International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 121 | Views: 284 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper | Computer Science & Engineering | India | Volume 2 Issue 1, January 2013 | Popularity: 6.3 / 10


     

A Survey on Routing Protocols of Location Aware and Data Centric Routing Protocols in Wireless Sensor Network

Gayatri Prajapati, Palak Parmar


Abstract: Wireless sensor network consists of thousands of tiny nodes. The nodes in network are directly connected. Routing protocols are used to discovering and maintaining route in network. There are mainly three types of routing protocols i. e. proactive, reactive and hybrid. They are further classified in flat based, hierarchical based and location based routing protocols. In this paper we discuss location based routing protocols. Here we briefly discuss existing routing protocols their advantages and disadvantages and also open research issue on them.


Keywords: WSNs, routing protocols, sensor network, energy


Edition: Volume 2 Issue 1, January 2013


Pages: 128 - 133



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Gayatri Prajapati, Palak Parmar, "A Survey on Routing Protocols of Location Aware and Data Centric Routing Protocols in Wireless Sensor Network", International Journal of Science and Research (IJSR), Volume 2 Issue 1, January 2013, pp. 128-133, URL: https://www.ijsr.net/getabstract.php?paperid=IJSR13010164, DOI: https://www.doi.org/10.21275/IJSR13010164



Downloads: 656 | Views: 2004 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj


Downloads: 401 | Views: 722 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Computer Science & Engineering, India, Volume 7 Issue 11, November 2018

Pages: 1951 - 1955

Hadoop Performance Improvement using Metadata and Securing with Oauth Token

Swapnali A. Salunkhe, Amol B. Rajmane


Downloads: 386 | Views: 703 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1 - 3

Comparative Study of Conventional Desktop Computer and Compute Stick

Aadarsh Sooraj, Sooraj G.


Downloads: 354 | Views: 700 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 629 - 632

Review Paper on Secure Hashing Algorithm and Its Variants

Priyanka Vadhera, Bhumika Lall


Downloads: 336 | Views: 690 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2148 - 2152

The Impact and Application of 3D Printing Technology

Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera


Top