Geographic routing requires that II.RELATED WORKS
each node can determine its own location In [1] Cadger F., Curran K., Santos
and that the source is aware of the location J., and Moffett S. Proposed the method for
of the destination. With this information a “A survey of geographical routing in
message can be routed to the destination wireless ad-hoc networks”. Geographic
without knowledge of the network topology routing protocols have been designed for a
or a prior route discovery. There are various variety of applications ranging from
approaches, such as single-path, multi-path mobility prediction and management
and flooding-based strategies (see for a through to anonymous routing and from
survey). Most single-path strategies rely on energy efficiency to QoS. Geographic
2 techniques: greedy forwarding and face routing is also part of the larger area of
routing. Greedy forwarding tries to bring context-awareness due to its usage of
the message closer to the destination in each location data to make routing decisions and
step using only local information. Thus, thus represents an important step in the
each node forwards the message to the journey towards ubiquitous computing. Ad-
neighbor that is most suitable from a local hoc networks are typically decentralized and
point of view. The most suitable neighbor do not feature dedicated devices with
can be the one who minimizes the distance defined roles such as routers or switches.
to the destination in each step (Greedy). In Instead all participating nodes act as both
this Paper we introduced Lightweight routers and end-users. As devices are limited
proactive source routing (PSR) protocol . by their radio range ad-hoc networks
PSR can maintain more network topology typically employ strategy known as multi-
information than distance vector (DV) hopping in which a source node will send a
routing to facilitate source routing.PSR has message to the destination by passing it to a
much smaller overhead than other routing series of intermediate node. Although ad-
protocols and also reduces the energy hoc networks have the potential for use in a
consumption. The delay time is decreased wide range of application scenarios as
diverse as battlefield communications and
smart home environments, they also have Aware Routing (TAR) protocol that
some drawbacks. However, if a routing efficiently encodes a network topology into
void, called local minimum, is encountered a low-dimensional virtual coordinate space
resulting from the random distribution of where hop distances between pair wise
sensor nodes, the greedy algorithm in nodes are preserved. Based on precise hop
geographic routing will fail, and ultimately distance comparison, TAR can assist greedy
data transmission also fails in such situation. forwarding to find the right neighbor that is
In [2] Huang.P, Wang.C, and one hop closer to the destination and achieve
Xiao.L introduces an Improving End-to- high success ratio of packet delivery without
End Routing Performance of Greedy location information. Further, it improves
Forwarding in Sensor Networks .Greedy the routing quality by embedding a network
forwarding is a simple yet efficient topology based on the metric of expected
technique employed by many routing transmission count (ETX). ETX embedding
protocols. It is ideal to realize point-to-point accurately encodes both a network’s
routing in wireless sensor networks because topological structure and channel quality to
packets can be delivered by only nodes’ small size virtual coordinates, which
maintaining a small set of neighbors’ helps greedy forwarding to guide a packet
information regardless of network size. It along the optimal path that has the fewest
has been successfully employed by number of transmissions.
geographic routing, which assumes that a In [3] Noh.Y, Lee.U, Wang.P,
packet can be moved closer to the Choi.B.S.C, and Gerla.M , introduce a Void
destination in the network topology if it is aware pressure routing for underwater
forwarded geographically closer to the sensor networks. Underwater mobile sensor
destination in the physical space. however, networks have recently been proposed as a
may lead packets to the local minimum way to explore and observe the ocean,
where no neighbors of the sender are closer providing 4D (space and time) monitoring of
to the destination or low quality routes that underwater environments. The main
comprise long distance hops of low packet challenge of pressure routing in sparse
reception ratio. To address the local underwater networks has been the efficient
minimum problem, we propose a Topology handling of 3D voids. In this respect, it was
recently proven that the greedy stateless This work addresses the problem of
perimeter routing method, very popular in geographic routing in the presence of holes
2D networks, cannot be extended to void or voids in wireless sensor networks. It
recovery in 3D networks. Available postulates that, once the boundary of the
heuristics for 3D void recovery require hole has been established, relying on the
expensive flooding. It proposes a Void- existing algorithms for bypassing it may
Aware Pressure Routing (VAPR) protocol cause severe depletion of the energy
that uses sequence number; hop count and reserves among the nodes at (or near) that
depth information embedded in periodic boundary. This, in turn, may soon render
beacons to set up next hop direction and to some of those nodes useless for any routing
build a directional trail to the closest sono (and/or sensing) purposes, thereby
buoy. Using this trail, opportunistic effectively enlarging the size of the pre-
directional forwarding can be efficiently existing hole. To extend the lifetime of the
performed even in the presence of voids. nodes along the boundary of a given hole,
The contribution of VAPR has two folds: 1) the proposed scheme has two heuristic
a robust soft-state routing protocol that approaches which aim at relieving some of
supports opportunistic directional the routing load of the boundary nodes.
forwarding; and 2) a new framework to Towards that, some of the routes that would
attain loop freedom in static and mobile otherwise need to bypass the hole along the
underwater networks to guarantee packet boundary should instead start to deviate
delivery. Extensive simulation results show from their original path further from the
that VAPR outperforms existing solutions. hole. The proposed approaches not only
Beyond that, routing void problem still increase the lifetime of the nodes along the
exists around those established regions, and boundary of a given hole, but also yield a
that no further scheme is proposed to solve more uniform depletion of the energy
this problem. reserves in its vicinity.
In[4]Trajcevski.G,Zhou.F,Tamassia. In [5] Wang.X, Wang.J, Lu.K, and
R, Avci.B,Scheuermann.P, and Khokhar.A , Xu .Y, introduce a novel geographic K-any
studies the Bypassing holes in sensor cast routing for wireless sensor networks. To
networks using Load-balance vs. latency. efficiently archive and query data in
individual is selected from the group as Sensor Networks (UASNs) have recently
the leader which is the global optimal been attracted significant attention from
solution of the optimization problem by both academia and industry for resources
evaluating each leader candidate's ability. In exploration and for scientific data gathering
order to accelerate the leader's campaign and in underwater environments. The
the evolutionary rate in the later period of important characteristic of a UASN is that
LIS, the simple Minimum Mean Square most underwater acoustic sensor nodes
Error (MMSE) algorithm or the have a certain beam width and a three
Centroid algorithm is adopted to obtain an dimension direction, which is ignored by
initial coordinate as the initial leader of the existing underwater routing protocols.
LIS algorithm using the information of the This characteristic will reduce
anchor node coordinates and the ranging the network connectivity and cause a large
findings. By considering fully the distance number of asymmetric links, so it will lead
factor, an improved objective function is to sharp decline of the existing protocol
defined, so the node localization problem in performance. it develops a routing protocol
WSN could be transformed into a nonlinear to tackle this problem in UASNs .A link
unconstrained optimization problem. The detection mechanism is employed to get link
proposed LIS algorithm is used to solve this state information and an adaptive routing
problem, and the obtained solution is the feedback method is adopted to make full use
estimated value of the WSN node's of the underwater asymmetric link and save
coordinates. Compared with the Artificial energy. It was proposed a time-based
Bee Colony (ABC) algorithm, the Particle priority forwarding mechanism and utilize
Swarm Optimization (PSO) algorithm and downstream node table to prevent flooding,
the Genetic Algorithm (GA), the proposed and a credit-based routing table update
LIS algorithm is better than the others in mechanism is adopted to avoid energy
accuracy and calculation complexity. consumption caused by frequent update
In [10] Zhang.S, Li.D, and Chen.J of routing table. The proposed protocol is
introduce a link-state based adaptive comparedwitharepresentative routing protoc
feedback routing for under water acoustic ol for UASNs.
sensor networks. Underwater Acoustic
destination via light weight PSR protocol. Fig 4.2 exchange neighbor information
Here the proposed protocol checks if any Fig 4.2 illustrates the node exchange the
void occurs during data transmission and neighbor information from source to
also reduce the overhead and energy destination and destination to source. The
message is transfer between sources to
consumption. Finally it achieves the
destination using the neighbor information.
destination without void problem. Lightweight proactive source routing can
IV.SIMULATION RESULTS avoid the void and ensure the data
transmission.
Fig 4.1 illustrates the path update of node. Fig 4.3 illustrate that the packet will be
Each node in the network updates its own filtered when overhead occurs during data
routing path with node table. Consider node communication. Node 22 sent the packet via
22 as a source and a node 0 as the node 9.but node 9 contains numerous
destination. The data is transferred from packets for transmission. so source has to
source to destination. wait for its turn. then the overhead will be
occurred.LPSR omit the node 9 and also
filter the packets of Node 9.