SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016
DOI : 10.5121/ijngn.2016.8102 13
SIMULATION BASED ANALYSIS OF CLUSTER-BASED
PROTOCOL IN WIRELESS SENSOR NETWORK
Tarun Sharma1, Harsukhpreet Singh2, Anurag sharma3
Dept” of Computer Science & Engineering, CT Institute of Technology & Research1
Dept” of Electronics & Communication Engineering, CT Institute of Technology &
Research 2,3,Jalandhar, Punjab,India1,2,3
ABSTRACT
The modern growth in fabricate energy efficient Wireless Sensor Network is liberal a novel way to
systematize WSN in applications like surveillance, industrial monitoring, traffic monitoring, habitat
monitoring, cropping monitoring, crowd including etc. The rising use of these networks is making
engineers evolve novel and efficient ideas in this field. A group of research in data routing, data density
and in network aggregation has been proposed in recent years. The energy consumption is the main
apprehension in the wireless sensor network. There are many protocols in wireless sensor network to
diminish the energy consumption and to put in to the network lifetime. Among a range of types of
techniques, clustering is the most efficient technique to diminish the energy expenditure of network. In
this effort, LEACH protocol has been second-hand for clustering in which cluster heads are nominated on
the basis of distance and energy. The LEACH protocol is been implemented in a simulated environment
and analyze their performance graphically.
KEYWORDS
Wireless sensor networks, energy efficiency, Clustering, LEACH protocol
1. INTRODUCTION
A wireless sensor network is complete up of a huge quantity of sensor nodes and a sink [2]. The
WSN is self-confident of sensor nodes from hundreds or thousands and every node is coupled to
one sensor nodes. A wireless sensor network entire up of a large number of nodes extend over a
precise area. A sensor node self-confident of the sensor, actuators, memory, a mainframe and
they do have communication aptitude. All the sensor nodes are permitted to communicate in the
course of a wireless intermediary. The wireless standard is of infrared, radio frequency that
having no wired tie friendly. So the sensor nodes are deployed in a random conduct and it make
ad-hoc network because they can discuss themselves [1]. If the node is unable to converse with
other nodes of the network through a direct link, it means the node is out of range. In such
kind of networks data broadcast from one node to another is perform via in the middle of
nodes. This idea is referred as multi- hoping. All sensors nodes work helpfully to serve the
requests [4].
1.1Energy Consumption Issues
The chief complicatedness in WSN, sensor node have classified battery life because the sensor
nodes size is small so battery size, processor, storage liberty for data, these all are small as sensor
nodes. So the main central point on lessening energy expenses in wireless sensor networks. In
International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016
14
WSN a package of sensed information and routing in order has to be send which after have some
time constraint so that information can be employable before any disaster occurs e.g.
manufacturing monitoring, apparatus Monitoring etc. In WSN the power authority utilization is
much better-quality data communication then internal processing. So, Energy preservation in
WSN is the need to the address [3]. The Wireless sensor is flat to node stop working due to
power hitting. In order to supply a reliable examine through a network, the network should be
celebrity adjusting and must have elastic properties as requisite from point in time to time. A
classified contact node may meet failure due to imperfect battery subsistence. In such case the
network protocol should be logical enough to such collapse to keep the network organized many
techniques are proposed for energy concession, clustering is single of them. The cluster heads
are voted periodically such that members of a cluster can converse with their cluster heads. These
cluster heads send data documented from its members to a base station. The multi-clustering
can also be used. The cluster head should have to be rotated for the complementary of energy
and then there will be an equal heaviness on every node. The energy expenditure can be strong
[3]. Energy plays a vital task in wireless sensor networks because nodes are battery operated.
Therefore numerous protocols have been proposed in order to diminish the energy consumption
of these nodes such as LEACH [6], PAMAS [5].
LEACH is conscious as the most fashionable routing protocol that exploit cluster based
routing in order to weaken the energy consumption, in this paper suggest a development on
the LEACH protocol that supplementary recover the power consumption, simulation results
express out that our protocol outperforms LEACH protocol in term of energy consumption
and overall throughput. LEACH is “Low Energy Adaptive Clustering Protocol” [10]. LEACH
form clusters and selects randomly cluster Heads for each cluster. Non- cluster heads sense the
data and broadcast this data to cluster head, and then cluster head combined the data and forward
this data to sink. The principle of this protocol is that it assigns overall energy consumption of the
network uniformly to each node by selecting periodically different nodes as a cluster head. There
are two phases of LEACH that are Setup phase and Steady state phase. In set up phase, clusters
are shaped and cluster heads are chosen. In steady state phase, data from non-cluster heads is
transmitted to sink. The sensor nodes communicate with cluster heads with allotted time using
TDMA. Cluster heads are arbitrarily chosen in each round. LEACH operation is divided into
several rounds. Each round begins with set-up phase. In this clusters are structured. LEACH set a
threshold value T(n) and then sensor node I generate a random number between 0 and 1. If the
random number is < T(n), the node will become cluster head for the current round and ordinary
nodes link the cluster and become cluster members [6].
T (n) = p/1-p ×( r mod p-1 )
p is a probability of node to be selected as a cluster head, r is a number of rounds passed, G is a
selection of ordinary nodes. Once a node become cluster head never become cluster head once
more, only the node which have not become the cluster head and have elevated energy can
become cluster head at r+1.When cluster head assigns time slots to the members using TDMA
then it shifted to the steady state phase. After a shift in steady-state phase, members sent data
to cluster heads; cluster head procedure the data and then send data sequence to the base station.
After this round, it turn to next round and begin reconstruction new round. compensation of
LEACH are that LEACH is completely distributed. LEACH does not necessitate the control
information from the base station and the nodes do not require information of the global network
in order for LEACH to work. LEACH reduces communication energy by 8 times as contrast to
straight broadcast and smallest amount transmission energy routing. Disadvantages of LEACH
are that the cluster heads are chosen arbitrarily. So the distribution of cluster heads cannot be
ensured. In this protocol, the nodes with low energy have the same precedence as the nodes
having high energy and nodes having low energy can become cluster heads [10].
International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016
15
In section ii presents the connected works, In section iii initiate problem formulation, In
section iv Simulation Setup, In section v result and discussion and section vi conclude the paper.
Figure1: LEACH protocol Architecture
2. LITERATURE REVIEW
A majority beneficial energy-saving spare organization, including spare collection and
named it LEACH-SM protocol (modified form of prominent LEACH protocol) was deliberate
by Baker B. et al.; (2014).In this author available a quantitative difference of energy
consumption and WSN lifetime for both mentioned protocols [6].
Genetic algorithm and optimization of LEACH protocol that are worn on LEACH protocol and
compare both domino effect on the basis of rounds that was discussed by Yadav S. et al.;
(2014). This comparison was based on optimal thresholding probability for cluster structure.
Finally, after comparison finds LEACH- GA method outperforms MTE, DT and LEACH in terms
of network lifetime, use for optimal vigor- efficient clustering [11].
The two significant clustering protocols, namely LEACH and LEACH-C (centralized), using
NS2 tool for numerous chosen scenarios, and study of simulation results against chosen
performance metrics with latency and network lifetime was planned by Nayak P.et al.;
(2014). As a conclusion of surveillance from results, it can be mentioned that LEACH can be
favored if restricted harmonization of nodes in clustering without involving to BS is of tall
priority than other factors like declaration over the desired number of clusters etc.; and LEACH-
C can be designated when centralized and deterministic approach jacket complete network is
unsurprising still bringing in enlarged network lifetime and desired number of clusters [7].
The tailored version of LEACH protocol called V-LEACH protocol and the contrast of LEACH
protocol with V-LEACH protocol was designed by Alhawat A. et al.;(2013). from the
simulation results were, first the numeral of busy nodes is more than the unique LEACH.
Second the figure of dead nodes is less than the unique LEACH protocol. Network life-time is
enlarged by 49.37% then original LEACH [6].
International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016
16
Energy-LEACH protocol improves the CH selection procedure. It makes the lingering energy of
nodes as the major metric which decides whether the nodes twist into CH or not after the first
round. It same as LEACH protocol was projected by Xianging F. et al. ;( 2007). E-LEACH is
alienated into rounds, in the first round, every node has the alike likelihood to turn into CH, that
mean nodes are randomly chosen as CHs, In the next rounds, the left behind energy of
each node is dissimilar after one round e-mail and taken into account for the collection of the
CHs. That mean nodes have extra energy will develop into a CHs rather than nodes with fewer
energy [6].
A novel version of LEACH called two-level LEACH was planned by Loscri V. In this protocol,
CH collects data from other cluster members as exclusive LEACH, but rather than transport data
to the BS openly, it uses one of the CHs that mendacity between the CH and the BS as a transmit
station [8].
In LEACH, each CH straight communicates with BS no matter the distances between CH and BS
It will guzzle a lot of its energy if the distance is distant. So conquer this drawback multihop-
LEACH protocol was proposed by Zhou H. It selects a best possible path between the CH and
the BS through other CHs and use these CHs as a relay station to televise data over through them
[6].
3. PROBLEM FORMULATION
In this work, LEACH protocol has been worn for clustering in which cluster heads are preferred
on the basis of distance and energy.
• In LEACH protocol Cluster head straight communiqué with BS no matter the distance
between Cluster head and the base station; it will use a group of its energy if the distance
is far [13].
• Due to far distance packet does not arrive at the destination because CHs straight
communicate with sink there is no inter-cluster communication, and this needs high
trans-mission power due to this node dies earlier before transmission.
4. SIMULATION SET UP
In this section, we evaluate the performance of LEACH protocol using NS2 tool. NS2 is used as
simulation podium. NS is a distinct event simulator, where the go forward of time depends on the
timing of events which are preserve by the scheduler. NS simulator is depending on two
languages: C++, and an OTcl (an object-oriented tool command language).
International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016
17
Table 1: NS-2 simulation parameters
Parameter settings
Simulation Area 500*500 meters
No of nodes 41
Channel Type Channel/wireless
Antennae model Antenna/omni antenna
Energy model battery
Interface queue Type Queue/Droptail/Priqueue
Link layer type LL
Initial energy 100
Routing protocol AODV
Traffic Source CBR
Type of MAC IEEE 802.11
Packet size 1000 bytes
The C++ defines the interior instrument of the simulation objects, the OTcL sets up simulation
by assembling and configuring the objects and scheduling discrete events. The OTcL are linked
together using TclCL [12]. The experiments are performed with a diverse number of nodes
placed in a 500m *500m field. Each sensor nodes is assumed to have an initial energy of 100
joules. The general simulation parameters are
To evaluate the performance of LEACH protocol using parameters such as Energy consumption,
Packet loss, End to End delay, Throughput and control overhead. Figure 2, shows energy
consumption graph, in this graph 100 joules energy is to be addicted in 10 seconds because
every cluster heads in LEACH protocol immediately communication with BS no stuff the
distance between Cluster head and the base station; it will use a lot of its energy if the
remoteness is far [13]. In figure 3, shows the packet loss graph, In this graph 16 number of the
packet is lost in 10 seconds because in LEACH protocol CHs minter cluster communication, and
this needs high trans-mission power due to this node dies earlier before transmission, packet does
not reach the destination [14,15].
In Figure 4, shows End to End Delay graph, in this graph to increase the time delay is high due
to high overhead which is a limitation of LEACH protocol [16]. In Figure 5, shows the
throughput graph, in this graph 12 packet delivered in 10 seconds because due to high packet
loss, delay, and control overhead so that the overall efficiency of the network is decreased [16].
In Figure 6, shows the control overhead. In this graph overhead is giant because in LEACH
protocol extra overheads due to cluster head change and calculation leading to energy
incompetence for dynamic clustering in large networks [17].
International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016
18
Figure 2: Energy consumption graph of LEACH Protocol
Figure 3: packet losses graph of LEACH protocol
International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016
19
Figure 4 : End to End Delay of LEACH protocol
Figure 5:Throughput graph of LEACH protocol
International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016
20
Figure 6: Control overhead in LEACH protocol
6. CONCLUSION AND FUTURE WORK
The conclusion of this paper is to apply and evaluate the performance of LEACH protocol
using QoS parameters such as energy consumption, packet loss, End-to End-Delay, Throughput,
and Control Overhead. The energy consumption of LEACH is very high because each cluster
heads straight communiqué with BS no material the distance between Cluster head and the base
station; it will use a group of its energy if the remoteness is far. Due to far distance packet does
not arrive at the sink, packet loss problem is occurred so the overall performance of the
networks is decreased. With the outcome obtained in this paper, a further issue worthy of
consideration with RFID protocol can be done named as R- LEACH protocol. The design system
can be extended using R-LEACH protocol; Of course, since we have focused only on LEACH
protocol in this paper, the diagnosis can be done using R- LEACH protocol. We would like to
consider these issues in subsequent work.
ACKNOWLEDGEMENT
I hereby acknowledge that the above-referred work is my own research work and I am entirely
responsible for any kind of misuse of material. I thank my mentor Er. Harsukh Singh to guide
and encourage me and for putting all her valuable time for me to get the desired output.
International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016
21
REFERENCES
[1] S. Pant, N. Chauhan,P. Kumar, “Effective Cache based Policies in Wireless Sensor Networks:
A Survey,” International. Journal of Computer Application., vol. 11, no. 10, pp. 17–21, 2010.
[2] I. Akyildiz, W. Su, Y. Sankarasubramaniam,E. Cayirci, “Wireless sensor networks: a survey,”
Comput. Networks, vol. 38, pp. 393–422, 2002.
[3] D. Zhang, G. Li, K. Zheng, X. Ming, Z. H. Pan, “An energy-balanced routing method based on
forward-aware factor for wireless sensor networks,” IEEE TRANSACTIONS ON INDUSTRIAL
INFORMATICS, vol. 10, no. 1, pp. 766–773,2014.
[4] L. Jian-qi, C. Bin-fang, W. Li, W. Wen-Hu, “Energy optimized approach based on clustering routing
protocol for wireless sensor networks,” 2013 25th Chinese Control Decision. Conference, pp. 3710–
3715, 2013.
[5] S. Singh and C. S. Raghavendra, “PAMAS---power aware multi-access protocol with
signalling for ad hoc networks,” ACM SIGCOMM Computer. Communication. Review., vol. 28,
pp. 5–26, 1998.
[6] Yassein, “Improvement on LEACH Protocol of Wireless Sensor Network (VLEACH),” International.
Journal of Digital Content Technology and its Application, vol. 3, pp. 132–136, 2009.
[7] P. Nayak and D. Ph, “Comparison of Routing Protocols in WSN using NetSim Simulator : LEACH
Vs LEACH-C,” vol. 106, no. 11, pp. 1–6, 2014.
[8] A. Kaur and A. Grover, “LEACH and Extended LEACH Protocols in Wireless Sensor
Network-A Survey,” International. Journal of Computer Application vol. 116, no. 10, pp. 1–5, 2015.
[9] D. Xu and J. Gao, “Comparison Study to Hierarchical Routing Protocols in Wireless Sensor
Networks,” Procedia Environmental Science,Elsevier, vol. 10, pp. 595–600, 2011.
[10] S. Yadav and S. S. Yadav, “Review for Leach Protocol in WSN,” International Journal of Recent
Development in Engineering and Technology vol. 2, no 6, pp. 69–71, 2014.
[11] A. Ahlawat and V. Malik, “An extended vice-cluster selection approach to improve v leach protocol
in WSN,” 3rd Third International Conference on Advanced Computing & Communication
Technologies, ACCT, pp. 236–240, 2013.
[12] N. Singh, P. Rajeshwar, L. Dua, and V. Mathur, “Network Simulator NS2-2 .35,” International
Journal of Advanced Research in Computer Science and Software Engineering vol. 2, no. 5, pp. 224–
228, 2012.
[13] R. Ramesh, R. M. D. Charaan, N. T. M. Kumar, and E. Uma, “Implementation of Load Balancing in
Leach Protocol for Wireless Sensor Networks,”2nd international conference on emerging trends in
Engineering and technology,London(U.K) , pp. 80–84, 2014.
[14] R. Kumar, “Analysis and Enhancement of Adaptive Packet Technique in Wireless Sensor Network,”
vol. 24, no. 5, pp. 227– 230, 2015.
[15] Gagandeep kaur , poonam arora, “To Reduce the Packet Collision by Using Adaptive Technique in
WSN, International Journal of Advanced Research in Electrical Electronics
andInstrumentationEngineering” Vol. 3, pp. 11336–11341, 2014.
[16] L. Y. Barai, “Performance Evaluation of LEACH Protocol for Wireless Sensor Network,” vol. 1, no.
6, pp. 141–145, 2014.
[17] Singh S. & Singh G., “A Noble Routing Protocol for Vehicular Adhoc Networks with Less
RoutingOverheads,”International Journal of Future Generation Communication and Networking,
Vol. 7, no.5,pp23-34,2014.

More Related Content

What's hot

International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )ijassn
 
Energy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolEnergy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolARUNP116
 
Cluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor NetworksCluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor Networkseditor1knowledgecuddle
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNIJCNCJournal
 
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...IJERD Editor
 
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...IJMIT JOURNAL
 
Various Clustering Techniques in Wireless Sensor Network
Various Clustering Techniques in Wireless Sensor NetworkVarious Clustering Techniques in Wireless Sensor Network
Various Clustering Techniques in Wireless Sensor NetworkEditor IJCATR
 
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...IOSRJECE
 
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyData Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyCSCJournals
 
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor NetworksEnhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor NetworksAssociate Professor in VSB Coimbatore
 
Energy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networksEnergy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networksijassn
 
Iaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd Iaetsd
 

What's hot (17)

International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
 
Energy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolEnergy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocol
 
B045070510
B045070510B045070510
B045070510
 
Cluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor NetworksCluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor Networks
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
 
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
 
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
 
Kianoosh&amp;sajjad
Kianoosh&amp;sajjadKianoosh&amp;sajjad
Kianoosh&amp;sajjad
 
Various Clustering Techniques in Wireless Sensor Network
Various Clustering Techniques in Wireless Sensor NetworkVarious Clustering Techniques in Wireless Sensor Network
Various Clustering Techniques in Wireless Sensor Network
 
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
 
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyData Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
 
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor NetworksEnhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
 
Energy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networksEnergy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networks
 
Iaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routing
 
Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & Pegasis
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
1909 1913
1909 19131909 1913
1909 1913
 

Similar to SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK

INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...ijsrd.com
 
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...IJSRED
 
An energy saving algorithm to prolong
An energy saving algorithm to prolongAn energy saving algorithm to prolong
An energy saving algorithm to prolongijwmn
 
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor NetworksEnergy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor NetworksIRJET Journal
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkeSAT Publishing House
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkeSAT Journals
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET Journal
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Editor IJCATR
 
Review of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor NetworkReview of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor Networkijsrd.com
 
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...IJMIT JOURNAL
 
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKSENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKSijassn
 

Similar to SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK (20)

INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
 
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
 
An energy saving algorithm to prolong
An energy saving algorithm to prolongAn energy saving algorithm to prolong
An energy saving algorithm to prolong
 
B05630814
B05630814B05630814
B05630814
 
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor NetworksEnergy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor network
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor network
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
 
Review of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor NetworkReview of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor Network
 
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
 
Ed33777782
Ed33777782Ed33777782
Ed33777782
 
Ed33777782
Ed33777782Ed33777782
Ed33777782
 
A04560105
A04560105A04560105
A04560105
 
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKSENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
 

More from ijngnjournal

Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...
Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...
Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...ijngnjournal
 
TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...
TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...
TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...ijngnjournal
 
PERFORMANCE PREDICTION OF 5G: THE NEXT GENERATION OF MOBILE COMMUNICATION
PERFORMANCE PREDICTION OF 5G: THE NEXT GENERATION OF MOBILE COMMUNICATIONPERFORMANCE PREDICTION OF 5G: THE NEXT GENERATION OF MOBILE COMMUNICATION
PERFORMANCE PREDICTION OF 5G: THE NEXT GENERATION OF MOBILE COMMUNICATIONijngnjournal
 
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMS
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMSPERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMS
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMSijngnjournal
 
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMS
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMSPERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMS
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMSijngnjournal
 
COMPARISON OF RADIO PROPAGATION MODELS FOR LONG TERM EVOLUTION (LTE) NETWORK
COMPARISON OF RADIO PROPAGATION MODELS FOR LONG TERM EVOLUTION (LTE) NETWORKCOMPARISON OF RADIO PROPAGATION MODELS FOR LONG TERM EVOLUTION (LTE) NETWORK
COMPARISON OF RADIO PROPAGATION MODELS FOR LONG TERM EVOLUTION (LTE) NETWORKijngnjournal
 
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...ijngnjournal
 
The Performance of a Cylindrical Microstrip Printed Antenna for TM10 Mode as...
The Performance of a Cylindrical Microstrip Printed Antenna for TM10  Mode as...The Performance of a Cylindrical Microstrip Printed Antenna for TM10  Mode as...
The Performance of a Cylindrical Microstrip Printed Antenna for TM10 Mode as...ijngnjournal
 
Optimization of Quality of Service Parameters for Dynamic Channel Allocation ...
Optimization of Quality of Service Parameters for Dynamic Channel Allocation ...Optimization of Quality of Service Parameters for Dynamic Channel Allocation ...
Optimization of Quality of Service Parameters for Dynamic Channel Allocation ...ijngnjournal
 
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDPURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDijngnjournal
 
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIO
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIOA SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIO
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIOijngnjournal
 
HYBRID LS-LMMSE CHANNEL ESTIMATION Technique for LTE Downlink Systems
HYBRID LS-LMMSE CHANNEL ESTIMATION Technique for LTE Downlink SystemsHYBRID LS-LMMSE CHANNEL ESTIMATION Technique for LTE Downlink Systems
HYBRID LS-LMMSE CHANNEL ESTIMATION Technique for LTE Downlink Systemsijngnjournal
 
SERVICES AS PARAMETER TO PROVIDE BEST QOS : AN ANALYSIS OVER WIMAX
SERVICES AS PARAMETER TO PROVIDE BEST QOS : AN ANALYSIS OVER WIMAXSERVICES AS PARAMETER TO PROVIDE BEST QOS : AN ANALYSIS OVER WIMAX
SERVICES AS PARAMETER TO PROVIDE BEST QOS : AN ANALYSIS OVER WIMAXijngnjournal
 
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORK
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORKENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORK
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORKijngnjournal
 
SECURITY ANALYSIS AND DELAY EVALUATION FOR SIP-BASED MOBILE MASS EXAMINATION ...
SECURITY ANALYSIS AND DELAY EVALUATION FOR SIP-BASED MOBILE MASS EXAMINATION ...SECURITY ANALYSIS AND DELAY EVALUATION FOR SIP-BASED MOBILE MASS EXAMINATION ...
SECURITY ANALYSIS AND DELAY EVALUATION FOR SIP-BASED MOBILE MASS EXAMINATION ...ijngnjournal
 
OPTIMIZATION OF QOS PARAMETERS IN COGNITIVE RADIO USING ADAPTIVE GENETIC ALGO...
OPTIMIZATION OF QOS PARAMETERS IN COGNITIVE RADIO USING ADAPTIVE GENETIC ALGO...OPTIMIZATION OF QOS PARAMETERS IN COGNITIVE RADIO USING ADAPTIVE GENETIC ALGO...
OPTIMIZATION OF QOS PARAMETERS IN COGNITIVE RADIO USING ADAPTIVE GENETIC ALGO...ijngnjournal
 
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKSHIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKSijngnjournal
 
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...ijngnjournal
 
OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6
OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6 OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6
OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6 ijngnjournal
 
INVESTIGATION OF UTRA FDD DATA AND CONTROL CHANNELS IN THE PRESENCE OF NOISE ...
INVESTIGATION OF UTRA FDD DATA AND CONTROL CHANNELS IN THE PRESENCE OF NOISE ...INVESTIGATION OF UTRA FDD DATA AND CONTROL CHANNELS IN THE PRESENCE OF NOISE ...
INVESTIGATION OF UTRA FDD DATA AND CONTROL CHANNELS IN THE PRESENCE OF NOISE ...ijngnjournal
 

More from ijngnjournal (20)

Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...
Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...
Trend-Based Networking Driven by Big Data Telemetry for Sdn and Traditional N...
 
TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...
TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...
TREND-BASED NETWORKING DRIVEN BY BIG DATA TELEMETRY FOR SDN AND TRADITIONAL N...
 
PERFORMANCE PREDICTION OF 5G: THE NEXT GENERATION OF MOBILE COMMUNICATION
PERFORMANCE PREDICTION OF 5G: THE NEXT GENERATION OF MOBILE COMMUNICATIONPERFORMANCE PREDICTION OF 5G: THE NEXT GENERATION OF MOBILE COMMUNICATION
PERFORMANCE PREDICTION OF 5G: THE NEXT GENERATION OF MOBILE COMMUNICATION
 
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMS
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMSPERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMS
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMS
 
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMS
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMSPERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMS
PERFORMANCE EVALUATION OF VERTICAL HARD HANDOVERS IN CELLULAR MOBILE SYSTEMS
 
COMPARISON OF RADIO PROPAGATION MODELS FOR LONG TERM EVOLUTION (LTE) NETWORK
COMPARISON OF RADIO PROPAGATION MODELS FOR LONG TERM EVOLUTION (LTE) NETWORKCOMPARISON OF RADIO PROPAGATION MODELS FOR LONG TERM EVOLUTION (LTE) NETWORK
COMPARISON OF RADIO PROPAGATION MODELS FOR LONG TERM EVOLUTION (LTE) NETWORK
 
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
IMPLEMENTATION AND COMPARISION OF DATA LINK QUALITY SCHEME ON ODMRP AND ADMR ...
 
The Performance of a Cylindrical Microstrip Printed Antenna for TM10 Mode as...
The Performance of a Cylindrical Microstrip Printed Antenna for TM10  Mode as...The Performance of a Cylindrical Microstrip Printed Antenna for TM10  Mode as...
The Performance of a Cylindrical Microstrip Printed Antenna for TM10 Mode as...
 
Optimization of Quality of Service Parameters for Dynamic Channel Allocation ...
Optimization of Quality of Service Parameters for Dynamic Channel Allocation ...Optimization of Quality of Service Parameters for Dynamic Channel Allocation ...
Optimization of Quality of Service Parameters for Dynamic Channel Allocation ...
 
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDPURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
 
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIO
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIOA SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIO
A SURVEY ON DYNAMIC SPECTRUM ACCESS TECHNIQUES FOR COGNITIVE RADIO
 
HYBRID LS-LMMSE CHANNEL ESTIMATION Technique for LTE Downlink Systems
HYBRID LS-LMMSE CHANNEL ESTIMATION Technique for LTE Downlink SystemsHYBRID LS-LMMSE CHANNEL ESTIMATION Technique for LTE Downlink Systems
HYBRID LS-LMMSE CHANNEL ESTIMATION Technique for LTE Downlink Systems
 
SERVICES AS PARAMETER TO PROVIDE BEST QOS : AN ANALYSIS OVER WIMAX
SERVICES AS PARAMETER TO PROVIDE BEST QOS : AN ANALYSIS OVER WIMAXSERVICES AS PARAMETER TO PROVIDE BEST QOS : AN ANALYSIS OVER WIMAX
SERVICES AS PARAMETER TO PROVIDE BEST QOS : AN ANALYSIS OVER WIMAX
 
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORK
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORKENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORK
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORK
 
SECURITY ANALYSIS AND DELAY EVALUATION FOR SIP-BASED MOBILE MASS EXAMINATION ...
SECURITY ANALYSIS AND DELAY EVALUATION FOR SIP-BASED MOBILE MASS EXAMINATION ...SECURITY ANALYSIS AND DELAY EVALUATION FOR SIP-BASED MOBILE MASS EXAMINATION ...
SECURITY ANALYSIS AND DELAY EVALUATION FOR SIP-BASED MOBILE MASS EXAMINATION ...
 
OPTIMIZATION OF QOS PARAMETERS IN COGNITIVE RADIO USING ADAPTIVE GENETIC ALGO...
OPTIMIZATION OF QOS PARAMETERS IN COGNITIVE RADIO USING ADAPTIVE GENETIC ALGO...OPTIMIZATION OF QOS PARAMETERS IN COGNITIVE RADIO USING ADAPTIVE GENETIC ALGO...
OPTIMIZATION OF QOS PARAMETERS IN COGNITIVE RADIO USING ADAPTIVE GENETIC ALGO...
 
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKSHIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
HIGH PERFORMANCE ETHERNET PACKET PROCESSOR CORE FOR NEXT GENERATION NETWORKS
 
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
 
OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6
OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6 OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6
OPTIMUM EFFICIENT MOBILITY MANAGEMENT SCHEME FOR IPv6
 
INVESTIGATION OF UTRA FDD DATA AND CONTROL CHANNELS IN THE PRESENCE OF NOISE ...
INVESTIGATION OF UTRA FDD DATA AND CONTROL CHANNELS IN THE PRESENCE OF NOISE ...INVESTIGATION OF UTRA FDD DATA AND CONTROL CHANNELS IN THE PRESENCE OF NOISE ...
INVESTIGATION OF UTRA FDD DATA AND CONTROL CHANNELS IN THE PRESENCE OF NOISE ...
 

Recently uploaded

Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxPurva Nikam
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniquesugginaramesh
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 

Recently uploaded (20)

Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 

SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK

  • 1. International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016 DOI : 10.5121/ijngn.2016.8102 13 SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK Tarun Sharma1, Harsukhpreet Singh2, Anurag sharma3 Dept” of Computer Science & Engineering, CT Institute of Technology & Research1 Dept” of Electronics & Communication Engineering, CT Institute of Technology & Research 2,3,Jalandhar, Punjab,India1,2,3 ABSTRACT The modern growth in fabricate energy efficient Wireless Sensor Network is liberal a novel way to systematize WSN in applications like surveillance, industrial monitoring, traffic monitoring, habitat monitoring, cropping monitoring, crowd including etc. The rising use of these networks is making engineers evolve novel and efficient ideas in this field. A group of research in data routing, data density and in network aggregation has been proposed in recent years. The energy consumption is the main apprehension in the wireless sensor network. There are many protocols in wireless sensor network to diminish the energy consumption and to put in to the network lifetime. Among a range of types of techniques, clustering is the most efficient technique to diminish the energy expenditure of network. In this effort, LEACH protocol has been second-hand for clustering in which cluster heads are nominated on the basis of distance and energy. The LEACH protocol is been implemented in a simulated environment and analyze their performance graphically. KEYWORDS Wireless sensor networks, energy efficiency, Clustering, LEACH protocol 1. INTRODUCTION A wireless sensor network is complete up of a huge quantity of sensor nodes and a sink [2]. The WSN is self-confident of sensor nodes from hundreds or thousands and every node is coupled to one sensor nodes. A wireless sensor network entire up of a large number of nodes extend over a precise area. A sensor node self-confident of the sensor, actuators, memory, a mainframe and they do have communication aptitude. All the sensor nodes are permitted to communicate in the course of a wireless intermediary. The wireless standard is of infrared, radio frequency that having no wired tie friendly. So the sensor nodes are deployed in a random conduct and it make ad-hoc network because they can discuss themselves [1]. If the node is unable to converse with other nodes of the network through a direct link, it means the node is out of range. In such kind of networks data broadcast from one node to another is perform via in the middle of nodes. This idea is referred as multi- hoping. All sensors nodes work helpfully to serve the requests [4]. 1.1Energy Consumption Issues The chief complicatedness in WSN, sensor node have classified battery life because the sensor nodes size is small so battery size, processor, storage liberty for data, these all are small as sensor nodes. So the main central point on lessening energy expenses in wireless sensor networks. In
  • 2. International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016 14 WSN a package of sensed information and routing in order has to be send which after have some time constraint so that information can be employable before any disaster occurs e.g. manufacturing monitoring, apparatus Monitoring etc. In WSN the power authority utilization is much better-quality data communication then internal processing. So, Energy preservation in WSN is the need to the address [3]. The Wireless sensor is flat to node stop working due to power hitting. In order to supply a reliable examine through a network, the network should be celebrity adjusting and must have elastic properties as requisite from point in time to time. A classified contact node may meet failure due to imperfect battery subsistence. In such case the network protocol should be logical enough to such collapse to keep the network organized many techniques are proposed for energy concession, clustering is single of them. The cluster heads are voted periodically such that members of a cluster can converse with their cluster heads. These cluster heads send data documented from its members to a base station. The multi-clustering can also be used. The cluster head should have to be rotated for the complementary of energy and then there will be an equal heaviness on every node. The energy expenditure can be strong [3]. Energy plays a vital task in wireless sensor networks because nodes are battery operated. Therefore numerous protocols have been proposed in order to diminish the energy consumption of these nodes such as LEACH [6], PAMAS [5]. LEACH is conscious as the most fashionable routing protocol that exploit cluster based routing in order to weaken the energy consumption, in this paper suggest a development on the LEACH protocol that supplementary recover the power consumption, simulation results express out that our protocol outperforms LEACH protocol in term of energy consumption and overall throughput. LEACH is “Low Energy Adaptive Clustering Protocol” [10]. LEACH form clusters and selects randomly cluster Heads for each cluster. Non- cluster heads sense the data and broadcast this data to cluster head, and then cluster head combined the data and forward this data to sink. The principle of this protocol is that it assigns overall energy consumption of the network uniformly to each node by selecting periodically different nodes as a cluster head. There are two phases of LEACH that are Setup phase and Steady state phase. In set up phase, clusters are shaped and cluster heads are chosen. In steady state phase, data from non-cluster heads is transmitted to sink. The sensor nodes communicate with cluster heads with allotted time using TDMA. Cluster heads are arbitrarily chosen in each round. LEACH operation is divided into several rounds. Each round begins with set-up phase. In this clusters are structured. LEACH set a threshold value T(n) and then sensor node I generate a random number between 0 and 1. If the random number is < T(n), the node will become cluster head for the current round and ordinary nodes link the cluster and become cluster members [6]. T (n) = p/1-p ×( r mod p-1 ) p is a probability of node to be selected as a cluster head, r is a number of rounds passed, G is a selection of ordinary nodes. Once a node become cluster head never become cluster head once more, only the node which have not become the cluster head and have elevated energy can become cluster head at r+1.When cluster head assigns time slots to the members using TDMA then it shifted to the steady state phase. After a shift in steady-state phase, members sent data to cluster heads; cluster head procedure the data and then send data sequence to the base station. After this round, it turn to next round and begin reconstruction new round. compensation of LEACH are that LEACH is completely distributed. LEACH does not necessitate the control information from the base station and the nodes do not require information of the global network in order for LEACH to work. LEACH reduces communication energy by 8 times as contrast to straight broadcast and smallest amount transmission energy routing. Disadvantages of LEACH are that the cluster heads are chosen arbitrarily. So the distribution of cluster heads cannot be ensured. In this protocol, the nodes with low energy have the same precedence as the nodes having high energy and nodes having low energy can become cluster heads [10].
  • 3. International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016 15 In section ii presents the connected works, In section iii initiate problem formulation, In section iv Simulation Setup, In section v result and discussion and section vi conclude the paper. Figure1: LEACH protocol Architecture 2. LITERATURE REVIEW A majority beneficial energy-saving spare organization, including spare collection and named it LEACH-SM protocol (modified form of prominent LEACH protocol) was deliberate by Baker B. et al.; (2014).In this author available a quantitative difference of energy consumption and WSN lifetime for both mentioned protocols [6]. Genetic algorithm and optimization of LEACH protocol that are worn on LEACH protocol and compare both domino effect on the basis of rounds that was discussed by Yadav S. et al.; (2014). This comparison was based on optimal thresholding probability for cluster structure. Finally, after comparison finds LEACH- GA method outperforms MTE, DT and LEACH in terms of network lifetime, use for optimal vigor- efficient clustering [11]. The two significant clustering protocols, namely LEACH and LEACH-C (centralized), using NS2 tool for numerous chosen scenarios, and study of simulation results against chosen performance metrics with latency and network lifetime was planned by Nayak P.et al.; (2014). As a conclusion of surveillance from results, it can be mentioned that LEACH can be favored if restricted harmonization of nodes in clustering without involving to BS is of tall priority than other factors like declaration over the desired number of clusters etc.; and LEACH- C can be designated when centralized and deterministic approach jacket complete network is unsurprising still bringing in enlarged network lifetime and desired number of clusters [7]. The tailored version of LEACH protocol called V-LEACH protocol and the contrast of LEACH protocol with V-LEACH protocol was designed by Alhawat A. et al.;(2013). from the simulation results were, first the numeral of busy nodes is more than the unique LEACH. Second the figure of dead nodes is less than the unique LEACH protocol. Network life-time is enlarged by 49.37% then original LEACH [6].
  • 4. International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016 16 Energy-LEACH protocol improves the CH selection procedure. It makes the lingering energy of nodes as the major metric which decides whether the nodes twist into CH or not after the first round. It same as LEACH protocol was projected by Xianging F. et al. ;( 2007). E-LEACH is alienated into rounds, in the first round, every node has the alike likelihood to turn into CH, that mean nodes are randomly chosen as CHs, In the next rounds, the left behind energy of each node is dissimilar after one round e-mail and taken into account for the collection of the CHs. That mean nodes have extra energy will develop into a CHs rather than nodes with fewer energy [6]. A novel version of LEACH called two-level LEACH was planned by Loscri V. In this protocol, CH collects data from other cluster members as exclusive LEACH, but rather than transport data to the BS openly, it uses one of the CHs that mendacity between the CH and the BS as a transmit station [8]. In LEACH, each CH straight communicates with BS no matter the distances between CH and BS It will guzzle a lot of its energy if the distance is distant. So conquer this drawback multihop- LEACH protocol was proposed by Zhou H. It selects a best possible path between the CH and the BS through other CHs and use these CHs as a relay station to televise data over through them [6]. 3. PROBLEM FORMULATION In this work, LEACH protocol has been worn for clustering in which cluster heads are preferred on the basis of distance and energy. • In LEACH protocol Cluster head straight communiqué with BS no matter the distance between Cluster head and the base station; it will use a group of its energy if the distance is far [13]. • Due to far distance packet does not arrive at the destination because CHs straight communicate with sink there is no inter-cluster communication, and this needs high trans-mission power due to this node dies earlier before transmission. 4. SIMULATION SET UP In this section, we evaluate the performance of LEACH protocol using NS2 tool. NS2 is used as simulation podium. NS is a distinct event simulator, where the go forward of time depends on the timing of events which are preserve by the scheduler. NS simulator is depending on two languages: C++, and an OTcl (an object-oriented tool command language).
  • 5. International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016 17 Table 1: NS-2 simulation parameters Parameter settings Simulation Area 500*500 meters No of nodes 41 Channel Type Channel/wireless Antennae model Antenna/omni antenna Energy model battery Interface queue Type Queue/Droptail/Priqueue Link layer type LL Initial energy 100 Routing protocol AODV Traffic Source CBR Type of MAC IEEE 802.11 Packet size 1000 bytes The C++ defines the interior instrument of the simulation objects, the OTcL sets up simulation by assembling and configuring the objects and scheduling discrete events. The OTcL are linked together using TclCL [12]. The experiments are performed with a diverse number of nodes placed in a 500m *500m field. Each sensor nodes is assumed to have an initial energy of 100 joules. The general simulation parameters are To evaluate the performance of LEACH protocol using parameters such as Energy consumption, Packet loss, End to End delay, Throughput and control overhead. Figure 2, shows energy consumption graph, in this graph 100 joules energy is to be addicted in 10 seconds because every cluster heads in LEACH protocol immediately communication with BS no stuff the distance between Cluster head and the base station; it will use a lot of its energy if the remoteness is far [13]. In figure 3, shows the packet loss graph, In this graph 16 number of the packet is lost in 10 seconds because in LEACH protocol CHs minter cluster communication, and this needs high trans-mission power due to this node dies earlier before transmission, packet does not reach the destination [14,15]. In Figure 4, shows End to End Delay graph, in this graph to increase the time delay is high due to high overhead which is a limitation of LEACH protocol [16]. In Figure 5, shows the throughput graph, in this graph 12 packet delivered in 10 seconds because due to high packet loss, delay, and control overhead so that the overall efficiency of the network is decreased [16]. In Figure 6, shows the control overhead. In this graph overhead is giant because in LEACH protocol extra overheads due to cluster head change and calculation leading to energy incompetence for dynamic clustering in large networks [17].
  • 6. International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016 18 Figure 2: Energy consumption graph of LEACH Protocol Figure 3: packet losses graph of LEACH protocol
  • 7. International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016 19 Figure 4 : End to End Delay of LEACH protocol Figure 5:Throughput graph of LEACH protocol
  • 8. International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016 20 Figure 6: Control overhead in LEACH protocol 6. CONCLUSION AND FUTURE WORK The conclusion of this paper is to apply and evaluate the performance of LEACH protocol using QoS parameters such as energy consumption, packet loss, End-to End-Delay, Throughput, and Control Overhead. The energy consumption of LEACH is very high because each cluster heads straight communiqué with BS no material the distance between Cluster head and the base station; it will use a group of its energy if the remoteness is far. Due to far distance packet does not arrive at the sink, packet loss problem is occurred so the overall performance of the networks is decreased. With the outcome obtained in this paper, a further issue worthy of consideration with RFID protocol can be done named as R- LEACH protocol. The design system can be extended using R-LEACH protocol; Of course, since we have focused only on LEACH protocol in this paper, the diagnosis can be done using R- LEACH protocol. We would like to consider these issues in subsequent work. ACKNOWLEDGEMENT I hereby acknowledge that the above-referred work is my own research work and I am entirely responsible for any kind of misuse of material. I thank my mentor Er. Harsukh Singh to guide and encourage me and for putting all her valuable time for me to get the desired output.
  • 9. International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016 21 REFERENCES [1] S. Pant, N. Chauhan,P. Kumar, “Effective Cache based Policies in Wireless Sensor Networks: A Survey,” International. Journal of Computer Application., vol. 11, no. 10, pp. 17–21, 2010. [2] I. Akyildiz, W. Su, Y. Sankarasubramaniam,E. Cayirci, “Wireless sensor networks: a survey,” Comput. Networks, vol. 38, pp. 393–422, 2002. [3] D. Zhang, G. Li, K. Zheng, X. Ming, Z. H. Pan, “An energy-balanced routing method based on forward-aware factor for wireless sensor networks,” IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, vol. 10, no. 1, pp. 766–773,2014. [4] L. Jian-qi, C. Bin-fang, W. Li, W. Wen-Hu, “Energy optimized approach based on clustering routing protocol for wireless sensor networks,” 2013 25th Chinese Control Decision. Conference, pp. 3710– 3715, 2013. [5] S. Singh and C. S. Raghavendra, “PAMAS---power aware multi-access protocol with signalling for ad hoc networks,” ACM SIGCOMM Computer. Communication. Review., vol. 28, pp. 5–26, 1998. [6] Yassein, “Improvement on LEACH Protocol of Wireless Sensor Network (VLEACH),” International. Journal of Digital Content Technology and its Application, vol. 3, pp. 132–136, 2009. [7] P. Nayak and D. Ph, “Comparison of Routing Protocols in WSN using NetSim Simulator : LEACH Vs LEACH-C,” vol. 106, no. 11, pp. 1–6, 2014. [8] A. Kaur and A. Grover, “LEACH and Extended LEACH Protocols in Wireless Sensor Network-A Survey,” International. Journal of Computer Application vol. 116, no. 10, pp. 1–5, 2015. [9] D. Xu and J. Gao, “Comparison Study to Hierarchical Routing Protocols in Wireless Sensor Networks,” Procedia Environmental Science,Elsevier, vol. 10, pp. 595–600, 2011. [10] S. Yadav and S. S. Yadav, “Review for Leach Protocol in WSN,” International Journal of Recent Development in Engineering and Technology vol. 2, no 6, pp. 69–71, 2014. [11] A. Ahlawat and V. Malik, “An extended vice-cluster selection approach to improve v leach protocol in WSN,” 3rd Third International Conference on Advanced Computing & Communication Technologies, ACCT, pp. 236–240, 2013. [12] N. Singh, P. Rajeshwar, L. Dua, and V. Mathur, “Network Simulator NS2-2 .35,” International Journal of Advanced Research in Computer Science and Software Engineering vol. 2, no. 5, pp. 224– 228, 2012. [13] R. Ramesh, R. M. D. Charaan, N. T. M. Kumar, and E. Uma, “Implementation of Load Balancing in Leach Protocol for Wireless Sensor Networks,”2nd international conference on emerging trends in Engineering and technology,London(U.K) , pp. 80–84, 2014. [14] R. Kumar, “Analysis and Enhancement of Adaptive Packet Technique in Wireless Sensor Network,” vol. 24, no. 5, pp. 227– 230, 2015. [15] Gagandeep kaur , poonam arora, “To Reduce the Packet Collision by Using Adaptive Technique in WSN, International Journal of Advanced Research in Electrical Electronics andInstrumentationEngineering” Vol. 3, pp. 11336–11341, 2014. [16] L. Y. Barai, “Performance Evaluation of LEACH Protocol for Wireless Sensor Network,” vol. 1, no. 6, pp. 141–145, 2014. [17] Singh S. & Singh G., “A Noble Routing Protocol for Vehicular Adhoc Networks with Less RoutingOverheads,”International Journal of Future Generation Communication and Networking, Vol. 7, no.5,pp23-34,2014.