A Perspective Analysis of routing protocols in wireless sensor network
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 8
Abstract
The Recent Advances in Wireless Sensor Networks which have led to many new protocols specifically designed for sensor networks where energy awareness is an essential consideration. It is necessary to identify the performance challenges of WSN and analyze their impact on the performance of routing protocols. It surveys recent routing protocols for sensor networks and presents a classification for the various approaches pursued. Due to the limited processing power, finite power available to each sensor node, regular ad hoc routing techniques cannot be directly applied to sensor networks domain. These energy-efficient routing algorithms suitable to the inherent characteristics of these types of networks are needed. Routing algorithms must also be robust to failures, and provide low latency. This paper makes a performance comparison of three sensor network routing rotocols, namely, Rumor routing, Stream Enable Routing (SER) and SPIN (Sensor Protocols for Information Via Negotiation). These protocols are classified on the based on data-centric, hierarchical and location-based. The erformance of these protocols are compared by Simulation Parameters like Agents per Events, Agent TTL, Query Delivery, Cycle rate
Authors and Affiliations
V. Vasanthi , P. Nagarajan , B. Bharathi , Dr. M. Hemalatha
A Survey on Service Oriented Architecture and Metrics to Measure Coupling
One of the goals of Service-Oriented Computing (SOC) is to design loosely coupled modules or services in the system, so that any changes or modifications to a module or service during maintainability would not effect the...
Generation of a pool of variable size symmetric keys through Image
This paper introduces a new concept of the generation of a unending pool of keys through an image leaving behind the idea of sending keys every time for encryption and decryption. This can help in avoiding the problem of...
SECURITY MEASURES OF RANDVUL KEYBOARD
Phishing is a “con trick” by which consumers are sent email urporting to originate from legitimate services like banks or ther financial institutions. Phishing can be thought of as the marriage of social gineering an...
FUZZY LOGIC BASED SOFTWARE PROCESS IMPROVIZATION FRAMEWORK FOR INDIAN SMALL SCALE SOFTWARE ORGANIZATIONS
In this paper, the authors elaborate the results obtained after analyzing and assessing the software process activities in five small to medium sized Indian software companies. This work demonstrates a cost effective fra...
MESSAGE INDUCED SOFT CHEKPOINTING FOR RECOVERY IN MOBILE ENVIRONMENTS
Checkpointing is one of the commonly used techniques to provide fault tolerance in distributed systems so that the system can operate even if one or more components have failed. However, mobile computing systems are cons...