blog




  • Essay / Advances in Routing Protocols

    Table of ContentsSummaryIntroductionLiterature ReviewApplications of Routing ProtocolsConclusion and Open QuestionsSummaryIn this modern technological era, where almost nothing can be achieved without communication. It is therefore important that information transferred over the Internet reaches its destination without major delays and/or corruption. A simple conversation in human language can be understood by us because we are self-aware and sentient, which is not the case when it comes to computers because they cannot do anything on their own . We first need to define a certain set of rules on how data should be transferred efficiently in machine language. Say no to plagiarism. Get a tailor-made essay on “Why Violent Video Games Should Not Be Banned”? Get the original essayIntroductionThe Internet is a vast global interconnection of many computers that have many routes between them, which are then interconnected again by intermediate routers. It is up to the router to choose the most optimal route to send the data to the destination, which is much shorter and easier to send. RPs use certain software or routing algorithms that define how data is transferred over a given network. First, once connected, the routers exchange information between neighbors in the immediate vicinity. They thus collect data on the general topology of the network. Later, when the most optimal path is temporarily unavailable due to software/hardware malfunction, the router can always choose the second best route and so on to send the data without any problem. Literature Review Routing Information Protocol (RIP) was the first RP ever created in the 1980s, followed by Interior Gateway Routing Protocol (IGRP), Open Shortest Path First (OSPF), and Intermediate System to Intermediate System ( IS-IS) quickly followed. These are examples of Interior Gateway Protocols (IGP) that take place inside the networks you administer. Outside of this network, it is managed by the Exterior Gateway Protocol (EGP), example: Border Gateway Protocol (BGP). Other RPs were quickly implemented, designed specifically for certain applications such as: wireless sensor networks (WSN) [1] and underwater sensor networks (UWSN). It is clear that based on the applications mentioned above, we can say that routing protocols can be implemented and designed for future applications that require the need. We will discuss this in more detail in this report below. Applications of Routing Protocols Since the recent IEEE 802.15.4 standard which has led to the rapid growth of WSN. A WSN mainly consists of many sensor nodes of tiny power and cost installed over a region of interest. They perform simple tasks such as communicating with each other over short distances, wirelessly to accomplish a specific common task, for example: environmental monitoring, etc. In such cases, battery life is a crucial factor to perform tasks for a long duration. ,Therefore, some energy-efficient routing protocols have been,designed. Low throughput affects wireless networks, but implementing wireless network coding improves it. From the above graph, it is observed that it consumes a lot of energy in 3 out of 4 states. We need to optimize it in such a way that energy is conserved to increase the overall lifetime of a node sensor using new efficient routing protocols. Classification of WSN androuting protocols usedOpportunistic routing reduces redundant transmissions, thereby increasing overall reliability and efficiency. Layered routing optimizes power consumption between communicating layers to achieve optimal performance. Cooperative routing falls under the above routing which improves spectral efficiency and overall transmission capacity. The principle of the biologically inspired optimal routing protocol was inspired by insects such as ants and bees that are typically used in simulations. Mobile Sink regulates power consumption between nodes, preventing the formation of holes energy due to careless power consumption.Mobile Sink and Source It manages both tracking information and routing tables. Many mobile sinks deal with independent or isolated “sensor islands” that cannot move. through.We have studied the important RPs to understand energy-saving routing for WSN. Where we have classified them into homogeneous and heterogeneous WSNs in which they are further divided into static and mobile. We also discussed protocol design and applications. UWSNs are useful for aquatic applications such as military, disaster forecasting, resource tracking, pollution and marine life monitoring, etc. The sensors in this network are installed at different depths to collect data. and send it to the destination. This can be a single sink or a collective group of sinks. UWSNs use acoustic waves with a speed of around 1,500 m/s in water, which introduces significant propagation delays. When a ship or entity of such size is near a UWSN, it could potentially disrupt the communication between these nodes, causing the empty zone to form and it to move with the obstacle. These empty zones occur at shallow depths. The Geographic Flooding (GDflood) protocol uses the location of node data to minimize the number of relays that occur during the transfer process. Using this data, the nodes closest to the destination are involved in the transfer process. A GDflood, just like a simple network, consists of a source address, a destination address, a sequence number and a hop count. Before the actual transmission of a packet, the node first calculates the distance D between itself and the destination [4]. Further, the distance is quantified in number of jumps. Network Coding Dflood encodes incoming packets into one or more output packets instead of the usual store-and-forward approach. This way, the original data is shared between the encoded packets and the destination has a greater chance of receiving at least one piece of information instead of redundant data from the same packet. The void management technique increases the density of nodes, thereby reducing the occurrence of voids to some extent. Flooding involves more nodes to deliver packets, further increasing congestion and wasting network resources. The hybrid technique involves complexity but improves efficiency by using a variety of void management techniques. We explained that our first idea was to determine the position of the node in the information relay process. By doing so, we can prevent the involvement of nodes that are further from the destination. Conclusion and Open Issues We will now conclude this report by discussing some of the open issues so far and how they could be improved. We have discussed the RPs for the homogeneous type which are more widely discussed in relation to the heterogeneous WSN and compared to the static WSN and the.