UNIT-III
Routing Protocols
Wireless Sensor Networks
• A wireless sensor network (WSN) consists of spatially distributed
autonomous sensors to monitor physical or Environmental conditions, such
as temperature, sound, vibration, pressure, motion or pollutants and to
cooperatively pass their data through the network to a main location .
Routing Protocols
• In multi-hop communication the sensor nodes not
only produce and deliver their material but also
serve as a path for other sensor nodes towards the
base station.
• The process of finding suitable path from source
node to destination node is called routing and this
is the primary responsibility of the network layer.
• The categories of routing protocols are network
based organization, operation and route discovery.
Classification Of Routing
Protocols
• Routing techniques are required for sending data
between sensor nodes and the base stations for
communication.
Routing Protocols can be classified :
• Based on Mode of functioning and type of target
applications into Proactive, Reactive and Hybrid.
• Based on Participation style of the nodes into as
Direct Communication, Flat and Clustering Protocols .
• Depending on the Network Structure as
Hierarchical, Data Centric and Location based
Proactive, Reactive and Hybrid
• In a Proactive Protocol the nodes switch on their sensors
and transmitters, sense the environment and transmit
the data to a BS through the predefined route.
The Low Energy Adaptive Clustering hierarchy
protocol (LEACH) utilizes this type of protocol.
• In Reactive Protocol if there are sudden changes in the
sensed attribute beyond some pre-determined
threshold value, the nodes immediately react. This type
of protocol is used in time critical applications
The Threshold sensitive Energy Efficient sensor
Network(TEEN) is an example of a reactive protocol.
• Hybrid Protocols Incorporate both
Proactive and Reactive concepts.
• They first compute all routes and then
improve the routes at the time of routing.
Adaptive Periodic TEEN(APTEEN) is an
example of Hybrid Protocols.
Direct Communication, Flat and Clustering
Protocols
• In Direct Communication Protocols, any node can send
information to the BS directly.
When this is applied in a very large network, the energy of
sensor nodes may be drained quickly.
Its scalability is very small.
SPIN is an example of this type of protocol.
In the case of Flat Protocols, if any node needs to transmit
data, it first searches for a valid route to the BS and then
transmits the data.
• Nodes around the base station may drain their energy quickly.
• Its scalability is average.
• Rumor Routing is an example of this type of protocol
• According to the clustering protocol, the total
area is divided into numbers of clusters.
• Each and every cluster has a cluster head
(CH) and this cluster head directly
communicates with the BS.
• All nodes in a cluster send their data to their
corresponding Cluster Head.
The Threshold sensitive Energy Efficient sensor
Network(TEEN) is an example of a clustering protocol.
Data Centric, Hierarchical and
Location based
• Data centric protocols are query based and they depend
on the naming of the desired data, thus it eliminates
much redundant transmissions.
• The BS sends queries to a certain area for information
and waits for reply from the nodes of that particular
region.
• Depending on the query, sensors collect a particular data
from the area of interest.
• This particular information is only required to transmit to
the BS and thus reducing the number of transmissions
• ◦ SPIN was the first data centric protocol
• Hierarchical routing is used to perform energy
efficient routing.
• Higher energy nodes can be used to process and
send the information and low energy nodes are used
to perform the sensing in the area of interest
examples: LEACH, TEEN, APTEEN
• Location based routing protocols need some
location information of the sensor nodes.
• Location information can be obtained from GPS
signals, received radio signal strength, etc.
• Using location information, an optimal path can be
formed without using flooding techniques.
GEAR is an example of a location based routing protocol.
MAC protocols-Introduction
• The MAC protocol provides a channel of access and an
addressing mechanism, so that each available node on
the network may communicate with other nodes which are
available – either on the same network, or on others.
• These are as following below.
• Contention-based protocols without
reservation/scheduling – Bandwidth are not reserved. ...
• Contention-based protocols with reservation mechanisms
– Bandwidth is reserved for transmission. ...
• Contention-based protocols with scheduling mechanisms
– ...
• Other protocols –
• MAC protocol is the first protocol layer above the Physical
Layer in ad hoc .The primary task of any MAC protocol is to
control the access of the nodes to shared medium.
Classification of MAC protocols :
These are as following below.
1) Contention-based protocols without
reservation/scheduling –Contention means competition for resources. The
term is used especially in networks to describe the situation where two or more nodes
attempt to transmit a message across the same wire at the same time
– Bandwidth are not reserved.
– No guarantees.
2. Contention-based protocols with reservation
mechanisms –
• Bandwidth is reserved for transmission.
• Guarantees can be given.
3. Contention-based protocols with scheduling
mechanisms –
• Distributed scheduling is done between
nodes.
• Guarantees can be given.
4. Other protocols –Hybrid MAC Protocols
• Combine multiple features of other protocols.
• It can also use a completely new approach.
Contention based MAC protocol
• S-MAC
• B-MAC
S-MAC
• S-MAC is a medium-access
control(MAC) protocol designed for wireless sensor
networks. Wireless sensor networks use battery-operated
computing and sensing devices. ... Inspired by PAMAS
(PAMAS: Power Aware Multi-Access ), S-MAC also sets the
radio to sleep during transmissions of other nodes.
• SMAC stands for Sensor-MAC protocol, which is designed
on the basis of periodic listen-sleep mechanism of nodes
for avoiding energy wastage because of idle listening.
• SMAC reduces energy consumptions because of collision,
overhearing, control packet overhead and idle listening.
• Basic Idea
• Trades energy efficiency for lower
throughput and higher latency
● Main Components
Periodic Listen and Sleep
Collision Avoidance
Overhearing Avoidance
Message Passing
Periodic Listen and Sleep
• Nodes periodically sleep
Turn off radio when sleeping
Reduce duty cycle to ~10% (150ms on vs. 1.5s off)
● Trades energy efficiency for lower throughput and higher
latency
Collision Avoidance
• Similar to IEEE 802.11
Virtual Carrier Sense-virtual carrier sense is a mechanism to
predict future traffic in wireless networks that uses carrier
sense multiple access with collision avoidance (CSMA/CA). It is
implemented in wireless network protocols, IEEE 802.11 and
IEEE 802.16, which operates in the medium access control
(MAC) layer.
NAV (Network Allocation Vector) --In virtual channel sensing,
a timer mechanism is used that is based upon information of
durations of previous frame transmission in order to predict
future traffic in the channel. It uses network allocation vector
(NAV), which can be considered as a counter that counts down
to zero.
Physical Carrier Sense-Physical carrier sense is
performed constantly by all Wi-Fi radios that are
not transmitting or receiving. When a station
performs a physical carrier sense, it is actually
listening to the channel to see whether any other
RF transmissions are occupying the channel.
Four-way handshake--The 4-way handshake is the
process of exchanging 4 messages between an access
point (authenticator) and the client device (supplicant) to
generate some encryption keys which can be used to
encrypt actual data sent over Wireless medium
RTS/CTS/DATA/ACK --RTS/CTS (Request to Send / Clear
to Send) mechanism is a reservation scheme used in
the wireless networks.
Overhearing Avoidance
• Basic Idea
A node can go to sleep whenever its neighbour is
talking with another node
• Who should sleep?
The immediate neighbours of sender and receiver
● How to they know when to sleep?
By overhearing RTS or CTS
● How long should they sleep?
NAV
Message Passing
• How to transmit a long message?
Transmit it as a single long packet
Easy to be corrupted
• Transmit as many independent packets
Higher Control Overhead & Longer Delay
Divide into fragments, but transmit all in burst
B-MAC Protocol
• Medium Access Control (MAC) is an important technique
that ensures the successful operation of WSN because it
controls the radio's activity of sensor nodes, which
consumes node's major energy.
• MAC protocols must be energy efficient in wireless
sensor networks.
• B-MAC (short for Berkeley MAC) is a widely used WSN
MAC protocol; it is part of TinyOS.
• It employs low-power listening (LPL) to minimize power
consumption due to idle listening. Nodes have a sleep
period, after which they wake up and sense the medium for
preambles (clear channel assessment - CCA.)
• B-MAC is implemented in TinyOS
• Major Feature: reconfigurable
• Above B-MAC, one can implement an RTS-CTS
• scheme or a TDMS-like scheduling protocol
• A small core of media access functionality
arbitration, reliability, low power
communication
IEEE 802.15.14 Standard and Zigbee
Why in WSN??
IEEE 802.15.14 Standard and Zigbee
• IEEE 802.15.14 standard
• The IEEE 802.15. 14 standard [3] is the basis for
the Bluetooth wireless communication
technology.
• Bluetooth is a low tier, ad hoc, terrestrial,
wireless standard for short
range communication.
• It is designed for small and low cost devices
with low power consumption.
• IEEE 802.15. 4 is a low-data rate wireless personal area
network and is the PHY and MAC layer used by many IoT
protocols, such as ZigBee, and WirelessHART.
• IEEE 802.15. 4 is a technical standard which defines the
operation of low-rate wireless personal area networks (LR-
WPANs). It specifies the physical layer and media access
control for LR-WPANs, and is maintained by the IEEE 802.15
working group, which defined the standard in 2003.
• While ZigBee is the most notable example of the use of
the base 802.15. 4 standard, other protocols are defined
for specific applications. ... 11a industrial control standard
is used in process control applications.
• It adds channel hopping, variable time-slot multiplex
options, and mesh networking to the 802.15