SlideShare a Scribd company logo
1 of 8
Download to read offline
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.6, November 2012
DOI : 10.5121/acij.2012.3609 75
Transmission Time and Throughput analysis of
EEE LEACH, LEACH and Direct Transmission
Protocol: A Simulation Based Approach
MEENAKSHI SHARMA
1
AND ANIL KUMAR. SHAW
2
1
Department of Computer Science and Engineering, SMIT, Majitar, Sikkim, India
menakshi219@gmail.com
2
Department of Electronics and Communication Engineering, NERIST, Nirjuli, India
anilshaw27@yahoo.com
ABSTRACT
This paper gives a brief description about some routing protocols like EEE LEACH, LEACH and Direct
Transmission protocol (DTx) in Wireless Sensor Network (WSN) and a comparison study of these
protocols based on some performance matrices. Addition to this an attempt is done to calculate their
transmission time and throughput. To calculate these, MATLAB environment is used. Finally, on the basis
of the obtained results from the simulation, the above mentioned three protocols are compared. The
comparison results show that, the EEE LEACH routing protocol has a greater transmission time than
LEACH and DTx protocol and with smaller throughput.
KEYWORDS
Data, EEE LEACH, transmission time, throughput
1. INTRODUCTION
Wireless Sensor Networks (WSN) consists of base stations (BS) and several sensor nodes which
are unattended and have limited energy resource and they can work until the energy exists
inside them [1] [7]. The sensors that are attached to the nodes are capable of sensing the data
from the environment in which they are deployed. The sensor nodes process data from the
environment and transmit them to the BS. The BS received those data from the sensor nodes.
This transmission and receiving operation is carried out by some transmitter circuits and
receiving circuits which are attached with the sensor nodes and base stations respectively. The
transmitter circuit uses more amount of energy as compared to the receiver circuit [1]. The
power dissipated in transmission and receiving is calculated with the help of the following
equations [1] [2] [6]:
Transmitting:
ETX (k,d ) = ETX – { (Eelec * k) + (Emp * k * d)}
ETX (k,d)= ETX – { (Eelec * k) + (Efs * k * d)}
Receiving:
ERX (k) = ERX - ( Eelec + EDA ) * k
Where,
Eelec denotes amount of Energy consumption per bit in the transmitter or receiver circuitry.
Emp Amount of energy consumption for multipath fading.
Efs Amount of energy consumption for free space.
EDA Data aggregation energy.
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.6, November 2012
76
Base station
There are several routing protocols exist in WSN and among them the hierarchical routing
protocols are the simplest, easiest and lots of research works are going on them. The well-
known Hierarchical routing protocols in WSN are LEACH, PEGASIS, TEEN, APTEEN etc.
and among them LEACH is the first and simplest hierarchical routing protocol [9] [10]. Several
modified versions of LEACH are proposed and among these all we are mainly concentrate on a
recently developed modified version of LEACH i.e. EEE LEACH protocol [2]. In this paper we
are trying to compare EEE LEACH protocol with LEACH and Direct Transmission protocol in
terms of their transmission time and throughput.
Transmission time is defined as the complete time taken to transmit data packet from source to
destination [5]. Throughput is defined as the number of packets transmitted over the network
per unit time period [5].
The section II consists of the brief description about the three routing protocols and their
comparison study. Section III represents the implementation details. In section IV simulation
results along with comparisons are discussed and in section V we conclude the paper.
2. BRIEF DESCRIPTION ABOUT THE PROTOCOLS
2.1. Direct Transmission Protocols (DTx)
This is the simplest routing protocol which consists of only BS and normal sensor nodes. The
sensor nodes act as senders and BS serves as the destination node to all the other sensor nodes
in the network. The sensor nodes transmit their data to the BS and the BS received these all. The
communication between the sensor nodes and BS is direct without any intermediate
communicator. The nodes only remain active during the data transmission to the base station.
Consequently, won’t spend energy on receiving the messages from the other nodes, but they
will only spend the minimum data on listening the channel and, therefore, they will spend their
battery capacity on sending messages to the base station [3]. On the other hand, when a sensor
node transmits data directly to the base station, the energy loss incurred can be quite extensive
depending on the location of the sensor nodes relative to the base station. As a result, the Direct
Transmission protocol’s complexity can be negligible and its implementation quasi-trivial, but it
is the least energy efficient protocol in most cases [3].
Figure 1: Architecture of Direct Transmission Protocol (DTx)
2.2. LEACH Protocol
LEACH stands for Low-Energy Adaptive Clustering Hierarchy. It is the first
hierarchical routing protocol in Wireless Sensor network. In this protocol nodes are
divided into only two types of categories; normal sensor nodes and cluster heads (CH).
At first the normal sensor nodes are grouped together and form clusters and among all
the sensor nodes in a cluster one node are selected as a CH node. The CH selection
procedure is a random selection procedure where every node is assign a random value
and this is compared with a threshold value (T(n)) [8][10]. If the node's random value is
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.6, November 2012
77
less than the T(n), then the respective node can act as a CH. The T(n) is calculated by
the following formula given in eq:1 [1] [2] [4] [6]. In this way, in each and every
cluster, there exists one CH.
Where,
n = given number of nodes.
p = the priori probability of a node being elected as a cluster-head.
r = a random number between 0 and 1 that is selected by a sensor node. If this
random number is less than the threshold value T(n), then the respective node becomes
the cluster-head.
G = the set of nodes that were not accepted as cluster head in the last “1/p”
events.
At first normal sensor nodes transmit their data to their respective CHs. On receiving
these data, the CHs aggregated them in a compressed form and further transmit them to
the BS. Finally BS received all compressed data from different CHs present in the
network.
Figure 2: Architecture of LEACH Protocol [2]
2.3. EEE LEACH Protocol
EEE LEACH or Energy Efficient Extended LEACH [2] is an approach of multilevel clustering
technique to increase energy efficiency by reducing its radio communication distance [4]. In this
multilevel clustering approach besides having a single layer of clusters formation between the
nodes and Base station like LEACH, it involves two layers of clusters formation [4]. In the first
layer CHs are formed where the normal nodes transmit their own data to their respective CH
and by using the fuse mechanism the CHs aggregate the received data. Again in the second
layer Master Cluster Heads (MCH) are formed. After the formation of MCHs, the CHs search
the nearest MCHs by calculating the distance between them and transmit their aggregate data to
the respective MCHs. In the similar way, the MCHs received data from their nearest CHs,
aggregate all received data, transformed them into a compress format and forward them to the
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.6, November 2012
78
base station (BS). The number of CHs and MCHs are initially decided by using a predetermined
fractional value i.e. p (election probability value) for CHs and pm (election probability value) for
MCHs. In EEE LEACH, the numbers of MCHs are kept less than the number of CHs to
minimize the overall communication distance between the nodes and Base station.
EEE LEACH protocol performs better network life-time and is more energy-efficient than
LEACH protocol [2].
Figure 3: Architecture of EEE LEACH Protocol [2]
Comparison between DTx, LEACH and EEE LEACH protocols [8] [9] [10]:
Table 1.Comparison Table for Different Hierarchical Routing Protocols
Protocol
Metrics
DTx LEACH EEE LEACH
Cluster Formation No Yes Yes
Chain Formation No No No
Cluster Head (CH) No Yes Yes
Master CH No No Yes
Data Aggregation No Yes Yes
Mobility Fixed BS Fixed BS Fixed BS
Scheduling TDMA TDMA, CDMA TDMA, CDMA
Network Lifetime Average Good Very Good
Energy Efficient Least Good Very Good
Communication Single-hop Single-hop Multi-hop
QoS No No No
2.4. Other Improved LEACH Protocols
Energy LEACH protocol and Multihop-LEACH protocol [11] improves choice method of the
cluster head and communication mode from single to multi-hop between cluster head and sink.
Both have better performance than LEACH protocols. Multihop-LEACH protocols survive
longer than energy-LEACH and LEACH protocol resulting in high throughput [11]. The effect
of the distance between base station and centre of gravity of distribution is studied in [12]. Its
affect in throughput is analysed. The closer is gives the better performance. The function of
lifetime and throughput of network to the time length of each round is studied in [13]. This
function can be used to enhance the lifetime and throughput of network. The overload energy
problem is solved by using E-LEACH [14] over LEACH protocol. It balances the energy
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.6, November 2012
79
consumption of sensor nodes. The link quality between the node evaluated based on the link
packet loss is shown in [15]. Considering packet loss in choosing the best communication path
has a significant impact on reducing the energy consumption of the network as well as
increasing network throughput [15].
3. IMPLEMENTATIONS DETAILS
The routing protocols DTx, LEACH and EEE LEACH have been simulated accurately in
MATLAB. These have been made assuming a network having dimensions 200 x 300 meters.
The number of nodes in each protocol is assumed to be 200. The cost of transmission and
receiving was calculated by the formulas mentioned above in the section I. The nodes are
generated and placed randomly. The parameters that are used to calculate the transmission time
and throughput are given below:
• Distance between the normal nodes and Bs.
• Distance between the normal node and CHs.
• Distance between the CHs and BS.
• Distance between the CHs and MCHs.
• Distance between the MCHs and BS.
• Speed of em waves.
• Size of the data packet
3.1. Simulation Parameter Table
Table 2.Simulation Parameters
Sl.
No.
Simulation Parameters and their Values
Parameters Value
1. Routing Protocols DTx, LEACH, EEE LEACH
2 Environment Size 200 x 300
3 Number of nodes 200
4 Packet Size 2000 bits
5 Speed of em wave 3 x 108
m / s
7
Election Probability value
of CHs (p)
10% to 30%
8
Election Probability value
of MCHs (pm)
2% to 15%
9 Number of rounds 5 to 10,000 rounds
10 Initial energy per node (E0) 1 J
11 Eelec 50 nJ / bit
12 Efs 10 pJ / bit / m2
13 Emp 0.0015 pJ / bit / m4
14 EDA 5 nJ / bit
3.2. Snapshot of the Routing Protocols
We simulated DTx, LEACH and EEE LEACH protocols in MATLAB simulator and their
simulated outputs are shown in figure 4, 5, 6 respectively.
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.6, November 2012
80
Figure 4: Direct Transmission Protocol Figure 5: LEACH Protocol [2]
Figure 6: EEE LEACH Transmission Protocol [2]
4. RESULTS AND DISCUSSIONS
Figure 7: Transmission Time Comparison Graph between EEE LEACH, LEACH and DTx
Figure 7 shows the comparison graph of EEE LEACH, LEACH and DTx protocol in terms of
their transmission time. Here we observe that after the completion of 10th round, EEE LEACH
protocol takes large transmission time to transmit data to the BS, whereas in case of LEACH
0 20 40 60 80 100 120 140 160 180 200
0
50
100
150
200
250
300
0 20 40 60 80 100 120 140 160 180 200
0
50
100
150
200
250
300
0 20 40 60 80 100 120 140 160 180 200
0
50
100
150
200
250
300
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.6, November 2012
81
and DTx protocol the transmission time is gradually decreases. The major reason behind this is
that in case of EEE LEACH protocol data have to travel two layers of clustering mechanism,
where in the first level they have to move from normal node to CHs and in second level from
CHs to MCHs. But in case of LEACH, data have to travel only one level and in DTx data can
directly reach to BS. Therefore EEE LEACH posses largest transmission time than LEACH and
DTx protocol
Figure 8: Throughput Graph Comparison between EEE LEACH, LEACH and DTx
Figure 8 depicts the comparison graph of the throughput values of the EEE LEACH, LEACH
and DTx protocol. Larger the transmission time, smaller the throughput and it becomes clear
from the formula used for throughput.
Throughput = (Size of the packet / Transmission time)
Since EEE LEACH protocol takes larger time to transmit data to the BS, so the amount of data
packets received by the BS per unit time is less than it is in LEACH and DTx protocol.
Therefore EEE LEACH protocol shows smaller throughput than LEACH and DTx protocol.
5. CONCLUSION
In this paper we have discussed three routing protocols i.e. EEE LEACH, LEACH and DTx in
Wireless Sensor Network and mainly focused on newly developed hierarchical routing protocol
EEE LEACH. It was already proposed that EEE LEACH has greater energy efficiency with
better network lifetime than LEACH protocol [2]. In this paper we tried to calculate it's
transmission time and throughput and compared the results with LEACH and one another
protocol i.e. DTx. Since EEE LEACH is more energy efficient and has shown better network
lifetime, but here we have found that EEE LEACH takes more time to transmit data to BS
which causes degradation of its throughput value. Therefore EEE LEACH protocol shows
inefficient result in case of transmission time and throughput
REFERENCES
[1] Kalpana Sharma, Anurag S. Rathor, S. R. Biradar, M.K Ghose, “Power-efficient Routing &
Increased Yield Approach For WSNs,” International Journal on Computer Science and
Engineering Vol. 02, No. 03, 2010, 586-592.
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.6, November 2012
82
[2] Meenakshi Sharma, Kalpana Sharma, “An Energy Efficient Extended LEACH (EEE LEACH)”,
2012 International Conference on Communication Systems and Network Technologies , IEEE
DOI 10.1109/ CSNT.2012.88 , Rajkot, INDIA.
[3] Pedro de la Fuente Aragón, “The improvements of power management for clustered type large
scope wireless sensor networks,” Warsaw university of technology, June 2010.
[4] Wairagu G. Richard, “Extending LEACH routing algorithm for Wireless Sensor Network,” Data
Communications Engineering, Makerere University, 2009.
[5] Rajesh Patel, Sunil Priyani, Vijay Ukani, “Energy and Throughput Analysis of Hierarchical
Routing Protocol (LEACH) for Wireless Sensor Network, “International Journal of Computer
Applications (975 – 8887) Volume 20– No.4, April 2011.
[6] Nidhi Barta, Anuj Jain, Surender Dhiman, “An Optimized Energy Efficient Routing Algorithm
for Wireless Sensor Network, International Journal of Innovative Technology and Creative
Engineering (ISSS: 2045-8711) Vol 1 No.5 May 2011.
[7] C.Y. Chong and S.P. Kumar, “Sensor Networks: Evolution, opportunities, and Challenges”,
Proceedings of the IEEE, vol. 91, no. 8, Aug. 2003, pp. 1247-1256.
[8] Heinzelman, A. Chandrakasan and A. Balakrichnan, “Energy- Efficient Communication
Protocol for Wireless Microsensor Networks”, In proceedings of the 33rd Hawaii International
Conference on System Science, Jan 2000.
[9] Kemal Akkaya and Mohamed Younis, “A Survey on Routing Protocols for Wireless Sensor
Networks” Department of Computer Science and Electrical Engineering University of Maryland,
Baltimore County Baltimore, MD 21250.
[10] Gizem, Meenakshi Sharma, Kalpana Sharma, “A Comparative Study of Hierarchical and QoS
Based Routing Protocols in Wireless Sensor Network : A Survey ”, In Proceeding of “National
Conference on Advance in Computer science & information Security”, PP 11-17, 6-7 January
2012, MIT, Manipal , India.
[11] Fan Xiangning, Song Yulin “Improvement on LEACH Protocol of Wireless Sensor Network”,
In Proceeding of “International Conference on Sensor Technologies and Applications”, PP 260-
264, 2007
[12] Wu Xinhua, Wang Sheng, “Performance Comparison of LEACH and LEACH-C Protocols by
NS2”, In Proceeding of “Ninth International Symposium on Distributed Computing and
Applications to Business, Engineering and Science”, PP 254-258, 2010.
[13] Yun Li, Nan Yu, Weiyi Zhang, Weiliang Zhao, Xiaohu You, Mahmoud Daneshmand,
“Enhancing the Performance of LEACH Protocol in Wireless Sensor Networks”, In Proceeding
of “M2MCN-2011”, PP 223-228, 2011
[14] Jia Xu,Ning Jin, Xizhong Lou,Ting Peng,Qian Zhou,Yanmin Chen,“ Improvement of LEACH
protocol for WSN”, “International Conference on Fuzzy Systems and Knowledge Discovery
(FSKD 2012)”, PP 2174-2177, 2012
[15] Yun Cosmin Cirstea, Mihail Cernaianu, and Aurel Gontean, “Packet Loss Analysis in Wireless
Sensor Networks Routing Protocols”, “TSP-2012”, PP 37-41, 2012
Authors
Meenakshi Sharma has completed B.Tech degree in CSE department from North
Eastern Regional Institute of Science & Technology (NERIST), Arunachal Pradesh,
INDIA in 2010. She has completed her M.Tech degree in CSE department from
Sikkim Manipal Institute of Technology (SMIT), Majhitar, East Sikkim, INDIA in
the year of 2012.
Anil Kumar Shaw has completed B.Tech degree in ECE department from North
Eastern Regional Institute of Science and Technology (NERIST), Arunachal Pradesh,
INDIA in 2010. He is currently perusing his M.Tech in ECE department from
NERIST, Arunachal Pradesh, INDIA,

More Related Content

What's hot

Wireless Sensor Network over High Altitude Platform
Wireless Sensor Network over High Altitude PlatformWireless Sensor Network over High Altitude Platform
Wireless Sensor Network over High Altitude PlatformTELKOMNIKA JOURNAL
 
Performance evaluation of energy
Performance evaluation of energyPerformance evaluation of energy
Performance evaluation of energyijp2p
 
Energy Efficient Cluster Routing Protocols in Wireless Sensor Network – A Sur...
Energy Efficient Cluster Routing Protocols in Wireless Sensor Network – A Sur...Energy Efficient Cluster Routing Protocols in Wireless Sensor Network – A Sur...
Energy Efficient Cluster Routing Protocols in Wireless Sensor Network – A Sur...IJEEE
 
Hybrid networking and distribution
Hybrid networking and distribution Hybrid networking and distribution
Hybrid networking and distribution vivek pratap singh
 
Congestion Control through Load Balancing Technique for Mobile Networks: A Cl...
Congestion Control through Load Balancing Technique for Mobile Networks: A Cl...Congestion Control through Load Balancing Technique for Mobile Networks: A Cl...
Congestion Control through Load Balancing Technique for Mobile Networks: A Cl...IDES Editor
 
Energy efficient communication techniques for wireless micro sensor networks
Energy efficient communication techniques for wireless micro sensor networksEnergy efficient communication techniques for wireless micro sensor networks
Energy efficient communication techniques for wireless micro sensor networksPushpita Biswas
 
Implementation of hybrid data collection (mobile element and hierarchical clu...
Implementation of hybrid data collection (mobile element and hierarchical clu...Implementation of hybrid data collection (mobile element and hierarchical clu...
Implementation of hybrid data collection (mobile element and hierarchical clu...IJARIIT
 
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...IJCNCJournal
 
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...ijwmn
 
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyData Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyCSCJournals
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Improved Performance of LEACH using Better CH Selection by Weighted Parameters
Improved Performance of LEACH using Better CH Selection by Weighted ParametersImproved Performance of LEACH using Better CH Selection by Weighted Parameters
Improved Performance of LEACH using Better CH Selection by Weighted Parametersijsrd.com
 

What's hot (17)

H0421043049
H0421043049H0421043049
H0421043049
 
Wireless Sensor Network over High Altitude Platform
Wireless Sensor Network over High Altitude PlatformWireless Sensor Network over High Altitude Platform
Wireless Sensor Network over High Altitude Platform
 
Performance evaluation of energy
Performance evaluation of energyPerformance evaluation of energy
Performance evaluation of energy
 
Energy Efficient Cluster Routing Protocols in Wireless Sensor Network – A Sur...
Energy Efficient Cluster Routing Protocols in Wireless Sensor Network – A Sur...Energy Efficient Cluster Routing Protocols in Wireless Sensor Network – A Sur...
Energy Efficient Cluster Routing Protocols in Wireless Sensor Network – A Sur...
 
Hybrid networking and distribution
Hybrid networking and distribution Hybrid networking and distribution
Hybrid networking and distribution
 
Congestion Control through Load Balancing Technique for Mobile Networks: A Cl...
Congestion Control through Load Balancing Technique for Mobile Networks: A Cl...Congestion Control through Load Balancing Technique for Mobile Networks: A Cl...
Congestion Control through Load Balancing Technique for Mobile Networks: A Cl...
 
C04501027035
C04501027035C04501027035
C04501027035
 
eeca
eecaeeca
eeca
 
Energy efficient communication techniques for wireless micro sensor networks
Energy efficient communication techniques for wireless micro sensor networksEnergy efficient communication techniques for wireless micro sensor networks
Energy efficient communication techniques for wireless micro sensor networks
 
Aa35152156
Aa35152156Aa35152156
Aa35152156
 
Implementation of hybrid data collection (mobile element and hierarchical clu...
Implementation of hybrid data collection (mobile element and hierarchical clu...Implementation of hybrid data collection (mobile element and hierarchical clu...
Implementation of hybrid data collection (mobile element and hierarchical clu...
 
D0441722
D0441722D0441722
D0441722
 
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...
 
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
FAULT-TOLERANT MULTIPATH ROUTING SCHEME FOR ENERGY EFFICIENT WIRELESS SENSOR ...
 
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyData Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Improved Performance of LEACH using Better CH Selection by Weighted Parameters
Improved Performance of LEACH using Better CH Selection by Weighted ParametersImproved Performance of LEACH using Better CH Selection by Weighted Parameters
Improved Performance of LEACH using Better CH Selection by Weighted Parameters
 

Similar to Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Transmission Protocol: A Simulation Based Approach

Improved LEACH protocol for increasing the lifetime of WSNs
Improved LEACH protocol for increasing the lifetime of WSNsImproved LEACH protocol for increasing the lifetime of WSNs
Improved LEACH protocol for increasing the lifetime of WSNsIJECEIAES
 
An enhanced energy-efficient routing protocol for wireless sensor network
An enhanced energy-efficient routing protocol for wireless sensor networkAn enhanced energy-efficient routing protocol for wireless sensor network
An enhanced energy-efficient routing protocol for wireless sensor networkIJECEIAES
 
Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyIAEME Publication
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...IJCNCJournal
 
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...ijp2p
 
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...ijp2p
 
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...ijp2p
 
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...ijassn
 
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...ijassn
 
E NERGY D EGREE D ISTANCE C LUSTERING A LGORITHM FOR W Sns
E NERGY D EGREE D ISTANCE C LUSTERING A LGORITHM FOR W SnsE NERGY D EGREE D ISTANCE C LUSTERING A LGORITHM FOR W Sns
E NERGY D EGREE D ISTANCE C LUSTERING A LGORITHM FOR W Snsijwmn
 
A new clustering technique based on replication for MANET routing protocols
A new clustering technique based on replication for MANET routing protocolsA new clustering technique based on replication for MANET routing protocols
A new clustering technique based on replication for MANET routing protocolsTELKOMNIKA JOURNAL
 
Edd clustering algorithm for
Edd clustering algorithm forEdd clustering algorithm for
Edd clustering algorithm forcsandit
 
EDD CLUSTERING ALGORITHM FOR WIRELESS SENSOR NETWORKS
EDD CLUSTERING ALGORITHM FOR WIRELESS SENSOR NETWORKSEDD CLUSTERING ALGORITHM FOR WIRELESS SENSOR NETWORKS
EDD CLUSTERING ALGORITHM FOR WIRELESS SENSOR NETWORKScscpconf
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
Gateway based stable election
Gateway based stable electionGateway based stable election
Gateway based stable electionijmnct
 

Similar to Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Transmission Protocol: A Simulation Based Approach (20)

Improved LEACH protocol for increasing the lifetime of WSNs
Improved LEACH protocol for increasing the lifetime of WSNsImproved LEACH protocol for increasing the lifetime of WSNs
Improved LEACH protocol for increasing the lifetime of WSNs
 
An enhanced energy-efficient routing protocol for wireless sensor network
An enhanced energy-efficient routing protocol for wireless sensor networkAn enhanced energy-efficient routing protocol for wireless sensor network
An enhanced energy-efficient routing protocol for wireless sensor network
 
Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a survey
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
 
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...
 
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...
 
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...
PERFORMANCE EVALUATION OF ENERGY EFFICIENT CLUSTERING PROTOCOL FOR CLUSTER HE...
 
E017332733
E017332733E017332733
E017332733
 
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
 
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
 
E NERGY D EGREE D ISTANCE C LUSTERING A LGORITHM FOR W Sns
E NERGY D EGREE D ISTANCE C LUSTERING A LGORITHM FOR W SnsE NERGY D EGREE D ISTANCE C LUSTERING A LGORITHM FOR W Sns
E NERGY D EGREE D ISTANCE C LUSTERING A LGORITHM FOR W Sns
 
A new clustering technique based on replication for MANET routing protocols
A new clustering technique based on replication for MANET routing protocolsA new clustering technique based on replication for MANET routing protocols
A new clustering technique based on replication for MANET routing protocols
 
Edd clustering algorithm for
Edd clustering algorithm forEdd clustering algorithm for
Edd clustering algorithm for
 
EDD CLUSTERING ALGORITHM FOR WIRELESS SENSOR NETWORKS
EDD CLUSTERING ALGORITHM FOR WIRELESS SENSOR NETWORKSEDD CLUSTERING ALGORITHM FOR WIRELESS SENSOR NETWORKS
EDD CLUSTERING ALGORITHM FOR WIRELESS SENSOR NETWORKS
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
Gateway based stable election
Gateway based stable electionGateway based stable election
Gateway based stable election
 

More from acijjournal

Jan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfJan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfacijjournal
 
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfCall for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfacijjournal
 
cs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfcs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfacijjournal
 
cs - ACIJ (2).pdf
cs - ACIJ (2).pdfcs - ACIJ (2).pdf
cs - ACIJ (2).pdfacijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)acijjournal
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)acijjournal
 
3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...acijjournal
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)acijjournal
 
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable DevelopmentGraduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Developmentacijjournal
 
Genetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary MethodologyGenetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary Methodologyacijjournal
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...acijjournal
 
Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) acijjournal
 
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & PrinciplesE-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principlesacijjournal
 
10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...acijjournal
 
10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...acijjournal
 
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...acijjournal
 
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...acijjournal
 

More from acijjournal (20)

Jan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdfJan_2024_Top_read_articles_in_ACIJ.pdf
Jan_2024_Top_read_articles_in_ACIJ.pdf
 
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdfCall for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
Call for Papers - Advanced Computing An International Journal (ACIJ) (2).pdf
 
cs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdfcs - ACIJ (4) (1).pdf
cs - ACIJ (4) (1).pdf
 
cs - ACIJ (2).pdf
cs - ACIJ (2).pdfcs - ACIJ (2).pdf
cs - ACIJ (2).pdf
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
 
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
7thInternational Conference on Data Mining & Knowledge Management (DaKM 2022)
 
3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...3rdInternational Conference on Natural Language Processingand Applications (N...
3rdInternational Conference on Natural Language Processingand Applications (N...
 
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)4thInternational Conference on Machine Learning & Applications (CMLA 2022)
4thInternational Conference on Machine Learning & Applications (CMLA 2022)
 
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable DevelopmentGraduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development
 
Genetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary MethodologyGenetic Algorithms and Programming - An Evolutionary Methodology
Genetic Algorithms and Programming - An Evolutionary Methodology
 
Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...Data Transformation Technique for Protecting Private Information in Privacy P...
Data Transformation Technique for Protecting Private Information in Privacy P...
 
Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ) Advanced Computing: An International Journal (ACIJ)
Advanced Computing: An International Journal (ACIJ)
 
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & PrinciplesE-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles
 
10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...10th International Conference on Software Engineering and Applications (SEAPP...
10th International Conference on Software Engineering and Applications (SEAPP...
 
10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...10th International conference on Parallel, Distributed Computing and Applicat...
10th International conference on Parallel, Distributed Computing and Applicat...
 
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
DETECTION OF FORGERY AND FABRICATION IN PASSPORTS AND VISAS USING CRYPTOGRAPH...
 
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
Detection of Forgery and Fabrication in Passports and Visas Using Cryptograph...
 

Recently uploaded

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 

Recently uploaded (20)

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 

Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Transmission Protocol: A Simulation Based Approach

  • 1. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.6, November 2012 DOI : 10.5121/acij.2012.3609 75 Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Transmission Protocol: A Simulation Based Approach MEENAKSHI SHARMA 1 AND ANIL KUMAR. SHAW 2 1 Department of Computer Science and Engineering, SMIT, Majitar, Sikkim, India menakshi219@gmail.com 2 Department of Electronics and Communication Engineering, NERIST, Nirjuli, India anilshaw27@yahoo.com ABSTRACT This paper gives a brief description about some routing protocols like EEE LEACH, LEACH and Direct Transmission protocol (DTx) in Wireless Sensor Network (WSN) and a comparison study of these protocols based on some performance matrices. Addition to this an attempt is done to calculate their transmission time and throughput. To calculate these, MATLAB environment is used. Finally, on the basis of the obtained results from the simulation, the above mentioned three protocols are compared. The comparison results show that, the EEE LEACH routing protocol has a greater transmission time than LEACH and DTx protocol and with smaller throughput. KEYWORDS Data, EEE LEACH, transmission time, throughput 1. INTRODUCTION Wireless Sensor Networks (WSN) consists of base stations (BS) and several sensor nodes which are unattended and have limited energy resource and they can work until the energy exists inside them [1] [7]. The sensors that are attached to the nodes are capable of sensing the data from the environment in which they are deployed. The sensor nodes process data from the environment and transmit them to the BS. The BS received those data from the sensor nodes. This transmission and receiving operation is carried out by some transmitter circuits and receiving circuits which are attached with the sensor nodes and base stations respectively. The transmitter circuit uses more amount of energy as compared to the receiver circuit [1]. The power dissipated in transmission and receiving is calculated with the help of the following equations [1] [2] [6]: Transmitting: ETX (k,d ) = ETX – { (Eelec * k) + (Emp * k * d)} ETX (k,d)= ETX – { (Eelec * k) + (Efs * k * d)} Receiving: ERX (k) = ERX - ( Eelec + EDA ) * k Where, Eelec denotes amount of Energy consumption per bit in the transmitter or receiver circuitry. Emp Amount of energy consumption for multipath fading. Efs Amount of energy consumption for free space. EDA Data aggregation energy.
  • 2. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.6, November 2012 76 Base station There are several routing protocols exist in WSN and among them the hierarchical routing protocols are the simplest, easiest and lots of research works are going on them. The well- known Hierarchical routing protocols in WSN are LEACH, PEGASIS, TEEN, APTEEN etc. and among them LEACH is the first and simplest hierarchical routing protocol [9] [10]. Several modified versions of LEACH are proposed and among these all we are mainly concentrate on a recently developed modified version of LEACH i.e. EEE LEACH protocol [2]. In this paper we are trying to compare EEE LEACH protocol with LEACH and Direct Transmission protocol in terms of their transmission time and throughput. Transmission time is defined as the complete time taken to transmit data packet from source to destination [5]. Throughput is defined as the number of packets transmitted over the network per unit time period [5]. The section II consists of the brief description about the three routing protocols and their comparison study. Section III represents the implementation details. In section IV simulation results along with comparisons are discussed and in section V we conclude the paper. 2. BRIEF DESCRIPTION ABOUT THE PROTOCOLS 2.1. Direct Transmission Protocols (DTx) This is the simplest routing protocol which consists of only BS and normal sensor nodes. The sensor nodes act as senders and BS serves as the destination node to all the other sensor nodes in the network. The sensor nodes transmit their data to the BS and the BS received these all. The communication between the sensor nodes and BS is direct without any intermediate communicator. The nodes only remain active during the data transmission to the base station. Consequently, won’t spend energy on receiving the messages from the other nodes, but they will only spend the minimum data on listening the channel and, therefore, they will spend their battery capacity on sending messages to the base station [3]. On the other hand, when a sensor node transmits data directly to the base station, the energy loss incurred can be quite extensive depending on the location of the sensor nodes relative to the base station. As a result, the Direct Transmission protocol’s complexity can be negligible and its implementation quasi-trivial, but it is the least energy efficient protocol in most cases [3]. Figure 1: Architecture of Direct Transmission Protocol (DTx) 2.2. LEACH Protocol LEACH stands for Low-Energy Adaptive Clustering Hierarchy. It is the first hierarchical routing protocol in Wireless Sensor network. In this protocol nodes are divided into only two types of categories; normal sensor nodes and cluster heads (CH). At first the normal sensor nodes are grouped together and form clusters and among all the sensor nodes in a cluster one node are selected as a CH node. The CH selection procedure is a random selection procedure where every node is assign a random value and this is compared with a threshold value (T(n)) [8][10]. If the node's random value is
  • 3. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.6, November 2012 77 less than the T(n), then the respective node can act as a CH. The T(n) is calculated by the following formula given in eq:1 [1] [2] [4] [6]. In this way, in each and every cluster, there exists one CH. Where, n = given number of nodes. p = the priori probability of a node being elected as a cluster-head. r = a random number between 0 and 1 that is selected by a sensor node. If this random number is less than the threshold value T(n), then the respective node becomes the cluster-head. G = the set of nodes that were not accepted as cluster head in the last “1/p” events. At first normal sensor nodes transmit their data to their respective CHs. On receiving these data, the CHs aggregated them in a compressed form and further transmit them to the BS. Finally BS received all compressed data from different CHs present in the network. Figure 2: Architecture of LEACH Protocol [2] 2.3. EEE LEACH Protocol EEE LEACH or Energy Efficient Extended LEACH [2] is an approach of multilevel clustering technique to increase energy efficiency by reducing its radio communication distance [4]. In this multilevel clustering approach besides having a single layer of clusters formation between the nodes and Base station like LEACH, it involves two layers of clusters formation [4]. In the first layer CHs are formed where the normal nodes transmit their own data to their respective CH and by using the fuse mechanism the CHs aggregate the received data. Again in the second layer Master Cluster Heads (MCH) are formed. After the formation of MCHs, the CHs search the nearest MCHs by calculating the distance between them and transmit their aggregate data to the respective MCHs. In the similar way, the MCHs received data from their nearest CHs, aggregate all received data, transformed them into a compress format and forward them to the
  • 4. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.6, November 2012 78 base station (BS). The number of CHs and MCHs are initially decided by using a predetermined fractional value i.e. p (election probability value) for CHs and pm (election probability value) for MCHs. In EEE LEACH, the numbers of MCHs are kept less than the number of CHs to minimize the overall communication distance between the nodes and Base station. EEE LEACH protocol performs better network life-time and is more energy-efficient than LEACH protocol [2]. Figure 3: Architecture of EEE LEACH Protocol [2] Comparison between DTx, LEACH and EEE LEACH protocols [8] [9] [10]: Table 1.Comparison Table for Different Hierarchical Routing Protocols Protocol Metrics DTx LEACH EEE LEACH Cluster Formation No Yes Yes Chain Formation No No No Cluster Head (CH) No Yes Yes Master CH No No Yes Data Aggregation No Yes Yes Mobility Fixed BS Fixed BS Fixed BS Scheduling TDMA TDMA, CDMA TDMA, CDMA Network Lifetime Average Good Very Good Energy Efficient Least Good Very Good Communication Single-hop Single-hop Multi-hop QoS No No No 2.4. Other Improved LEACH Protocols Energy LEACH protocol and Multihop-LEACH protocol [11] improves choice method of the cluster head and communication mode from single to multi-hop between cluster head and sink. Both have better performance than LEACH protocols. Multihop-LEACH protocols survive longer than energy-LEACH and LEACH protocol resulting in high throughput [11]. The effect of the distance between base station and centre of gravity of distribution is studied in [12]. Its affect in throughput is analysed. The closer is gives the better performance. The function of lifetime and throughput of network to the time length of each round is studied in [13]. This function can be used to enhance the lifetime and throughput of network. The overload energy problem is solved by using E-LEACH [14] over LEACH protocol. It balances the energy
  • 5. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.6, November 2012 79 consumption of sensor nodes. The link quality between the node evaluated based on the link packet loss is shown in [15]. Considering packet loss in choosing the best communication path has a significant impact on reducing the energy consumption of the network as well as increasing network throughput [15]. 3. IMPLEMENTATIONS DETAILS The routing protocols DTx, LEACH and EEE LEACH have been simulated accurately in MATLAB. These have been made assuming a network having dimensions 200 x 300 meters. The number of nodes in each protocol is assumed to be 200. The cost of transmission and receiving was calculated by the formulas mentioned above in the section I. The nodes are generated and placed randomly. The parameters that are used to calculate the transmission time and throughput are given below: • Distance between the normal nodes and Bs. • Distance between the normal node and CHs. • Distance between the CHs and BS. • Distance between the CHs and MCHs. • Distance between the MCHs and BS. • Speed of em waves. • Size of the data packet 3.1. Simulation Parameter Table Table 2.Simulation Parameters Sl. No. Simulation Parameters and their Values Parameters Value 1. Routing Protocols DTx, LEACH, EEE LEACH 2 Environment Size 200 x 300 3 Number of nodes 200 4 Packet Size 2000 bits 5 Speed of em wave 3 x 108 m / s 7 Election Probability value of CHs (p) 10% to 30% 8 Election Probability value of MCHs (pm) 2% to 15% 9 Number of rounds 5 to 10,000 rounds 10 Initial energy per node (E0) 1 J 11 Eelec 50 nJ / bit 12 Efs 10 pJ / bit / m2 13 Emp 0.0015 pJ / bit / m4 14 EDA 5 nJ / bit 3.2. Snapshot of the Routing Protocols We simulated DTx, LEACH and EEE LEACH protocols in MATLAB simulator and their simulated outputs are shown in figure 4, 5, 6 respectively.
  • 6. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.6, November 2012 80 Figure 4: Direct Transmission Protocol Figure 5: LEACH Protocol [2] Figure 6: EEE LEACH Transmission Protocol [2] 4. RESULTS AND DISCUSSIONS Figure 7: Transmission Time Comparison Graph between EEE LEACH, LEACH and DTx Figure 7 shows the comparison graph of EEE LEACH, LEACH and DTx protocol in terms of their transmission time. Here we observe that after the completion of 10th round, EEE LEACH protocol takes large transmission time to transmit data to the BS, whereas in case of LEACH 0 20 40 60 80 100 120 140 160 180 200 0 50 100 150 200 250 300 0 20 40 60 80 100 120 140 160 180 200 0 50 100 150 200 250 300 0 20 40 60 80 100 120 140 160 180 200 0 50 100 150 200 250 300
  • 7. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.6, November 2012 81 and DTx protocol the transmission time is gradually decreases. The major reason behind this is that in case of EEE LEACH protocol data have to travel two layers of clustering mechanism, where in the first level they have to move from normal node to CHs and in second level from CHs to MCHs. But in case of LEACH, data have to travel only one level and in DTx data can directly reach to BS. Therefore EEE LEACH posses largest transmission time than LEACH and DTx protocol Figure 8: Throughput Graph Comparison between EEE LEACH, LEACH and DTx Figure 8 depicts the comparison graph of the throughput values of the EEE LEACH, LEACH and DTx protocol. Larger the transmission time, smaller the throughput and it becomes clear from the formula used for throughput. Throughput = (Size of the packet / Transmission time) Since EEE LEACH protocol takes larger time to transmit data to the BS, so the amount of data packets received by the BS per unit time is less than it is in LEACH and DTx protocol. Therefore EEE LEACH protocol shows smaller throughput than LEACH and DTx protocol. 5. CONCLUSION In this paper we have discussed three routing protocols i.e. EEE LEACH, LEACH and DTx in Wireless Sensor Network and mainly focused on newly developed hierarchical routing protocol EEE LEACH. It was already proposed that EEE LEACH has greater energy efficiency with better network lifetime than LEACH protocol [2]. In this paper we tried to calculate it's transmission time and throughput and compared the results with LEACH and one another protocol i.e. DTx. Since EEE LEACH is more energy efficient and has shown better network lifetime, but here we have found that EEE LEACH takes more time to transmit data to BS which causes degradation of its throughput value. Therefore EEE LEACH protocol shows inefficient result in case of transmission time and throughput REFERENCES [1] Kalpana Sharma, Anurag S. Rathor, S. R. Biradar, M.K Ghose, “Power-efficient Routing & Increased Yield Approach For WSNs,” International Journal on Computer Science and Engineering Vol. 02, No. 03, 2010, 586-592.
  • 8. Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.6, November 2012 82 [2] Meenakshi Sharma, Kalpana Sharma, “An Energy Efficient Extended LEACH (EEE LEACH)”, 2012 International Conference on Communication Systems and Network Technologies , IEEE DOI 10.1109/ CSNT.2012.88 , Rajkot, INDIA. [3] Pedro de la Fuente Aragón, “The improvements of power management for clustered type large scope wireless sensor networks,” Warsaw university of technology, June 2010. [4] Wairagu G. Richard, “Extending LEACH routing algorithm for Wireless Sensor Network,” Data Communications Engineering, Makerere University, 2009. [5] Rajesh Patel, Sunil Priyani, Vijay Ukani, “Energy and Throughput Analysis of Hierarchical Routing Protocol (LEACH) for Wireless Sensor Network, “International Journal of Computer Applications (975 – 8887) Volume 20– No.4, April 2011. [6] Nidhi Barta, Anuj Jain, Surender Dhiman, “An Optimized Energy Efficient Routing Algorithm for Wireless Sensor Network, International Journal of Innovative Technology and Creative Engineering (ISSS: 2045-8711) Vol 1 No.5 May 2011. [7] C.Y. Chong and S.P. Kumar, “Sensor Networks: Evolution, opportunities, and Challenges”, Proceedings of the IEEE, vol. 91, no. 8, Aug. 2003, pp. 1247-1256. [8] Heinzelman, A. Chandrakasan and A. Balakrichnan, “Energy- Efficient Communication Protocol for Wireless Microsensor Networks”, In proceedings of the 33rd Hawaii International Conference on System Science, Jan 2000. [9] Kemal Akkaya and Mohamed Younis, “A Survey on Routing Protocols for Wireless Sensor Networks” Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County Baltimore, MD 21250. [10] Gizem, Meenakshi Sharma, Kalpana Sharma, “A Comparative Study of Hierarchical and QoS Based Routing Protocols in Wireless Sensor Network : A Survey ”, In Proceeding of “National Conference on Advance in Computer science & information Security”, PP 11-17, 6-7 January 2012, MIT, Manipal , India. [11] Fan Xiangning, Song Yulin “Improvement on LEACH Protocol of Wireless Sensor Network”, In Proceeding of “International Conference on Sensor Technologies and Applications”, PP 260- 264, 2007 [12] Wu Xinhua, Wang Sheng, “Performance Comparison of LEACH and LEACH-C Protocols by NS2”, In Proceeding of “Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science”, PP 254-258, 2010. [13] Yun Li, Nan Yu, Weiyi Zhang, Weiliang Zhao, Xiaohu You, Mahmoud Daneshmand, “Enhancing the Performance of LEACH Protocol in Wireless Sensor Networks”, In Proceeding of “M2MCN-2011”, PP 223-228, 2011 [14] Jia Xu,Ning Jin, Xizhong Lou,Ting Peng,Qian Zhou,Yanmin Chen,“ Improvement of LEACH protocol for WSN”, “International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2012)”, PP 2174-2177, 2012 [15] Yun Cosmin Cirstea, Mihail Cernaianu, and Aurel Gontean, “Packet Loss Analysis in Wireless Sensor Networks Routing Protocols”, “TSP-2012”, PP 37-41, 2012 Authors Meenakshi Sharma has completed B.Tech degree in CSE department from North Eastern Regional Institute of Science & Technology (NERIST), Arunachal Pradesh, INDIA in 2010. She has completed her M.Tech degree in CSE department from Sikkim Manipal Institute of Technology (SMIT), Majhitar, East Sikkim, INDIA in the year of 2012. Anil Kumar Shaw has completed B.Tech degree in ECE department from North Eastern Regional Institute of Science and Technology (NERIST), Arunachal Pradesh, INDIA in 2010. He is currently perusing his M.Tech in ECE department from NERIST, Arunachal Pradesh, INDIA,