SlideShare a Scribd company logo
1 of 8
Download to read offline
International Journal on Soft Computing (IJSC) Vol.8, No. 2, May 2017
DOI:10.5121/ijsc.2017.8201 1
COMPARATIVE ANALYSIS OF ROUTE INFORMATION
BASED ENHANCED DIVIDE AND RULE STRATEGY IN
WSNS
Rajeev Kumar Harsukhpreet Singh and Anurag Sharma
Department of Electronics and Communication Engineering, CTITR, Maqsudan,
Jalandhar
ABSTRACT
In wireless sensor network, routing data efficiently to the base station is a big issue and for this purpose, a
number of routing algorithms are invented by researchers. Clustering plays a very important role in the
design and as well as development of wireless sensor networks for well distribution of network and also to
route data efficiently. In this paper, we had done the enhancement of divide and rule strategy that is
basically route information protocol based upon static clustering and dynamic cluster head selection.
Simulation results show that our technique outperforms DR, LEACH, and AODV on the basis of packet
loss, delay, and throughput.
INDEX TERMS
Routing protocols, clustering, Coverage hole and energy hole.
1. INTRODUCTION
WSNs consist of a number of sensor nodes that have the capability of computation and can
communicate with each other to send data efficiently to the base station (BS) wirelessly. Also
these sensor nodes are having limited energy source. [1]. So routing data efficiently to the BS is
one of the major issues in WSNs. For this purpose many routing techniques, algorithms and
protocols have been invented [2][16][17]. Clustering is one of them it saves the energy of the
sensor nodes to a large extent by grouping them. A group of sensor nodes is termed as a cluster
and each cluster is having a cluster head (CH). A CH is chosen on the basis of many different
parameters like its proximity to all the other nodes of the cluster, its residual energy, distance
from the BS, and many more [3]. In a cluster, each and every node senses the data. But they pass
it their CH only, unlike in normal routing techniques where information is passed to all the other
nodes. Hence, it leads to the savage of the energy of the sensor nodes. The CH then passes the
data received from the nodes in its cluster to the BS [23] [30].There are number of protocols
suggested by researchers that divide the network area to remove the issue of coverage hole [32].
In our research, proposed protocols network division and working is explained in detail in
following sections.
Initially the network is divided into n number of concentric squares with base station at the center
of the network. The value of n depends upon network area and node density of the network. For
understanding the proposed strategy, we use three concentric squares named inner square (Is),
International Journal on Soft Computing (IJSC) Vol.8, No. 2, May 2017
2
middle square (Ms) and outer square (Os) [33][32]. Using the co-ordinates of base station
(‫ݔ‬ଵ, ‫ݕ‬ଵ)as reference point and adding distance d to these co-ordinates to make equations.
ࢀ࢘
ࡵ࢙(࢞૛, ࢟૛) = (࢞૚ + ࢊ, ࢟૚ + ࢊ) (1)
࡮࢘
ࡵ࢙(࢞૛, ࢟૛) = (࢞૚ + ࢊ, ࢟૚ − ࢊ) (2)
ࢀ࢒
ࡵ࢙
(࢞૛, ࢟૛) = (࢞૚ − ࢊ, ࢟૚ + ࢊ)	 (3)
࡮࢘
ࡵ࢙(࢞૛, ࢟૛) = (࢞૚ − ࢊ, ࢟૚ − ࢊ) (4)
Where
ܶ௥
ூ௦
= Top right corner of inner square
‫ܤ‬௥
ூ௦
= Bottom right corner of inner square
ܶ௟
ூ௦
= Top left corner of inner square
‫ܤ‬௥
ூ௦
= Bottom left corner of inner square
Above written equations are for inner square and for middle and outer square d is multiplied by 2
and 3 respectively. Than these squares further divided into subparts. To further divide the
network we take top right and bottom right corners of inner square as reference point and by
adding d in x-coordinate of the upper right corner (‫ݔ‬ଷ + ݀, ‫ݕ‬ଷ) and y-coordinates of bottom right
corner (‫ݔ‬ଷ, ‫ݕ‬ଷ + ݀), we get new region S1. Similarly new regions are created using co-ordinates
of concentric squares [3].
2. CLUSTER HEAD SELECTION
Initially, the cluster head is selected as the node with smaller distance from cluster head. In the
next rounds as multihoping is done within the cluster, energy of the node dissipated differently so
node with the higher energy is selected as cluster head. There is no cluster head in inner square
Figure 1: block diagram
International Journal on Soft Computing (IJSC) Vol.8, No. 2, May 2017
3
3. PROTOCOL WORKING
DR strategy lacks systems efficiency as nodes of corner region because of large communication
distance between them and cluster heads exhaust their energy rapidly and hence to overcome this
issue we proposed improved divide and rule strategy. In proposed strategy, we use intra-cluster
multihoping that is corner region nodes send the aggregated data to the node close to the base
station as its next hop instead of sending data directly to the cluster head. Than this node send its
own aggregated data and data from the previous node to the cluster head. In the next step, after
data aggregation from all nodes cluster heads of outer region send data to the cluster heads of
middle square as their next hop and then middle regions cluster head send data to the base station.
4. RESULTS AND DISCUSSIONS
We analyze the results using network simulator 2.35 and check improved divide and rule strategy
in varying network sizes as well as node density and simulation time. Results depict that
improved divide and rule strategy proves better than the other protocols in terms of delay, packet
loss and throughput.
Delay: The time required by packet to reach destination from the source is known as delay. Delay
of improved divide and rule strategy is better than the other protocols as corner region nodes alive
for longer time. According to figure 1a, in 25*25 network area, improved divide and rule
strategy’s delay is 10% less than DR, 17% less than LEACH and 31% less than AODV. In 50*50
network area, improved divide and rule strategy’s delay is 11% less than DR, 16% less than
LEACH and 27% less than AODV. In 75*75 network area, improved divide and rule strategy’s
delay is 2% less than DR as well as LEACH and 10% less than AODV. In 100*100 network area,
improved divide and rule strategy’s delay is 7% less than DR, 3.7% less than LEACH and 15%
less than AODV. Thus in 100*100 network area, propagation delay of improved divide and rule
strategy is less than DR, LEACH and AODV routing protocol.
International Journal on Soft Computing (IJSC) Vol.8, No. 2, May 2017
4
Figure 1a: Delay (100*100 area)
Figure 1b: Delay (node density)
Packet loss: The number of packets that not reaches the BS during transmission is known as
packet loss. According to figure 2a, packet loss of improved divide and rule strategy’s results
better than LEACH and AODV for smaller or even larger networks. In 25*25 network area,
International Journal on Soft Computing (IJSC) Vol.8, No. 2, May 2017
5
improved divide and rule strategy’s packet loss is 9% less than DR, 21% less than LEACH and
35% less than AODV. In 50*50 network area, improved divide and rule strategy’s packet loss is
5% less than DR, 18% less than LEACH and 44% less than AODV. In 75*75 network area,
improved divide and rule strategy’s packet loss is 5% less than DR, 19% less than LEACH and
40% less than AODV. In 100*100 network area, improved divide and rule strategy’s packet loss
is 8% less than DR, 13% less than LEACH and 49% less than AODV. Figure 2b shows the
results for 100*100 network area with respect to simulation time and packet loss of improved
divide and rule strategy is less than rest of the protocols.
Figure 2a: Packet loss (100*100 area)
International Journal on Soft Computing (IJSC) Vol.8, No. 2, May 2017
6
Figure 2b: Packet loss (node density)
Throughput: The number of packets received at the base station per unit time is known as
throughput. According to figure 3a, throughput of improved divide and rule strategy’s proves
better and is increase in smaller as well as large networks. In 25*25 network area, improved
divide and rule strategy’s throughput is 0.2% more than DR, 1% LEACH and 14% more than
AODV. In 50*50 network area, improved divide and rule strategy’s throughput is 0.3% more
than DR, 6% more than LEACH and 16% more than AODV. In 75*75 network area, improved
divide and rule strategy’s throughput is 2% more than DR, 5% more than LEACH and 13% more
than AODV. In 100*100 network area, improved divide and rule strategy’s throughput is 1%
more than DR, 3% more than LEACH and 15% more than AODV. Figure 3b shows the results
respective to the simulation time, and improved divide and rule strategy proves better than DR,
LEACH and AODV.
International Journal on Soft Computing (IJSC) Vol.8, No. 2, May 2017
7
Figure 3a: Throughput (100*100 area)
Figure 3b: Throughput (node density)
International Journal on Soft Computing (IJSC) Vol.8, No. 2, May 2017
8
5. CONCLUSION
In this paper we introduce improved divide and rule strategy that is based upon static clustering
and energy based cluster head selection. As number of cluster heads remains constant throughout
the network load id equally distributed among the nodes. In this strategy we use multihoping
within the clusters as well as outside the cluster to save energy and increase efficiency of the
network. We compare our technique with DR strategy, LEACH and AODV using network
simulator in terms of delay, packet loss and throughput. Results show our technique performs
better than rest of the protocols.
REFERENCE
[1] K. Latif, A. Ahmed, N. Javaid, Z. A. Khan, N. Alrajeh, “Divide and rule scheme for energy efficient
routing in wireless sensor networks,” 4th
International Conference of Ambient Systems, vol. 19, pp.
340-347, 2013.
[2] A. Ahmed, K. Latif, N. Javaid, Z. A. Khan, U. Qasim, “ Density controlled divide and rule scheme for
energy efficient routing in wireless sensor network” in Proc. Of IEEE Canadian Conference on
Electrical and Computer Engineering, pp 1-4, 2013.
[3] K. Latif, N. Javaid, M. N. Saqib, Z. A. Khan, N. Alrajeh, “Energy consumption model for density
controlled divide and rule scheme for energy efficient routing in wireless sensor network,”
International Journal Of Ad Hoc And Ubiquitous Computing, pp. 1-26, 2015.

More Related Content

What's hot

Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop CommunicationIJCSIS Research Publications
 
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc Network
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc NetworkA Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc Network
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc NetworkIOSR Journals
 
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHODNONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHODijwmn
 
Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015parry prabhu
 
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...ijceronline
 
Optimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesOptimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesIJTET Journal
 
Efficient processing of spatial range queries on wireless broadcast streams
Efficient processing of spatial range queries on wireless broadcast streamsEfficient processing of spatial range queries on wireless broadcast streams
Efficient processing of spatial range queries on wireless broadcast streamsijdms
 
Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...Dr. Amarjeet Singh
 
A Survey on Topology Control and Maintenance in Wireless Sensor Networks
A Survey on Topology Control and Maintenance in Wireless Sensor NetworksA Survey on Topology Control and Maintenance in Wireless Sensor Networks
A Survey on Topology Control and Maintenance in Wireless Sensor Networksijeei-iaes
 
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...IJCNCJournal
 
Effective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridEffective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridiaemedu
 
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...M H
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNpaperpublications3
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
Operating Task Redistribution in Hyperconverged Networks
Operating Task Redistribution in Hyperconverged Networks Operating Task Redistribution in Hyperconverged Networks
Operating Task Redistribution in Hyperconverged Networks IJECEIAES
 
An Overview of Information Extraction from Mobile Wireless Sensor Networks
An Overview of Information Extraction from Mobile Wireless Sensor NetworksAn Overview of Information Extraction from Mobile Wireless Sensor Networks
An Overview of Information Extraction from Mobile Wireless Sensor NetworksM H
 
Vol 8 No 1 - December 2013
Vol 8 No 1 - December 2013Vol 8 No 1 - December 2013
Vol 8 No 1 - December 2013ijcsbi
 

What's hot (18)

Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc Network
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc NetworkA Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc Network
A Survey Paper on Cluster Head Selection Techniques for Mobile Ad-Hoc Network
 
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHODNONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
 
Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015
 
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...
Efficient Query Evaluation of Probabilistic Top-k Queries in Wireless Sensor ...
 
Optimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesOptimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query Services
 
Efficient processing of spatial range queries on wireless broadcast streams
Efficient processing of spatial range queries on wireless broadcast streamsEfficient processing of spatial range queries on wireless broadcast streams
Efficient processing of spatial range queries on wireless broadcast streams
 
Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...Minimization of Localization Error using Connectivity based Geometrical Metho...
Minimization of Localization Error using Connectivity based Geometrical Metho...
 
A Survey on Topology Control and Maintenance in Wireless Sensor Networks
A Survey on Topology Control and Maintenance in Wireless Sensor NetworksA Survey on Topology Control and Maintenance in Wireless Sensor Networks
A Survey on Topology Control and Maintenance in Wireless Sensor Networks
 
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
 
Effective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using gridEffective broadcasting in mobile ad hoc networks using grid
Effective broadcasting in mobile ad hoc networks using grid
 
Ijnsa050209
Ijnsa050209Ijnsa050209
Ijnsa050209
 
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
Algorithmic Construction of Optimal and Load Balanced Clusters in Wireless Se...
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Operating Task Redistribution in Hyperconverged Networks
Operating Task Redistribution in Hyperconverged Networks Operating Task Redistribution in Hyperconverged Networks
Operating Task Redistribution in Hyperconverged Networks
 
An Overview of Information Extraction from Mobile Wireless Sensor Networks
An Overview of Information Extraction from Mobile Wireless Sensor NetworksAn Overview of Information Extraction from Mobile Wireless Sensor Networks
An Overview of Information Extraction from Mobile Wireless Sensor Networks
 
Vol 8 No 1 - December 2013
Vol 8 No 1 - December 2013Vol 8 No 1 - December 2013
Vol 8 No 1 - December 2013
 

Similar to COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRATEGY IN WSNS

Comparative Analysis of Route Information Based Enhanced Divide and Rule Stra...
Comparative Analysis of Route Information Based Enhanced Divide and Rule Stra...Comparative Analysis of Route Information Based Enhanced Divide and Rule Stra...
Comparative Analysis of Route Information Based Enhanced Divide and Rule Stra...ijsc
 
Ameliorate the performance using soft computing approaches in wireless networks
Ameliorate the performance using soft computing approaches  in wireless networksAmeliorate the performance using soft computing approaches  in wireless networks
Ameliorate the performance using soft computing approaches in wireless networksIJECEIAES
 
Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...
Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...
Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...IRJET Journal
 
Distance based cluster head section in sensor networks for efficient energy u...
Distance based cluster head section in sensor networks for efficient energy u...Distance based cluster head section in sensor networks for efficient energy u...
Distance based cluster head section in sensor networks for efficient energy u...IAEME Publication
 
Distance based cluster head section in sensor networks for efficient energy u...
Distance based cluster head section in sensor networks for efficient energy u...Distance based cluster head section in sensor networks for efficient energy u...
Distance based cluster head section in sensor networks for efficient energy u...IAEME Publication
 
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...IRJET Journal
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Editor IJCATR
 
Maximizing Network Lifetime by Using Smart Cluster Head Selection
Maximizing Network Lifetime by Using Smart Cluster Head SelectionMaximizing Network Lifetime by Using Smart Cluster Head Selection
Maximizing Network Lifetime by Using Smart Cluster Head Selectioniosrjce
 
An energy-efficient cluster head selection in wireless sensor network using g...
An energy-efficient cluster head selection in wireless sensor network using g...An energy-efficient cluster head selection in wireless sensor network using g...
An energy-efficient cluster head selection in wireless sensor network using g...TELKOMNIKA JOURNAL
 
IRJET- Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
IRJET-  	  Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...IRJET-  	  Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
IRJET- Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...IRJET Journal
 
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor NetworksEnhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor NetworksAssociate Professor in VSB Coimbatore
 
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor NetworkCBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor NetworkCSEIJJournal
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET Journal
 
34 9141 it ns2-tentative route selection approach for edit septian
34 9141 it  ns2-tentative route selection approach for edit septian34 9141 it  ns2-tentative route selection approach for edit septian
34 9141 it ns2-tentative route selection approach for edit septianIAESIJEECS
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...csijjournal
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...csijjournal
 
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...acijjournal
 
DATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEY
DATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEYDATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEY
DATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEYijasuc
 
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...IJCSEA Journal
 

Similar to COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRATEGY IN WSNS (20)

Comparative Analysis of Route Information Based Enhanced Divide and Rule Stra...
Comparative Analysis of Route Information Based Enhanced Divide and Rule Stra...Comparative Analysis of Route Information Based Enhanced Divide and Rule Stra...
Comparative Analysis of Route Information Based Enhanced Divide and Rule Stra...
 
Ameliorate the performance using soft computing approaches in wireless networks
Ameliorate the performance using soft computing approaches  in wireless networksAmeliorate the performance using soft computing approaches  in wireless networks
Ameliorate the performance using soft computing approaches in wireless networks
 
Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...
Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...
Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...
 
Distance based cluster head section in sensor networks for efficient energy u...
Distance based cluster head section in sensor networks for efficient energy u...Distance based cluster head section in sensor networks for efficient energy u...
Distance based cluster head section in sensor networks for efficient energy u...
 
Distance based cluster head section in sensor networks for efficient energy u...
Distance based cluster head section in sensor networks for efficient energy u...Distance based cluster head section in sensor networks for efficient energy u...
Distance based cluster head section in sensor networks for efficient energy u...
 
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
 
O0106395100
O0106395100O0106395100
O0106395100
 
Maximizing Network Lifetime by Using Smart Cluster Head Selection
Maximizing Network Lifetime by Using Smart Cluster Head SelectionMaximizing Network Lifetime by Using Smart Cluster Head Selection
Maximizing Network Lifetime by Using Smart Cluster Head Selection
 
An energy-efficient cluster head selection in wireless sensor network using g...
An energy-efficient cluster head selection in wireless sensor network using g...An energy-efficient cluster head selection in wireless sensor network using g...
An energy-efficient cluster head selection in wireless sensor network using g...
 
IRJET- Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
IRJET-  	  Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...IRJET-  	  Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
IRJET- Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
 
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor NetworksEnhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
 
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor NetworkCBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network
CBHRP: A Cluster Based Routing Protocol for Wireless Sensor Network
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
 
34 9141 it ns2-tentative route selection approach for edit septian
34 9141 it  ns2-tentative route selection approach for edit septian34 9141 it  ns2-tentative route selection approach for edit septian
34 9141 it ns2-tentative route selection approach for edit septian
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
 
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...
Transmission Time and Throughput analysis of EEE LEACH, LEACH and Direct Tran...
 
DATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEY
DATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEYDATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEY
DATA GATHERING ALGORITHMS FOR WIRELESS SENSOR NETWORKS: A SURVEY
 
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
 

Recently uploaded

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 

Recently uploaded (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 

COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRATEGY IN WSNS

  • 1. International Journal on Soft Computing (IJSC) Vol.8, No. 2, May 2017 DOI:10.5121/ijsc.2017.8201 1 COMPARATIVE ANALYSIS OF ROUTE INFORMATION BASED ENHANCED DIVIDE AND RULE STRATEGY IN WSNS Rajeev Kumar Harsukhpreet Singh and Anurag Sharma Department of Electronics and Communication Engineering, CTITR, Maqsudan, Jalandhar ABSTRACT In wireless sensor network, routing data efficiently to the base station is a big issue and for this purpose, a number of routing algorithms are invented by researchers. Clustering plays a very important role in the design and as well as development of wireless sensor networks for well distribution of network and also to route data efficiently. In this paper, we had done the enhancement of divide and rule strategy that is basically route information protocol based upon static clustering and dynamic cluster head selection. Simulation results show that our technique outperforms DR, LEACH, and AODV on the basis of packet loss, delay, and throughput. INDEX TERMS Routing protocols, clustering, Coverage hole and energy hole. 1. INTRODUCTION WSNs consist of a number of sensor nodes that have the capability of computation and can communicate with each other to send data efficiently to the base station (BS) wirelessly. Also these sensor nodes are having limited energy source. [1]. So routing data efficiently to the BS is one of the major issues in WSNs. For this purpose many routing techniques, algorithms and protocols have been invented [2][16][17]. Clustering is one of them it saves the energy of the sensor nodes to a large extent by grouping them. A group of sensor nodes is termed as a cluster and each cluster is having a cluster head (CH). A CH is chosen on the basis of many different parameters like its proximity to all the other nodes of the cluster, its residual energy, distance from the BS, and many more [3]. In a cluster, each and every node senses the data. But they pass it their CH only, unlike in normal routing techniques where information is passed to all the other nodes. Hence, it leads to the savage of the energy of the sensor nodes. The CH then passes the data received from the nodes in its cluster to the BS [23] [30].There are number of protocols suggested by researchers that divide the network area to remove the issue of coverage hole [32]. In our research, proposed protocols network division and working is explained in detail in following sections. Initially the network is divided into n number of concentric squares with base station at the center of the network. The value of n depends upon network area and node density of the network. For understanding the proposed strategy, we use three concentric squares named inner square (Is),
  • 2. International Journal on Soft Computing (IJSC) Vol.8, No. 2, May 2017 2 middle square (Ms) and outer square (Os) [33][32]. Using the co-ordinates of base station (‫ݔ‬ଵ, ‫ݕ‬ଵ)as reference point and adding distance d to these co-ordinates to make equations. ࢀ࢘ ࡵ࢙(࢞૛, ࢟૛) = (࢞૚ + ࢊ, ࢟૚ + ࢊ) (1) ࡮࢘ ࡵ࢙(࢞૛, ࢟૛) = (࢞૚ + ࢊ, ࢟૚ − ࢊ) (2) ࢀ࢒ ࡵ࢙ (࢞૛, ࢟૛) = (࢞૚ − ࢊ, ࢟૚ + ࢊ) (3) ࡮࢘ ࡵ࢙(࢞૛, ࢟૛) = (࢞૚ − ࢊ, ࢟૚ − ࢊ) (4) Where ܶ௥ ூ௦ = Top right corner of inner square ‫ܤ‬௥ ூ௦ = Bottom right corner of inner square ܶ௟ ூ௦ = Top left corner of inner square ‫ܤ‬௥ ூ௦ = Bottom left corner of inner square Above written equations are for inner square and for middle and outer square d is multiplied by 2 and 3 respectively. Than these squares further divided into subparts. To further divide the network we take top right and bottom right corners of inner square as reference point and by adding d in x-coordinate of the upper right corner (‫ݔ‬ଷ + ݀, ‫ݕ‬ଷ) and y-coordinates of bottom right corner (‫ݔ‬ଷ, ‫ݕ‬ଷ + ݀), we get new region S1. Similarly new regions are created using co-ordinates of concentric squares [3]. 2. CLUSTER HEAD SELECTION Initially, the cluster head is selected as the node with smaller distance from cluster head. In the next rounds as multihoping is done within the cluster, energy of the node dissipated differently so node with the higher energy is selected as cluster head. There is no cluster head in inner square Figure 1: block diagram
  • 3. International Journal on Soft Computing (IJSC) Vol.8, No. 2, May 2017 3 3. PROTOCOL WORKING DR strategy lacks systems efficiency as nodes of corner region because of large communication distance between them and cluster heads exhaust their energy rapidly and hence to overcome this issue we proposed improved divide and rule strategy. In proposed strategy, we use intra-cluster multihoping that is corner region nodes send the aggregated data to the node close to the base station as its next hop instead of sending data directly to the cluster head. Than this node send its own aggregated data and data from the previous node to the cluster head. In the next step, after data aggregation from all nodes cluster heads of outer region send data to the cluster heads of middle square as their next hop and then middle regions cluster head send data to the base station. 4. RESULTS AND DISCUSSIONS We analyze the results using network simulator 2.35 and check improved divide and rule strategy in varying network sizes as well as node density and simulation time. Results depict that improved divide and rule strategy proves better than the other protocols in terms of delay, packet loss and throughput. Delay: The time required by packet to reach destination from the source is known as delay. Delay of improved divide and rule strategy is better than the other protocols as corner region nodes alive for longer time. According to figure 1a, in 25*25 network area, improved divide and rule strategy’s delay is 10% less than DR, 17% less than LEACH and 31% less than AODV. In 50*50 network area, improved divide and rule strategy’s delay is 11% less than DR, 16% less than LEACH and 27% less than AODV. In 75*75 network area, improved divide and rule strategy’s delay is 2% less than DR as well as LEACH and 10% less than AODV. In 100*100 network area, improved divide and rule strategy’s delay is 7% less than DR, 3.7% less than LEACH and 15% less than AODV. Thus in 100*100 network area, propagation delay of improved divide and rule strategy is less than DR, LEACH and AODV routing protocol.
  • 4. International Journal on Soft Computing (IJSC) Vol.8, No. 2, May 2017 4 Figure 1a: Delay (100*100 area) Figure 1b: Delay (node density) Packet loss: The number of packets that not reaches the BS during transmission is known as packet loss. According to figure 2a, packet loss of improved divide and rule strategy’s results better than LEACH and AODV for smaller or even larger networks. In 25*25 network area,
  • 5. International Journal on Soft Computing (IJSC) Vol.8, No. 2, May 2017 5 improved divide and rule strategy’s packet loss is 9% less than DR, 21% less than LEACH and 35% less than AODV. In 50*50 network area, improved divide and rule strategy’s packet loss is 5% less than DR, 18% less than LEACH and 44% less than AODV. In 75*75 network area, improved divide and rule strategy’s packet loss is 5% less than DR, 19% less than LEACH and 40% less than AODV. In 100*100 network area, improved divide and rule strategy’s packet loss is 8% less than DR, 13% less than LEACH and 49% less than AODV. Figure 2b shows the results for 100*100 network area with respect to simulation time and packet loss of improved divide and rule strategy is less than rest of the protocols. Figure 2a: Packet loss (100*100 area)
  • 6. International Journal on Soft Computing (IJSC) Vol.8, No. 2, May 2017 6 Figure 2b: Packet loss (node density) Throughput: The number of packets received at the base station per unit time is known as throughput. According to figure 3a, throughput of improved divide and rule strategy’s proves better and is increase in smaller as well as large networks. In 25*25 network area, improved divide and rule strategy’s throughput is 0.2% more than DR, 1% LEACH and 14% more than AODV. In 50*50 network area, improved divide and rule strategy’s throughput is 0.3% more than DR, 6% more than LEACH and 16% more than AODV. In 75*75 network area, improved divide and rule strategy’s throughput is 2% more than DR, 5% more than LEACH and 13% more than AODV. In 100*100 network area, improved divide and rule strategy’s throughput is 1% more than DR, 3% more than LEACH and 15% more than AODV. Figure 3b shows the results respective to the simulation time, and improved divide and rule strategy proves better than DR, LEACH and AODV.
  • 7. International Journal on Soft Computing (IJSC) Vol.8, No. 2, May 2017 7 Figure 3a: Throughput (100*100 area) Figure 3b: Throughput (node density)
  • 8. International Journal on Soft Computing (IJSC) Vol.8, No. 2, May 2017 8 5. CONCLUSION In this paper we introduce improved divide and rule strategy that is based upon static clustering and energy based cluster head selection. As number of cluster heads remains constant throughout the network load id equally distributed among the nodes. In this strategy we use multihoping within the clusters as well as outside the cluster to save energy and increase efficiency of the network. We compare our technique with DR strategy, LEACH and AODV using network simulator in terms of delay, packet loss and throughput. Results show our technique performs better than rest of the protocols. REFERENCE [1] K. Latif, A. Ahmed, N. Javaid, Z. A. Khan, N. Alrajeh, “Divide and rule scheme for energy efficient routing in wireless sensor networks,” 4th International Conference of Ambient Systems, vol. 19, pp. 340-347, 2013. [2] A. Ahmed, K. Latif, N. Javaid, Z. A. Khan, U. Qasim, “ Density controlled divide and rule scheme for energy efficient routing in wireless sensor network” in Proc. Of IEEE Canadian Conference on Electrical and Computer Engineering, pp 1-4, 2013. [3] K. Latif, N. Javaid, M. N. Saqib, Z. A. Khan, N. Alrajeh, “Energy consumption model for density controlled divide and rule scheme for energy efficient routing in wireless sensor network,” International Journal Of Ad Hoc And Ubiquitous Computing, pp. 1-26, 2015.