SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2746
Analytical Study of Hierarchical Routing Protocols for Virtual Wireless
Sensor Network
Mahmoud Osama Ouf1, Alaa E.S. Ahmed2, Raafat A. EL Kammar3, Abdelwahab AlSammak4
1Assistant Lecturer, Computer Engineering Dept., Al Safwa High Inst. Of Eng. Ministry of High Education
2Assistant Professor, Computer Engineering Dept, Faculty of Engineering (Shoubra) Benha university,
Cairo, Egypt
3Professor, Computer Engineering Dept, Faculty of Engineering (Shoubra) Benha university, Cairo, Egypt
4Professor, Computer Engineering Dept, Faculty of Engineering (Shoubra) Benha university, Cairo, Egypt
---------------------------------------------------------------------------------***-------------------------------------------------------------------------------
Abstract - Nowadays more attention has been given to
“Internet of Things” (IoT). By networking thousands of nodes,
Wireless Sensor Networks (WSNs) can be used to observe
remote environment, physical phenomena, and real-life
applications such as health monitoring, smart home
monitoring, military applications etc. Different applications
require different WSNs configurations. To serve such
applications, a dedicatedWSN isneededperapplicationwhere
all nodes cooperate to achieve the requiredendresults. Virtual
Sensor Networks (VSNs)facilitateservingmultipleapplication
using the same WSN infrastructure. VSNs enable the same
sensor nodes with the ability to play differentrolesatthesame
time serving multiple applications. Thistechniqueallowsmore
than one application to share the same physical WSN. As a
result, flexible and cost-effective solutions would be provided.
Existing WSNs routing protocols need to be analyzed in the
context of VSNs to measure it efficiency and compatibility. In
this paper, LEACH, modleach, SEP, and ZSEP cluster-based
routing protocols areanalyzed. Multiple metricswill bestudies
such as network lifetime, load balance between nodes, and
total residual energy of the network. The results provide
insights on the different conditions needed to utilize theWSNs
routing protocols for VSNs.
Key Words: Virtualization Wireless Sensor network,
Cluster based Routing, Leach Protocol, VWSN
1. INTRODUCTION
Wireless sensor network (WSN) is one of the
important technologies in our live nowadays as well as
future communication. WSNs consist of tiny sensor nodes
and a base station (BS). Due to the small size and low power
capability of the nodes, the functionality of the nodes are
restricted. A node can sense various types of environmental
phenomena and sends data to other nodes or to BS.[1,2]. We
can use WSNs with a single application wherethenetwork is
dedicated for providing a single service for one application.
This situation is imposes a limitation that prevents efficient
utilization of the physical resources because no more than
one application is able to utilize theseresourcesatanysingle
moment. For example, if we have two applications that need
to run at the same time in the same geographical area, it
would be a must to deploy two sets of the sensor nodes
which means double the cost to operate these two
applications. A good solution to this problem, is to
virtualization of WSN (VSN).
Virtualization is an efficient techniqueusedtoallow
the physical resources of the WSN to appear logicallyinsuch
a way that let multiple applications to share and
communicate with the same resources in an efficient way
[1]. Virtualization in WSNs is a considered a new research
area that needs to be investigated deeply. The existing
routing protocols used with WSNs need to be analyzed and
checked in terms of its performance when used in Virtual
Wireless Sensor Networks (VSNs). Low Energy Adaptive
Cluster Hierarchy (LEACH) is one of the famous routing
protocols that has been used for clustering in WSN. In this
paper, LEACH, modleach, SEP, ZSEP protocols are analyzed
in order to investigate its compatibility with VSN. Therestof
this paper is organized as follows. In section 2,Virtualization
concept is presented. In section 3 the routing protocols
related work is given. The results of simulation results are
presented in section 4. Finally, we conclude this paper in
section 5.
2. VIRTUALIZATION CONCEPT
Virtualization for WSN gained more attention nowadays
as a means for efficient resources utilization in more
computing and networking.The aim of virtualization is todo
operationswithlowercost,increasednetworkmanageability,
flexibility,andimprovedadministrationandinter-operability
within different sensors.Thevirtualizationideaistoseparate
between the application layer and physical sensors layer, at
the physical layer sensors nodes aim to sensing changes in
some conditions and the area of operation, etc. Due to the
limitation of the sensor hardware and low power sources of
the sensor, is not efficient to run multiple OS at the level of
the sensor infrastructure. To achieve virtualization in WSN
some mechanisms must be developed for VSN nodes
membership and network maintenance. This can be done by
using dynamic reassignment of sensor nodes’ roles in the
network. A network can split or merge with other networks;
add or remove sensor nodes from the VSN.
Many different middlewaresolutionshavebeenproposed
in the last few years for WSNs. Each of these solutions have
different architectural design. Most of them are based on the
supported application domain which separates the physical
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2747
layer from heterogeneity and distribution of the
infrastructure sensor network. The concept of Virtual
machines is used with high-end servers and PCs to separate
the hardware from the application layer. In WSNs,
virtualization would give us the flexibility and dynamic
change of the infrastructure without any impact on the
application. Hereby, we propose a framework to produce a
Secure Virtual Sensor Network. This framework includes
three layers, Application Layer, Virtualization Layer, and
WSN Physical Infrastructure as shown in Fig.1.
Fig-1: Building Blocks in VSN Framework
The Virtualization layer main components are WSN
routing algorithm, cryptography(Encryption/ decryption)
algorithm, and the publish/subscribeparadigm.Inthispaper
we focus on the routing protocol component. Specifically,
LEACH, modleach, SEP, ZSEP protocols [1] are implemented
and analyzed in order to check out its compatibility with the
proposed framework.
Fig-2: Cluster-based communication hierarchy
3. RELATED WORK
The most popular existing routing protocols for WSN will
be discussed in this section. All these protocols are cluster-
based hierarchy routing protocols. The three main ideas for
cluster-based routing protocol are [5]: to increase network
lifetime, decrease the network traffic towards the sink node
and Simple data fusion. Eachgroup ofsensorsnodesgrouped
into clusters, the selection of Cluster Head (CH) is based on
the node with higher residual energy. The CH aggregates the
data from all its members and forwards this data to the sink
node, other nodes in the cluster perform thesensingtaskand
send sensed data to its CH at short distance. This process
reduces power consumptionbythenodesaswellasbalanced
traffic load and improved network scalability [4].
In WSN Hierarchical routing protocols consist of several
clusters. Each clusterhasonlyoneCHandseveralnon-cluster
nodes. There are different election protocols for the election
of a CH. The high-level communication done through cluster
heads [7]. In the following paragraph list explains of these
protocols:
3.1 Low Energy Adaptive Clustering Hierarchy (LEACH)
LEACH is a single hop Homogeneous cluster based
hierarchical routing protocol. LEACH performs every round
re-clustering functions andself-organizingforthenodes.The
sensor node organizes themselves into groups of clusters.
The cluster heads in LEACH is selected randomly. The
rotation of the CH among the sensors in a cluster distributes
energy consumption. The communication between cluster
groups and the sink node is done via the CH. All non-cluster
nodes use the CH to communicate with the sink node. Fig.2
shows basic cluster-based communication hierarchy.
Cluster head (CH) nodemain functionistocollectthedata
and compress it from all the cluster member. All the
aggregated data packets from the CH are sent to base station.
The amount of information transmitted as well as the power
consumed will be reduced when the CH eliminates
redundancy in data. To balance the energy over the cluster,
the CH changes over the time in a random way between the
sensor nodes. [5,7] The decision is made by choosing a
random number between 0 and 1 by the node. The node
becomes a CH dependingonthethresholdvalueforthisnode.
Where: P is the percentage of clusterheads,Gisthegroup
of nodes that non cluster head in 1 p rounds, r is the round
that is currently working on it. The LEACH protocol cycle
operation is done in rounds. Each round is divided into two
phases. The first phase is called the setup phase while the
second phase is called the steady state phase. During the
setup phase, all nodes are arranged in hierarchical order.
The CH have three functions data forwarding to BS, data
compression, and data aggregation. Any single node can be
chosen once to be the CH only once during any round P then
it can’t be chosen as the CH anymore. The duration of the
steady state phase is larger than the duration of the setup
phase and it starts after the data begins to be transmitted to
the BS.
3.2 The Adaptive Threshold sensitive Energy Efficient
sensor Network protocol (APTEEN)
APTEEN is an extension to the TEEN protocol and can
work on both reactive and proactive networkslikeLEACH.In
APTEEN the parameters for CH selection is adjusted and
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2748
broadcasted to start the transmission, as in TEEN protocol
with the threshold value. TDMA schedule used to assigned a
slot for each node to start transmission. [4, 8]. The user
expects to get set of physical attributes such as Hard and soft
threshold Operation mode for each node in the network
(TDMA) and Counting time frame (CT).
3.3 Power Efficient Gathering in Sensing Information
System (PEGASIS)
PEGASIS is an enhanced version of the LEACH protocol.
In this protocol, communication is done only with the
nearest neighbors sensors until data reach the BS to achieve
the maximum network life time which is the mainaimofthis
protocol. [5]
The main advantage of this protocol is the dynamic way
of the CH selection to avoid communication consumption.
The nodes use a greedy algorithm in order tosendorreceive
data to its nearest neighbor nodes. The node structure is a
chain structure which enables all the nodes to know the
location of other nodes. [8]
After all the nodes communicate with the BS, a new
round will start. That reduces the power required for data
transmit during each round.[5] There are two main
objectives of PEGASIS. First, to decrease bandwidth
consumption in the communication between nodes. Second,
to increase the network lifetime.
3.4 Threshold sensitive EnergyEfficientsensorNetwork
(TEEN)
TEEN is a homogeneous cluster-based routing protocol
designed for reactive type of wireless sensor networks. [8]
TEEN protocol senses the physical variation of the surround
environment continuously. The CH nodes broadcasts two
thresholds to non-cluster nodes. Thetwovaluesarehardand
soft thresholds. These thresholds areusedtofilter,andhence
reduce, the amount of transmitted data to the cluster CH.
[5,8] The hard threshold can be defined as theminimumdata
transmission.
The soft threshold can be specifiedasthechangerangeof
data detected. The first time the node finds the data
exceeding the hard threshold, this data will be sent to the CH
and set as the new hard threshold. Then, assign the monitor
value to the sensed value. Soft and hard thresholds control
and reduce the amount of data transfer by monitoring
unexpected events and hot spots. Also, the use of a threshold
can block not suitable data for applications that need a
periodic reporting of data. [8]
3.5 modified LEACH (Modleach)
Modleach is a homogeneous cluster-based routing
protocol with an efficient CH replacementscheme.Modleach
also uses dual transmitting power levels with hard and soft
thresholds. Hard threshold (known as MODLEACHHT) and
soft threshold (known as MODLEACHST) are used as
controls of throughput. Modleach improved itsperformance
by using the same concepts (MODLEACHHT and
MODLEACHST) utilized by the TEEN algorithm.
3.6 Zonal-Stable Election Protocol (ZSEP)
(Z-SEP) is a cluster-based routing protocol for
heterogeneous WSNs. This protocol follows hybrid process
for data communication. Direct communication data
transmissionand other waydata transmissionareroutedvia
the CH to the BS. The network field in divided into three zone
and nodes deployed based on energy levelsandYcoordinate.
3.7 Stable Election Protocol (SEP)
SEP is a two-level heterogeneous-aware cluster-based
routing algorithm based on weighted election probabilities
for the choice of the CH based on the remaining energy level
on each node. SEP clusters consist of two types of nodes:
normal nodes and advances nodes.Normalnodeshavelower
energy level than advanced nodes. The probability of
advanced nodes tobecomeCHismorethantheNormalnodes
in order to balance energy consumption [2].
Table -1: Application Category
Environment
specific
Task-specific General
Beam forming
antenna [3]
Open field
[44]
Museum
Network[46]
CitySee large
scale urban
network [47]
Underwater
sensor
network
[13,49]
telecom
network [21]
Renewable
energy
sources
[28,50]
Zigbee, Zwave
[37]
Sensor
network for
office [43]
NoC [25]
Distributed
video coding
[22,24]
Multimedia
system[23,25]
Video
streaming[33]
Distributed
Source Coding
Based
Applications
[1]
Multihop
network [2]
Distributed
network [6]
Hybrid
network [8]
Multihop
network [12]
Information
centric
network [15]
Delay tolerant
network of
buildings and
other
landmarks
[18]
Seismic
exploration
[19]
Core network
[20]
Heterogeneou
s network [32]
Dynamic
network [36]
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2749
Wirelesssensornetworkclassifiedroutingprotocols
into two categories based on sensor energy level:
homogeneous sensor network which include (Leach –
Modleach- TEEN…..etc) as routing protocol. In this type,
networks consist of sensor nodes with similar types and the
same energy level while the second categories is
heterogeneous sensor network which include (SEP-
ZSEP,….etc) routingprotocols.Inthistype,anetworkconsists
of different types of nodes with different energy level. Due to
the different types of protocols and different types of
application, the best routing protocol will bechosenfromthe
above applications category table 1 based on the application
deployment and application requirement.
4. SIMULATION RESULTS
The routing protocols LEACH, Modleach, SEP, ZSEP were
implemented in a simulator. By performing analytical
simulation, we could compare network performance with
regard to different metrics. Those metrics are:
a. Network Stability period: the stable period for the
network before the first node dies (FND).
b. Networklifetime: the timethatremainingnodesstill
transmit data until all nodes die (AND) and stop
transmission.
c. Energy consumption: the energy consumed during
the transmission of a data packet from a non-cluster node or
receiving data packet by the CH node in network lifetime.
d. Packets received at the CH node: the successfully
received data packetsat the CH nodefrom non-cluster nodes
network member.
Simulation parameters: A summary of the simulation
parameters are show in Table 2. As shown in the table, some
of the parameters are set to a fixed value such as parameters
1 to 8. While someother parameters, suchas parameters9to
11, are set to different values in different experiments to
evaluate their impact on the network performance.
The test parameters are:
• number of nodes in the range of 20 to 200.
• two different sizes of the monitoring area (50 m* 50
m) and (100 m* 100 m).
• different locations of the BS node that varies from
(25,25) to (100,100).
Table -2 Simulation parameters
# Parameters Values
1
Percentage of
cluster head (p opt)
0.1
2
Initial energy of
nodes
0.5 joules
# Parameters Values
3 Data packet size 6400 bit
4
Transmission &
receiving energy (Eelec)
50 nJ/bit
5
Free space
transmitter amplifier
energy (E fs)
10 pJ/bit/m2
6
Multipath fading
transmitter amplifier
energy (E mp)
0.0013
pJ/bit/m4
7
Data aggregation
energy (E DA)
5 nJ
8 Typeof distribution Random
9 Number of nodes 20, 50, 100, 200
10 Simulationareasize
50m*50m
100m*100m
11
Base station
position
(25,25), (50,50),
(100,100)
Using the simulation and analysis of LEACH, Modleach, SEP,
and ZSEP protocols, we could observe changes in network
energy consumption and network life time with various
number of rounds. The results showed that the optimal
performance can be obtained using a small number ofnodes
per cluster which maximized survived nodes and network
lifetime.
Fig-3: Sample diagram of the simulation setup
Fig. 3 shows a simple diagram of the simulation
setup. The diagram illustrates some of the simulation
parameters such as the simulation area and the BS location.
The diagram also shows a sample Cluster Head (CH) node.
Table 3 summarizes the simulation results with
different BS location. As can seen from the table, ZSEP had
the best network stability periods in the smaller simulation
area, while MODLEACH had the best network stability
periods. Although ZSEP suffered from lower network
stability periods with larger simulation area, it could
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2750
maintain good network lifetime in most of the caseswiththe
larger simulation area.
Table 4 summarizes the simulation results with
different number of nodes. As can be seen from the table,
ZSEP had the best network life span and network stability
periods in the smaller simulation area (50,50) withdifferent
number of nodes in the range from 20 to 200 nodes.
Meanwhile MODLEACH had the best network life span and
network stability periods in the large simulation area
(100,100) with different number of nodes. Although ZSEP
suffered from lower network stability periods with larger
simulation area, it could maintain good network lifetime in
most of the cases with the larger simulation area.
For virtualization support and enabling different
applications to share the same resource infrastructure,
different routing protocols should be used depending on
certain parameters such as simulation area and number of
nodes. The right choice of the routing protocol will have a
huge impact on network life span, load balance and network
stability.
Table -3: FND vs. AND for different BS locations
simulation
area
(50*50)
simulation area
(100*100)
base station
position
(25,
25)
(50,
50)
(25,
25)
(50,
50)
(1
00,
10
0)
First
Node
Dead
Leach 997 870 845 905
50
0
Modleach
103
7
100
2
398
0
439
6
33
45
SEP
125
6
116
2
107
8
117
8
10
54
ZSEP
166
8
157
0
107
7
157
2
58
3
All Node
Dead
leach
185
0
779
0
208
0
204
5
19
60
Modleach
167
8
161
9
637
4
609
4
65
91
SEP
459
9
504
6
651
1
519
5
47
08
ZSEP
666
8
600
3
675
2
627
3
54
91
Table 4: FND vs. AND for different number of nodes
simulation area
(50*50) & BS
position (25,25)
simulation area
(100*100) BS
position (50,50)
# of
Node
s
20 50
10
0
20
0
20 50
10
0
20
0
First
Node
leac
h
11
00
95
0
94
0
92
0
11
00
83
0
86
0
83
0
Dead Modl
each
11
80
99
2
95
6
17
27
53
39
43
77
38
93
39
75
SEP
14
49
12
94
12
28
11
46
12
93
11
79
11
38
11
03
ZSEP
17
23
16
13
16
89
16
47
16
31
15
69
15
43
15
46
All Node
Dead
leach
19
00
19
50
18
50
17
00
25
00
21
50
19
50
15
80
Modl
each
16
88
15
99
17
27
16
99
60
91
57
76
61
58
63
54
SEP
47
60
40
36
55
32
40
70
46
83
51
78
52
86
56
36
ZSEP
66
70
65
59
68
07
66
38
63
68
64
42
61
35
61
47
5. CONCLUSION
This paper analyzed and described the process and
characteristics of the work for LEACH, Modleach, SEP, ZSEP
wireless sensor network routingprotocolsanddiscussed the
impact of the number of nodes randomly spread on a
different areas versus the network lifetime and stability
period for the network. This paper concluded that LEACH,
Modleach, SEP, ZSEP routing protocols could support
virtualization under certain conditions for the design
parameters such as the simulation area, number of nodes,
the base station position. Controlling these parametershave
a positive impact on the network performance, network life
span, the number of survived nodes, and amount of data
packet received by the base station.
REFERENCES
[1] Imran Khan, “Design and Analysis of Virtualization
Framework for Wireless Sensor Networks”, 2013.
[2] Vivek Mhatre, Catherine Rosenberg School of Electrical
and Computer Eng., Purdue University, “Homogeneous
vs Heterogeneous Clustered Sensor Networks: A
Comparative Study”, West Lafayette, IN 47907- 1285
[3] R.Devika, B.Santhi,T.Sivasubramanian “Survey on
Routing Protocol in Wireless Sensor Network”
International Journal of Engineering and Technology
(IJET) Volume 5, No 1 Feb-Mar 2013 ISSN : 0975-4024
[4] Mallanagouda Patil ; Rajashekhar C. Biradar “A survey
on routing protocols in Wireless Sensor Networks”
2012 18th IEEE International Conference on Networks
(ICON) ISBN:978-1-4673-4521-7
[5] Harmanjit Kaur “Survey on Routing Protocols of
Wireless Sensor Networks” International Journal of
Advanced Research in Computer Science and Software
Engineering Volume 5, Issue 4, April 2015 ISSN: 2277
128X
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2751
[6] Hussein Mohammed Salman “Survey of Routing
Protocols in Wireless Sensor Networks.International
Journal of Sensors and Sensor Networks. Vol. 2, No. 1,
2014, pp. 1-6. doi: 10.11648/j.ijssn.20140201.11
[7] Sudeep Varshney; Chiranjeev Kumar ; Abhishek
Swaroop “A comparative study of hierarchical routing
protocols in wireless sensor networks” Computing for
Sustainable Global Development(INDIACom), 20152nd
International Conference on 11-13 March 2015 ISBN:
978-9-3805-4415-1
[8] DaWei Xu ; Jing Gao “Comparison Study to Hierarchical
Routing Protocols in Wireless Sensor Networks” 3rd
International Conference on Environmental Scienceand
Information Application Technology (ESIAT 2011).
[9] Pritee Parwekar “Comparative Study of Hierarchical
Based Routing Protocols: Wireless Sensor Networks”
S.C. Satapathy et al. (eds.), ICT and Critical
Infrastructure: Proceedings of the 48th Annual
Convention of CSI - Volume I, Advances in Intelligent
Systems and Computing 248,277 DOI: 10.1007/978-3-
319-03107-1_31, © Springer International Publishing
Switzerland 2014
[10] Rajat Kandpal; Rajesh Singh; Hardwari Lal Mandoria
“Comparative Study of Hierarchical RoutingProtocolsin
Wireless Sensor Networks” International Journal of
Computer Science Engineering(IJCSE)ISSN :2319-7323
Vol. 4 No.05 Sep 2015
[11] Bhattacharyya, D.; Kim, T.; Pal,S.AComparativeStudyof
Wireless Sensor Networks and Their Routing Protocols.
Sensors 2010, 10(12), 10506-10523;
doi:10.3390/s101210506.
http://www.mdpi.com/1424-8220/10/12/10506
[12] Li Tian ; Huaichang Du ; Yanwei Huang “The simulation
and analysis of LEACH protocol for wireless sensor
network based on NS2” 2012 International Conference
on System Science and Engineering (ICSSE) on June 30
2012-July 2 2012 ISSN :2325-0909 ISBN: 978-1-4673-
0944-8

More Related Content

What's hot

Energy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSNEnergy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSNZubin Bhuyan
 
Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & PegasisReenaShekar
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor networkshashankcsnits
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsVirendra Thakur
 
Thesis-Final-slide
Thesis-Final-slideThesis-Final-slide
Thesis-Final-slideMahmuda Rahman
 
Kianoosh&sajjad
Kianoosh&sajjadKianoosh&sajjad
Kianoosh&sajjadbardia kazemi
 
Jm2416491652
Jm2416491652Jm2416491652
Jm2416491652IJERA Editor
 
clustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHclustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHJimit Rupani
 
The Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localizationThe Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localizationIJERA Editor
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksDarpan Dekivadiya
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkeSAT Publishing House
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkeSAT Journals
 
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...IJCNCJournal
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...ijsrd.com
 
IRJET- Clustering Protocols in Wireless Sensor Network: A Review
IRJET-  	  Clustering Protocols in Wireless Sensor Network: A ReviewIRJET-  	  Clustering Protocols in Wireless Sensor Network: A Review
IRJET- Clustering Protocols in Wireless Sensor Network: A ReviewIRJET Journal
 
Review on State-Of-The-Art of PEGASIS Protocol in WSNS
Review on State-Of-The-Art of PEGASIS Protocol in WSNSReview on State-Of-The-Art of PEGASIS Protocol in WSNS
Review on State-Of-The-Art of PEGASIS Protocol in WSNSrahulmonikasharma
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 

What's hot (20)

Energy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSNEnergy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSN
 
Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & Pegasis
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
wsn routing protocol
 wsn routing protocol wsn routing protocol
wsn routing protocol
 
Thesis-Final-slide
Thesis-Final-slideThesis-Final-slide
Thesis-Final-slide
 
Kianoosh&sajjad
Kianoosh&sajjadKianoosh&sajjad
Kianoosh&sajjad
 
Jm2416491652
Jm2416491652Jm2416491652
Jm2416491652
 
Data aggregation in wireless sensor networks
Data aggregation in wireless sensor networksData aggregation in wireless sensor networks
Data aggregation in wireless sensor networks
 
clustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHclustering protocol in WSN:LEACH
clustering protocol in WSN:LEACH
 
The Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localizationThe Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localization
 
Routing Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor NetworksRouting Protocols for Wireless Sensor Networks
Routing Protocols for Wireless Sensor Networks
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor network
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor network
 
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...
A New Programming Model to Simulate Wireless Sensor Networks : Finding The Be...
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
 
IRJET- Clustering Protocols in Wireless Sensor Network: A Review
IRJET-  	  Clustering Protocols in Wireless Sensor Network: A ReviewIRJET-  	  Clustering Protocols in Wireless Sensor Network: A Review
IRJET- Clustering Protocols in Wireless Sensor Network: A Review
 
Review on State-Of-The-Art of PEGASIS Protocol in WSNS
Review on State-Of-The-Art of PEGASIS Protocol in WSNSReview on State-Of-The-Art of PEGASIS Protocol in WSNS
Review on State-Of-The-Art of PEGASIS Protocol in WSNS
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 

Similar to IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wireless Sensor Network

Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocolijceronline
 
IRJET- Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
IRJET-  	  Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...IRJET-  	  Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
IRJET- Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...IRJET Journal
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET Journal
 
Computational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkComputational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkIRJET Journal
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkAM Publications
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEYijcsa
 
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET Journal
 
An Adaptive Cluster Based Routing Protocol for WSN
An Adaptive Cluster Based Routing Protocol for WSNAn Adaptive Cluster Based Routing Protocol for WSN
An Adaptive Cluster Based Routing Protocol for WSNEswar Publications
 
A modified clustered based routing protocol to secure wireless sensor network...
A modified clustered based routing protocol to secure wireless sensor network...A modified clustered based routing protocol to secure wireless sensor network...
A modified clustered based routing protocol to secure wireless sensor network...eSAT Journals
 
B05630814
B05630814B05630814
B05630814IOSR-JEN
 
Cluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor NetworksCluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor Networkseditor1knowledgecuddle
 
CLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENT
CLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENTCLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENT
CLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENTijassn
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Surveyijsrd.com
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET Journal
 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolIJTET Journal
 
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET Journal
 
IRJET- Security Efficiency of Transfering the Data for Wireless Sensor Ne...
IRJET-  	  Security Efficiency of Transfering the Data for Wireless Sensor Ne...IRJET-  	  Security Efficiency of Transfering the Data for Wireless Sensor Ne...
IRJET- Security Efficiency of Transfering the Data for Wireless Sensor Ne...IRJET Journal
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 

Similar to IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wireless Sensor Network (20)

Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocol
 
IRJET- Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
IRJET-  	  Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...IRJET-  	  Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
IRJET- Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
 
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and SecurityIRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
IRJET- An Introduction to Wireless Sensor Networks, its Challenges and Security
 
Computational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor NetworkComputational Analysis of Routing Algorithm for Wireless Sensor Network
Computational Analysis of Routing Algorithm for Wireless Sensor Network
 
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor NetworkPerformance Evaluation of LEACH Protocol for Wireless Sensor Network
Performance Evaluation of LEACH Protocol for Wireless Sensor Network
 
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEYEVENT DRIVEN ROUTING PROTOCOLS FOR  WIRELESS SENSOR NETWORK- A SURVEY
EVENT DRIVEN ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORK- A SURVEY
 
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
 
An Adaptive Cluster Based Routing Protocol for WSN
An Adaptive Cluster Based Routing Protocol for WSNAn Adaptive Cluster Based Routing Protocol for WSN
An Adaptive Cluster Based Routing Protocol for WSN
 
A modified clustered based routing protocol to secure wireless sensor network...
A modified clustered based routing protocol to secure wireless sensor network...A modified clustered based routing protocol to secure wireless sensor network...
A modified clustered based routing protocol to secure wireless sensor network...
 
B05630814
B05630814B05630814
B05630814
 
Cluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor NetworksCluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor Networks
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
CLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENT
CLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENTCLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENT
CLUSTERING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS IN SMART GRID ENVIRONMENT
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
 
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor NetworkIRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
IRJET- Studies on Lifetime Enhancement Techniques for Wireless Sensor Network
 
IRJET- Security Efficiency of Transfering the Data for Wireless Sensor Ne...
IRJET-  	  Security Efficiency of Transfering the Data for Wireless Sensor Ne...IRJET-  	  Security Efficiency of Transfering the Data for Wireless Sensor Ne...
IRJET- Security Efficiency of Transfering the Data for Wireless Sensor Ne...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 

Recently uploaded (20)

Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 

IRJET - Analytical Study of Hierarchical Routing Protocols for Virtual Wireless Sensor Network

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2746 Analytical Study of Hierarchical Routing Protocols for Virtual Wireless Sensor Network Mahmoud Osama Ouf1, Alaa E.S. Ahmed2, Raafat A. EL Kammar3, Abdelwahab AlSammak4 1Assistant Lecturer, Computer Engineering Dept., Al Safwa High Inst. Of Eng. Ministry of High Education 2Assistant Professor, Computer Engineering Dept, Faculty of Engineering (Shoubra) Benha university, Cairo, Egypt 3Professor, Computer Engineering Dept, Faculty of Engineering (Shoubra) Benha university, Cairo, Egypt 4Professor, Computer Engineering Dept, Faculty of Engineering (Shoubra) Benha university, Cairo, Egypt ---------------------------------------------------------------------------------***------------------------------------------------------------------------------- Abstract - Nowadays more attention has been given to “Internet of Things” (IoT). By networking thousands of nodes, Wireless Sensor Networks (WSNs) can be used to observe remote environment, physical phenomena, and real-life applications such as health monitoring, smart home monitoring, military applications etc. Different applications require different WSNs configurations. To serve such applications, a dedicatedWSN isneededperapplicationwhere all nodes cooperate to achieve the requiredendresults. Virtual Sensor Networks (VSNs)facilitateservingmultipleapplication using the same WSN infrastructure. VSNs enable the same sensor nodes with the ability to play differentrolesatthesame time serving multiple applications. Thistechniqueallowsmore than one application to share the same physical WSN. As a result, flexible and cost-effective solutions would be provided. Existing WSNs routing protocols need to be analyzed in the context of VSNs to measure it efficiency and compatibility. In this paper, LEACH, modleach, SEP, and ZSEP cluster-based routing protocols areanalyzed. Multiple metricswill bestudies such as network lifetime, load balance between nodes, and total residual energy of the network. The results provide insights on the different conditions needed to utilize theWSNs routing protocols for VSNs. Key Words: Virtualization Wireless Sensor network, Cluster based Routing, Leach Protocol, VWSN 1. INTRODUCTION Wireless sensor network (WSN) is one of the important technologies in our live nowadays as well as future communication. WSNs consist of tiny sensor nodes and a base station (BS). Due to the small size and low power capability of the nodes, the functionality of the nodes are restricted. A node can sense various types of environmental phenomena and sends data to other nodes or to BS.[1,2]. We can use WSNs with a single application wherethenetwork is dedicated for providing a single service for one application. This situation is imposes a limitation that prevents efficient utilization of the physical resources because no more than one application is able to utilize theseresourcesatanysingle moment. For example, if we have two applications that need to run at the same time in the same geographical area, it would be a must to deploy two sets of the sensor nodes which means double the cost to operate these two applications. A good solution to this problem, is to virtualization of WSN (VSN). Virtualization is an efficient techniqueusedtoallow the physical resources of the WSN to appear logicallyinsuch a way that let multiple applications to share and communicate with the same resources in an efficient way [1]. Virtualization in WSNs is a considered a new research area that needs to be investigated deeply. The existing routing protocols used with WSNs need to be analyzed and checked in terms of its performance when used in Virtual Wireless Sensor Networks (VSNs). Low Energy Adaptive Cluster Hierarchy (LEACH) is one of the famous routing protocols that has been used for clustering in WSN. In this paper, LEACH, modleach, SEP, ZSEP protocols are analyzed in order to investigate its compatibility with VSN. Therestof this paper is organized as follows. In section 2,Virtualization concept is presented. In section 3 the routing protocols related work is given. The results of simulation results are presented in section 4. Finally, we conclude this paper in section 5. 2. VIRTUALIZATION CONCEPT Virtualization for WSN gained more attention nowadays as a means for efficient resources utilization in more computing and networking.The aim of virtualization is todo operationswithlowercost,increasednetworkmanageability, flexibility,andimprovedadministrationandinter-operability within different sensors.Thevirtualizationideaistoseparate between the application layer and physical sensors layer, at the physical layer sensors nodes aim to sensing changes in some conditions and the area of operation, etc. Due to the limitation of the sensor hardware and low power sources of the sensor, is not efficient to run multiple OS at the level of the sensor infrastructure. To achieve virtualization in WSN some mechanisms must be developed for VSN nodes membership and network maintenance. This can be done by using dynamic reassignment of sensor nodes’ roles in the network. A network can split or merge with other networks; add or remove sensor nodes from the VSN. Many different middlewaresolutionshavebeenproposed in the last few years for WSNs. Each of these solutions have different architectural design. Most of them are based on the supported application domain which separates the physical
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2747 layer from heterogeneity and distribution of the infrastructure sensor network. The concept of Virtual machines is used with high-end servers and PCs to separate the hardware from the application layer. In WSNs, virtualization would give us the flexibility and dynamic change of the infrastructure without any impact on the application. Hereby, we propose a framework to produce a Secure Virtual Sensor Network. This framework includes three layers, Application Layer, Virtualization Layer, and WSN Physical Infrastructure as shown in Fig.1. Fig-1: Building Blocks in VSN Framework The Virtualization layer main components are WSN routing algorithm, cryptography(Encryption/ decryption) algorithm, and the publish/subscribeparadigm.Inthispaper we focus on the routing protocol component. Specifically, LEACH, modleach, SEP, ZSEP protocols [1] are implemented and analyzed in order to check out its compatibility with the proposed framework. Fig-2: Cluster-based communication hierarchy 3. RELATED WORK The most popular existing routing protocols for WSN will be discussed in this section. All these protocols are cluster- based hierarchy routing protocols. The three main ideas for cluster-based routing protocol are [5]: to increase network lifetime, decrease the network traffic towards the sink node and Simple data fusion. Eachgroup ofsensorsnodesgrouped into clusters, the selection of Cluster Head (CH) is based on the node with higher residual energy. The CH aggregates the data from all its members and forwards this data to the sink node, other nodes in the cluster perform thesensingtaskand send sensed data to its CH at short distance. This process reduces power consumptionbythenodesaswellasbalanced traffic load and improved network scalability [4]. In WSN Hierarchical routing protocols consist of several clusters. Each clusterhasonlyoneCHandseveralnon-cluster nodes. There are different election protocols for the election of a CH. The high-level communication done through cluster heads [7]. In the following paragraph list explains of these protocols: 3.1 Low Energy Adaptive Clustering Hierarchy (LEACH) LEACH is a single hop Homogeneous cluster based hierarchical routing protocol. LEACH performs every round re-clustering functions andself-organizingforthenodes.The sensor node organizes themselves into groups of clusters. The cluster heads in LEACH is selected randomly. The rotation of the CH among the sensors in a cluster distributes energy consumption. The communication between cluster groups and the sink node is done via the CH. All non-cluster nodes use the CH to communicate with the sink node. Fig.2 shows basic cluster-based communication hierarchy. Cluster head (CH) nodemain functionistocollectthedata and compress it from all the cluster member. All the aggregated data packets from the CH are sent to base station. The amount of information transmitted as well as the power consumed will be reduced when the CH eliminates redundancy in data. To balance the energy over the cluster, the CH changes over the time in a random way between the sensor nodes. [5,7] The decision is made by choosing a random number between 0 and 1 by the node. The node becomes a CH dependingonthethresholdvalueforthisnode. Where: P is the percentage of clusterheads,Gisthegroup of nodes that non cluster head in 1 p rounds, r is the round that is currently working on it. The LEACH protocol cycle operation is done in rounds. Each round is divided into two phases. The first phase is called the setup phase while the second phase is called the steady state phase. During the setup phase, all nodes are arranged in hierarchical order. The CH have three functions data forwarding to BS, data compression, and data aggregation. Any single node can be chosen once to be the CH only once during any round P then it can’t be chosen as the CH anymore. The duration of the steady state phase is larger than the duration of the setup phase and it starts after the data begins to be transmitted to the BS. 3.2 The Adaptive Threshold sensitive Energy Efficient sensor Network protocol (APTEEN) APTEEN is an extension to the TEEN protocol and can work on both reactive and proactive networkslikeLEACH.In APTEEN the parameters for CH selection is adjusted and
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2748 broadcasted to start the transmission, as in TEEN protocol with the threshold value. TDMA schedule used to assigned a slot for each node to start transmission. [4, 8]. The user expects to get set of physical attributes such as Hard and soft threshold Operation mode for each node in the network (TDMA) and Counting time frame (CT). 3.3 Power Efficient Gathering in Sensing Information System (PEGASIS) PEGASIS is an enhanced version of the LEACH protocol. In this protocol, communication is done only with the nearest neighbors sensors until data reach the BS to achieve the maximum network life time which is the mainaimofthis protocol. [5] The main advantage of this protocol is the dynamic way of the CH selection to avoid communication consumption. The nodes use a greedy algorithm in order tosendorreceive data to its nearest neighbor nodes. The node structure is a chain structure which enables all the nodes to know the location of other nodes. [8] After all the nodes communicate with the BS, a new round will start. That reduces the power required for data transmit during each round.[5] There are two main objectives of PEGASIS. First, to decrease bandwidth consumption in the communication between nodes. Second, to increase the network lifetime. 3.4 Threshold sensitive EnergyEfficientsensorNetwork (TEEN) TEEN is a homogeneous cluster-based routing protocol designed for reactive type of wireless sensor networks. [8] TEEN protocol senses the physical variation of the surround environment continuously. The CH nodes broadcasts two thresholds to non-cluster nodes. Thetwovaluesarehardand soft thresholds. These thresholds areusedtofilter,andhence reduce, the amount of transmitted data to the cluster CH. [5,8] The hard threshold can be defined as theminimumdata transmission. The soft threshold can be specifiedasthechangerangeof data detected. The first time the node finds the data exceeding the hard threshold, this data will be sent to the CH and set as the new hard threshold. Then, assign the monitor value to the sensed value. Soft and hard thresholds control and reduce the amount of data transfer by monitoring unexpected events and hot spots. Also, the use of a threshold can block not suitable data for applications that need a periodic reporting of data. [8] 3.5 modified LEACH (Modleach) Modleach is a homogeneous cluster-based routing protocol with an efficient CH replacementscheme.Modleach also uses dual transmitting power levels with hard and soft thresholds. Hard threshold (known as MODLEACHHT) and soft threshold (known as MODLEACHST) are used as controls of throughput. Modleach improved itsperformance by using the same concepts (MODLEACHHT and MODLEACHST) utilized by the TEEN algorithm. 3.6 Zonal-Stable Election Protocol (ZSEP) (Z-SEP) is a cluster-based routing protocol for heterogeneous WSNs. This protocol follows hybrid process for data communication. Direct communication data transmissionand other waydata transmissionareroutedvia the CH to the BS. The network field in divided into three zone and nodes deployed based on energy levelsandYcoordinate. 3.7 Stable Election Protocol (SEP) SEP is a two-level heterogeneous-aware cluster-based routing algorithm based on weighted election probabilities for the choice of the CH based on the remaining energy level on each node. SEP clusters consist of two types of nodes: normal nodes and advances nodes.Normalnodeshavelower energy level than advanced nodes. The probability of advanced nodes tobecomeCHismorethantheNormalnodes in order to balance energy consumption [2]. Table -1: Application Category Environment specific Task-specific General Beam forming antenna [3] Open field [44] Museum Network[46] CitySee large scale urban network [47] Underwater sensor network [13,49] telecom network [21] Renewable energy sources [28,50] Zigbee, Zwave [37] Sensor network for office [43] NoC [25] Distributed video coding [22,24] Multimedia system[23,25] Video streaming[33] Distributed Source Coding Based Applications [1] Multihop network [2] Distributed network [6] Hybrid network [8] Multihop network [12] Information centric network [15] Delay tolerant network of buildings and other landmarks [18] Seismic exploration [19] Core network [20] Heterogeneou s network [32] Dynamic network [36]
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2749 Wirelesssensornetworkclassifiedroutingprotocols into two categories based on sensor energy level: homogeneous sensor network which include (Leach – Modleach- TEEN…..etc) as routing protocol. In this type, networks consist of sensor nodes with similar types and the same energy level while the second categories is heterogeneous sensor network which include (SEP- ZSEP,….etc) routingprotocols.Inthistype,anetworkconsists of different types of nodes with different energy level. Due to the different types of protocols and different types of application, the best routing protocol will bechosenfromthe above applications category table 1 based on the application deployment and application requirement. 4. SIMULATION RESULTS The routing protocols LEACH, Modleach, SEP, ZSEP were implemented in a simulator. By performing analytical simulation, we could compare network performance with regard to different metrics. Those metrics are: a. Network Stability period: the stable period for the network before the first node dies (FND). b. Networklifetime: the timethatremainingnodesstill transmit data until all nodes die (AND) and stop transmission. c. Energy consumption: the energy consumed during the transmission of a data packet from a non-cluster node or receiving data packet by the CH node in network lifetime. d. Packets received at the CH node: the successfully received data packetsat the CH nodefrom non-cluster nodes network member. Simulation parameters: A summary of the simulation parameters are show in Table 2. As shown in the table, some of the parameters are set to a fixed value such as parameters 1 to 8. While someother parameters, suchas parameters9to 11, are set to different values in different experiments to evaluate their impact on the network performance. The test parameters are: • number of nodes in the range of 20 to 200. • two different sizes of the monitoring area (50 m* 50 m) and (100 m* 100 m). • different locations of the BS node that varies from (25,25) to (100,100). Table -2 Simulation parameters # Parameters Values 1 Percentage of cluster head (p opt) 0.1 2 Initial energy of nodes 0.5 joules # Parameters Values 3 Data packet size 6400 bit 4 Transmission & receiving energy (Eelec) 50 nJ/bit 5 Free space transmitter amplifier energy (E fs) 10 pJ/bit/m2 6 Multipath fading transmitter amplifier energy (E mp) 0.0013 pJ/bit/m4 7 Data aggregation energy (E DA) 5 nJ 8 Typeof distribution Random 9 Number of nodes 20, 50, 100, 200 10 Simulationareasize 50m*50m 100m*100m 11 Base station position (25,25), (50,50), (100,100) Using the simulation and analysis of LEACH, Modleach, SEP, and ZSEP protocols, we could observe changes in network energy consumption and network life time with various number of rounds. The results showed that the optimal performance can be obtained using a small number ofnodes per cluster which maximized survived nodes and network lifetime. Fig-3: Sample diagram of the simulation setup Fig. 3 shows a simple diagram of the simulation setup. The diagram illustrates some of the simulation parameters such as the simulation area and the BS location. The diagram also shows a sample Cluster Head (CH) node. Table 3 summarizes the simulation results with different BS location. As can seen from the table, ZSEP had the best network stability periods in the smaller simulation area, while MODLEACH had the best network stability periods. Although ZSEP suffered from lower network stability periods with larger simulation area, it could
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2750 maintain good network lifetime in most of the caseswiththe larger simulation area. Table 4 summarizes the simulation results with different number of nodes. As can be seen from the table, ZSEP had the best network life span and network stability periods in the smaller simulation area (50,50) withdifferent number of nodes in the range from 20 to 200 nodes. Meanwhile MODLEACH had the best network life span and network stability periods in the large simulation area (100,100) with different number of nodes. Although ZSEP suffered from lower network stability periods with larger simulation area, it could maintain good network lifetime in most of the cases with the larger simulation area. For virtualization support and enabling different applications to share the same resource infrastructure, different routing protocols should be used depending on certain parameters such as simulation area and number of nodes. The right choice of the routing protocol will have a huge impact on network life span, load balance and network stability. Table -3: FND vs. AND for different BS locations simulation area (50*50) simulation area (100*100) base station position (25, 25) (50, 50) (25, 25) (50, 50) (1 00, 10 0) First Node Dead Leach 997 870 845 905 50 0 Modleach 103 7 100 2 398 0 439 6 33 45 SEP 125 6 116 2 107 8 117 8 10 54 ZSEP 166 8 157 0 107 7 157 2 58 3 All Node Dead leach 185 0 779 0 208 0 204 5 19 60 Modleach 167 8 161 9 637 4 609 4 65 91 SEP 459 9 504 6 651 1 519 5 47 08 ZSEP 666 8 600 3 675 2 627 3 54 91 Table 4: FND vs. AND for different number of nodes simulation area (50*50) & BS position (25,25) simulation area (100*100) BS position (50,50) # of Node s 20 50 10 0 20 0 20 50 10 0 20 0 First Node leac h 11 00 95 0 94 0 92 0 11 00 83 0 86 0 83 0 Dead Modl each 11 80 99 2 95 6 17 27 53 39 43 77 38 93 39 75 SEP 14 49 12 94 12 28 11 46 12 93 11 79 11 38 11 03 ZSEP 17 23 16 13 16 89 16 47 16 31 15 69 15 43 15 46 All Node Dead leach 19 00 19 50 18 50 17 00 25 00 21 50 19 50 15 80 Modl each 16 88 15 99 17 27 16 99 60 91 57 76 61 58 63 54 SEP 47 60 40 36 55 32 40 70 46 83 51 78 52 86 56 36 ZSEP 66 70 65 59 68 07 66 38 63 68 64 42 61 35 61 47 5. CONCLUSION This paper analyzed and described the process and characteristics of the work for LEACH, Modleach, SEP, ZSEP wireless sensor network routingprotocolsanddiscussed the impact of the number of nodes randomly spread on a different areas versus the network lifetime and stability period for the network. This paper concluded that LEACH, Modleach, SEP, ZSEP routing protocols could support virtualization under certain conditions for the design parameters such as the simulation area, number of nodes, the base station position. Controlling these parametershave a positive impact on the network performance, network life span, the number of survived nodes, and amount of data packet received by the base station. REFERENCES [1] Imran Khan, “Design and Analysis of Virtualization Framework for Wireless Sensor Networks”, 2013. [2] Vivek Mhatre, Catherine Rosenberg School of Electrical and Computer Eng., Purdue University, “Homogeneous vs Heterogeneous Clustered Sensor Networks: A Comparative Study”, West Lafayette, IN 47907- 1285 [3] R.Devika, B.Santhi,T.Sivasubramanian “Survey on Routing Protocol in Wireless Sensor Network” International Journal of Engineering and Technology (IJET) Volume 5, No 1 Feb-Mar 2013 ISSN : 0975-4024 [4] Mallanagouda Patil ; Rajashekhar C. Biradar “A survey on routing protocols in Wireless Sensor Networks” 2012 18th IEEE International Conference on Networks (ICON) ISBN:978-1-4673-4521-7 [5] Harmanjit Kaur “Survey on Routing Protocols of Wireless Sensor Networks” International Journal of Advanced Research in Computer Science and Software Engineering Volume 5, Issue 4, April 2015 ISSN: 2277 128X
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2751 [6] Hussein Mohammed Salman “Survey of Routing Protocols in Wireless Sensor Networks.International Journal of Sensors and Sensor Networks. Vol. 2, No. 1, 2014, pp. 1-6. doi: 10.11648/j.ijssn.20140201.11 [7] Sudeep Varshney; Chiranjeev Kumar ; Abhishek Swaroop “A comparative study of hierarchical routing protocols in wireless sensor networks” Computing for Sustainable Global Development(INDIACom), 20152nd International Conference on 11-13 March 2015 ISBN: 978-9-3805-4415-1 [8] DaWei Xu ; Jing Gao “Comparison Study to Hierarchical Routing Protocols in Wireless Sensor Networks” 3rd International Conference on Environmental Scienceand Information Application Technology (ESIAT 2011). [9] Pritee Parwekar “Comparative Study of Hierarchical Based Routing Protocols: Wireless Sensor Networks” S.C. Satapathy et al. (eds.), ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of CSI - Volume I, Advances in Intelligent Systems and Computing 248,277 DOI: 10.1007/978-3- 319-03107-1_31, © Springer International Publishing Switzerland 2014 [10] Rajat Kandpal; Rajesh Singh; Hardwari Lal Mandoria “Comparative Study of Hierarchical RoutingProtocolsin Wireless Sensor Networks” International Journal of Computer Science Engineering(IJCSE)ISSN :2319-7323 Vol. 4 No.05 Sep 2015 [11] Bhattacharyya, D.; Kim, T.; Pal,S.AComparativeStudyof Wireless Sensor Networks and Their Routing Protocols. Sensors 2010, 10(12), 10506-10523; doi:10.3390/s101210506. http://www.mdpi.com/1424-8220/10/12/10506 [12] Li Tian ; Huaichang Du ; Yanwei Huang “The simulation and analysis of LEACH protocol for wireless sensor network based on NS2” 2012 International Conference on System Science and Engineering (ICSSE) on June 30 2012-July 2 2012 ISSN :2325-0909 ISBN: 978-1-4673- 0944-8