IndexSummaryIntroductionLiterature ReviewRouting Protocols ApplicationsConclusion and Open IssuesSummaryIn this modern era of technology, where almost nothing can be achieved without communication. Therefore, it is important that information transferred over the Internet reaches its destination without major delays and/or corruption. A simple conversation in human language can be understood by us because we are self-aware and sentient, which is not the same case when it comes to computers since they cannot do anything by themselves. We must first define a set of rules for how data should be efficiently transferred into machine language. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get an original essay IntroductionThe Internet is a vast global interconnection of many computers that have many paths between them and which are then interconnected again by routers in between. It is the router's job to choose the optimal route to send the data to the destination, which is much shorter in distance and is easier to send. RPs use certain software or routing algorithms that define how data is transferred over a given network. Initially, when connected, routers exchange information between neighbors in the immediate vicinity. In this way they collect data on the general topology of the network. Later, when the optimal route becomes temporarily down due to a software/hardware malfunction, the router can still choose the second best route and so on to send the data smoothly. Literature Review The Routing Information Protocol (RIP) was the first RP ever created in the 1980s and the Interior Gateway Routing Protocol (IGRP), Open Shortest Path First (OSPF), and Intermediate System to Intermediate System (IS- IS). These are examples of Interior Gateway Protocols (IGP) that take place within the networks you manage. Outside this network, it is handled by the Exterior Gateway Protocol (EGP), for example: Border Gateway Protocol (BGP). Soon other RPs designed specifically for certain applications were implemented such as: Wireless Sensor Networks (WSN) [1] and Underwater Sensor Networks (UWSN). It is clear that based on the applications mentioned above, we can say that routing protocols can be further implemented and designed for future applications that require it. We will discuss this further in this report below. Applications of Routing Protocols From the recent IEEE 802.15.4 standard which led to the rapid growth of WSN. A WSN mainly consists of numerous sensor nodes of minimum power and cost installed over a region of interest. They perform simple tasks such as communicating with each other over a short distance, wirelessly to perform a specific common task, for example: environmental monitoring, etc. In these cases battery life is a crucial factor to carry out tasks for a long period of time, therefore, some energy efficient routing protocols have been designed. Low throughput affects wireless networks, but implementing wireless network encryption improves it. From the graph above we observe that it consumes a lot of energy in 3 out of 4 states. We need to optimize it in such a way that energy is conserved to increase the overall lifetime of a sensor node using the new efficient routing protocols. Classification of WSNs and Routing Protocols Used Opportunistic routing reduces redundant transmissions thus increasing overall reliability and efficiency. Layer Routing optimizes the energy consumption between communicating layers to achieveoptimal performance. Cooperative Routing comes under the above Routing which improves the spectral efficiency and overall transmission capacity. The principle of the biologically inspired Optimal Routing protocol was inspired by insects such as ants and bees which are generally used in simulations.Mobile Sink regulates the energy consumption between nodes thus avoiding the formation of energy holes due to reckless energy consumption.Mobile Sink and Source Manages both tracking information and routing tables.Multiple Mobile Sink deals with independent or isolated “sensor islands” that cannot move through.We have looked at the important RPs for understanding power-efficient routing for WSNs. Where we have classified them into homogeneous and heterogeneous WSNs where they are further divided into static and mobile WSNs. We also discussed protocol design and applications. UWSNs are useful for aquatic applications such as military, disaster prediction, resource monitoring, pollution and marine life monitoring, etc. The sensors of this network are installed at various depths to collect data and send it to its destination. It could be a sink or a collective group of sinks. UWSNs use acoustic waves whose speed in water is around 1500 m/s, which introduces large propagation delays. When a vessel or entity of that size is near a UWSN, it could potentially disrupt communication between these nodes, leading to the formation of the void area and moves along with the obstacle. These void areas occur at shallow depths. The Geographic Dflood (GDflood) protocol uses the node's data location to minimize the number of relays that occur in the forwarding process. Using this data, the nodes closest to the destination are involved in the forwarding process. A GDflood, just like a simple network, consists of a source address, a destination address, a sequence number, and a hop count. Before the actual transmission of a packet, the node first calculates the distance D between itself and the destination [4]. Later the distance is quantized into hop counts. Network Coding Dflood encodes incoming packets into one or more outgoing packets instead of the usual store and forward approach. In this way, the original data is shared between the encoded packets and the destination has a better chance of receiving at least one piece of information instead of redundant data from the same packet. The Void Management technique increases the node density thus reducing the presence of voids to a certain extent. Flooding involves multiple nodes to deliver packets, which further increases congestion and waste of network resources. The hybrid technique involves complexity but improves efficiency by using a variety of void management techniques. We discussed that our first idea is to determine the position of the node in the information transmission process. This way we can prevent the involvement of nodes that are further away from the destination. Conclusion and Open Issues We will now conclude this report by discussing some of the open issues to date and how they could be improved. We discussed that RPs for the homogeneous type are more widely discussed than the heterogeneous type, and compared to the static WSN and mobile WSN, the latter has more advantages for guaranteed real-time delivery along with energy saving, large area of coverage and efficiency, but it comes at a cost. Using a reliable routing metric is very important to measure capacity and overall routing in WSNs. Heterogeneity also requires study because it is complex and implementation costs are currently high. THE.
tags