International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 109

Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014


Study of Greedy Forwarding Strategy in Under Water Wireless Sensor Networks

Girish Khorate | Urmila Biradar


Abstract: Terrestrial sensor networks are somehow same as Under Water Sensor Networks (UWSN), have different troubles, for instance, limited transmission limit and less battery power. A huge issue in UWSN is finding a viable route between a source and an objective. Subsequently, unfathomable consultations have been made for arranging capable traditions while considering the intriguing characteristics of underwater correspondence. In this paper we focus on the geographic steering traditions. We moreover showed a novel exploratory order of various routing in which the techniques are as into three classes VBF, HHVBF, REBAR according to their sending strategies.


Keywords: UWSN, VBF, HH-VBF, REBAR, Greedy


Edition: Volume 3 Issue 12, December 2014,


Pages: 1133 - 1136


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Girish Khorate, Urmila Biradar, "Study of Greedy Forwarding Strategy in Under Water Wireless Sensor Networks", International Journal of Science and Research (IJSR), Volume 3 Issue 12, December 2014, pp. 1133-1136, https://www.ijsr.net/get_abstract.php?paper_id=SUB14641

Similar Articles with Keyword 'UWSN'

Downloads: 121

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2830 - 2835

A Secure and Localized Cluster based Underwater Sensor Network

Neha N. Telrandhe | N. A. Chavhan [2]

Share this Article

Downloads: 124

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 50 - 54

Time Synchronized Fair Data Transmission in Secure UWSNs

Sushma.V | Shanthi.M.B

Share this Article
Top