SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016
DOI : 10.5121/ijngn.2016.8102 13
SIMULATION BASED ANALYSIS OF CLUSTER-BASED
PROTOCOL IN WIRELESS SENSOR NETWORK
Tarun Sharma1, Harsukhpreet Singh2, Anurag sharma3
Dept” of Computer Science & Engineering, CT Institute of Technology & Research1
Dept” of Electronics & Communication Engineering, CT Institute of Technology &
Research 2,3,Jalandhar, Punjab,India1,2,3
ABSTRACT
The modern growth in fabricate energy efficient Wireless Sensor Network is liberal a novel way to
systematize WSN in applications like surveillance, industrial monitoring, traffic monitoring, habitat
monitoring, cropping monitoring, crowd including etc. The rising use of these networks is making
engineers evolve novel and efficient ideas in this field. A group of research in data routing, data density
and in network aggregation has been proposed in recent years. The energy consumption is the main
apprehension in the wireless sensor network. There are many protocols in wireless sensor network to
diminish the energy consumption and to put in to the network lifetime. Among a range of types of
techniques, clustering is the most efficient technique to diminish the energy expenditure of network. In
this effort, LEACH protocol has been second-hand for clustering in which cluster heads are nominated on
the basis of distance and energy. The LEACH protocol is been implemented in a simulated environment
and analyze their performance graphically.
KEYWORDS
Wireless sensor networks, energy efficiency, Clustering, LEACH protocol
1. INTRODUCTION
A wireless sensor network is complete up of a huge quantity of sensor nodes and a sink [2]. The
WSN is self-confident of sensor nodes from hundreds or thousands and every node is coupled to
one sensor nodes. A wireless sensor network entire up of a large number of nodes extend over a
precise area. A sensor node self-confident of the sensor, actuators, memory, a mainframe and
they do have communication aptitude. All the sensor nodes are permitted to communicate in the
course of a wireless intermediary. The wireless standard is of infrared, radio frequency that
having no wired tie friendly. So the sensor nodes are deployed in a random conduct and it make
ad-hoc network because they can discuss themselves [1]. If the node is unable to converse with
other nodes of the network through a direct link, it means the node is out of range. In such
kind of networks data broadcast from one node to another is perform via in the middle of
nodes. This idea is referred as multi- hoping. All sensors nodes work helpfully to serve the
requests [4].
1.1Energy Consumption Issues
The chief complicatedness in WSN, sensor node have classified battery life because the sensor
nodes size is small so battery size, processor, storage liberty for data, these all are small as sensor
nodes. So the main central point on lessening energy expenses in wireless sensor networks. In
International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016
14
WSN a package of sensed information and routing in order has to be send which after have some
time constraint so that information can be employable before any disaster occurs e.g.
manufacturing monitoring, apparatus Monitoring etc. In WSN the power authority utilization is
much better-quality data communication then internal processing. So, Energy preservation in
WSN is the need to the address [3]. The Wireless sensor is flat to node stop working due to
power hitting. In order to supply a reliable examine through a network, the network should be
celebrity adjusting and must have elastic properties as requisite from point in time to time. A
classified contact node may meet failure due to imperfect battery subsistence. In such case the
network protocol should be logical enough to such collapse to keep the network organized many
techniques are proposed for energy concession, clustering is single of them. The cluster heads
are voted periodically such that members of a cluster can converse with their cluster heads. These
cluster heads send data documented from its members to a base station. The multi-clustering
can also be used. The cluster head should have to be rotated for the complementary of energy
and then there will be an equal heaviness on every node. The energy expenditure can be strong
[3]. Energy plays a vital task in wireless sensor networks because nodes are battery operated.
Therefore numerous protocols have been proposed in order to diminish the energy consumption
of these nodes such as LEACH [6], PAMAS [5].
LEACH is conscious as the most fashionable routing protocol that exploit cluster based
routing in order to weaken the energy consumption, in this paper suggest a development on
the LEACH protocol that supplementary recover the power consumption, simulation results
express out that our protocol outperforms LEACH protocol in term of energy consumption
and overall throughput. LEACH is “Low Energy Adaptive Clustering Protocol” [10]. LEACH
form clusters and selects randomly cluster Heads for each cluster. Non- cluster heads sense the
data and broadcast this data to cluster head, and then cluster head combined the data and forward
this data to sink. The principle of this protocol is that it assigns overall energy consumption of the
network uniformly to each node by selecting periodically different nodes as a cluster head. There
are two phases of LEACH that are Setup phase and Steady state phase. In set up phase, clusters
are shaped and cluster heads are chosen. In steady state phase, data from non-cluster heads is
transmitted to sink. The sensor nodes communicate with cluster heads with allotted time using
TDMA. Cluster heads are arbitrarily chosen in each round. LEACH operation is divided into
several rounds. Each round begins with set-up phase. In this clusters are structured. LEACH set a
threshold value T(n) and then sensor node I generate a random number between 0 and 1. If the
random number is < T(n), the node will become cluster head for the current round and ordinary
nodes link the cluster and become cluster members [6].
T (n) = p/1-p ×( r mod p-1 )
p is a probability of node to be selected as a cluster head, r is a number of rounds passed, G is a
selection of ordinary nodes. Once a node become cluster head never become cluster head once
more, only the node which have not become the cluster head and have elevated energy can
become cluster head at r+1.When cluster head assigns time slots to the members using TDMA
then it shifted to the steady state phase. After a shift in steady-state phase, members sent data
to cluster heads; cluster head procedure the data and then send data sequence to the base station.
After this round, it turn to next round and begin reconstruction new round. compensation of
LEACH are that LEACH is completely distributed. LEACH does not necessitate the control
information from the base station and the nodes do not require information of the global network
in order for LEACH to work. LEACH reduces communication energy by 8 times as contrast to
straight broadcast and smallest amount transmission energy routing. Disadvantages of LEACH
are that the cluster heads are chosen arbitrarily. So the distribution of cluster heads cannot be
ensured. In this protocol, the nodes with low energy have the same precedence as the nodes
having high energy and nodes having low energy can become cluster heads [10].
International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016
15
In section ii presents the connected works, In section iii initiate problem formulation, In
section iv Simulation Setup, In section v result and discussion and section vi conclude the paper.
Figure1: LEACH protocol Architecture
2. LITERATURE REVIEW
A majority beneficial energy-saving spare organization, including spare collection and
named it LEACH-SM protocol (modified form of prominent LEACH protocol) was deliberate
by Baker B. et al.; (2014).In this author available a quantitative difference of energy
consumption and WSN lifetime for both mentioned protocols [6].
Genetic algorithm and optimization of LEACH protocol that are worn on LEACH protocol and
compare both domino effect on the basis of rounds that was discussed by Yadav S. et al.;
(2014). This comparison was based on optimal thresholding probability for cluster structure.
Finally, after comparison finds LEACH- GA method outperforms MTE, DT and LEACH in terms
of network lifetime, use for optimal vigor- efficient clustering [11].
The two significant clustering protocols, namely LEACH and LEACH-C (centralized), using
NS2 tool for numerous chosen scenarios, and study of simulation results against chosen
performance metrics with latency and network lifetime was planned by Nayak P.et al.;
(2014). As a conclusion of surveillance from results, it can be mentioned that LEACH can be
favored if restricted harmonization of nodes in clustering without involving to BS is of tall
priority than other factors like declaration over the desired number of clusters etc.; and LEACH-
C can be designated when centralized and deterministic approach jacket complete network is
unsurprising still bringing in enlarged network lifetime and desired number of clusters [7].
The tailored version of LEACH protocol called V-LEACH protocol and the contrast of LEACH
protocol with V-LEACH protocol was designed by Alhawat A. et al.;(2013). from the
simulation results were, first the numeral of busy nodes is more than the unique LEACH.
Second the figure of dead nodes is less than the unique LEACH protocol. Network life-time is
enlarged by 49.37% then original LEACH [6].
International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016
16
Energy-LEACH protocol improves the CH selection procedure. It makes the lingering energy of
nodes as the major metric which decides whether the nodes twist into CH or not after the first
round. It same as LEACH protocol was projected by Xianging F. et al. ;( 2007). E-LEACH is
alienated into rounds, in the first round, every node has the alike likelihood to turn into CH, that
mean nodes are randomly chosen as CHs, In the next rounds, the left behind energy of
each node is dissimilar after one round e-mail and taken into account for the collection of the
CHs. That mean nodes have extra energy will develop into a CHs rather than nodes with fewer
energy [6].
A novel version of LEACH called two-level LEACH was planned by Loscri V. In this protocol,
CH collects data from other cluster members as exclusive LEACH, but rather than transport data
to the BS openly, it uses one of the CHs that mendacity between the CH and the BS as a transmit
station [8].
In LEACH, each CH straight communicates with BS no matter the distances between CH and BS
It will guzzle a lot of its energy if the distance is distant. So conquer this drawback multihop-
LEACH protocol was proposed by Zhou H. It selects a best possible path between the CH and
the BS through other CHs and use these CHs as a relay station to televise data over through them
[6].
3. PROBLEM FORMULATION
In this work, LEACH protocol has been worn for clustering in which cluster heads are preferred
on the basis of distance and energy.
• In LEACH protocol Cluster head straight communiqué with BS no matter the distance
between Cluster head and the base station; it will use a group of its energy if the distance
is far [13].
• Due to far distance packet does not arrive at the destination because CHs straight
communicate with sink there is no inter-cluster communication, and this needs high
trans-mission power due to this node dies earlier before transmission.
4. SIMULATION SET UP
In this section, we evaluate the performance of LEACH protocol using NS2 tool. NS2 is used as
simulation podium. NS is a distinct event simulator, where the go forward of time depends on the
timing of events which are preserve by the scheduler. NS simulator is depending on two
languages: C++, and an OTcl (an object-oriented tool command language).
International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016
17
Table 1: NS-2 simulation parameters
Parameter settings
Simulation Area 500*500 meters
No of nodes 41
Channel Type Channel/wireless
Antennae model Antenna/omni antenna
Energy model battery
Interface queue Type Queue/Droptail/Priqueue
Link layer type LL
Initial energy 100
Routing protocol AODV
Traffic Source CBR
Type of MAC IEEE 802.11
Packet size 1000 bytes
The C++ defines the interior instrument of the simulation objects, the OTcL sets up simulation
by assembling and configuring the objects and scheduling discrete events. The OTcL are linked
together using TclCL [12]. The experiments are performed with a diverse number of nodes
placed in a 500m *500m field. Each sensor nodes is assumed to have an initial energy of 100
joules. The general simulation parameters are
To evaluate the performance of LEACH protocol using parameters such as Energy consumption,
Packet loss, End to End delay, Throughput and control overhead. Figure 2, shows energy
consumption graph, in this graph 100 joules energy is to be addicted in 10 seconds because
every cluster heads in LEACH protocol immediately communication with BS no stuff the
distance between Cluster head and the base station; it will use a lot of its energy if the
remoteness is far [13]. In figure 3, shows the packet loss graph, In this graph 16 number of the
packet is lost in 10 seconds because in LEACH protocol CHs minter cluster communication, and
this needs high trans-mission power due to this node dies earlier before transmission, packet does
not reach the destination [14,15].
In Figure 4, shows End to End Delay graph, in this graph to increase the time delay is high due
to high overhead which is a limitation of LEACH protocol [16]. In Figure 5, shows the
throughput graph, in this graph 12 packet delivered in 10 seconds because due to high packet
loss, delay, and control overhead so that the overall efficiency of the network is decreased [16].
In Figure 6, shows the control overhead. In this graph overhead is giant because in LEACH
protocol extra overheads due to cluster head change and calculation leading to energy
incompetence for dynamic clustering in large networks [17].
International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016
18
Figure 2: Energy consumption graph of LEACH Protocol
Figure 3: packet losses graph of LEACH protocol
International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016
19
Figure 4 : End to End Delay of LEACH protocol
Figure 5:Throughput graph of LEACH protocol
International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016
20
Figure 6: Control overhead in LEACH protocol
6. CONCLUSION AND FUTURE WORK
The conclusion of this paper is to apply and evaluate the performance of LEACH protocol
using QoS parameters such as energy consumption, packet loss, End-to End-Delay, Throughput,
and Control Overhead. The energy consumption of LEACH is very high because each cluster
heads straight communiqué with BS no material the distance between Cluster head and the base
station; it will use a group of its energy if the remoteness is far. Due to far distance packet does
not arrive at the sink, packet loss problem is occurred so the overall performance of the
networks is decreased. With the outcome obtained in this paper, a further issue worthy of
consideration with RFID protocol can be done named as R- LEACH protocol. The design system
can be extended using R-LEACH protocol; Of course, since we have focused only on LEACH
protocol in this paper, the diagnosis can be done using R- LEACH protocol. We would like to
consider these issues in subsequent work.
ACKNOWLEDGEMENT
I hereby acknowledge that the above-referred work is my own research work and I am entirely
responsible for any kind of misuse of material. I thank my mentor Er. Harsukh Singh to guide
and encourage me and for putting all her valuable time for me to get the desired output.
International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016
21
REFERENCES
[1] S. Pant, N. Chauhan,P. Kumar, “Effective Cache based Policies in Wireless Sensor Networks:
A Survey,” International. Journal of Computer Application., vol. 11, no. 10, pp. 17–21, 2010.
[2] I. Akyildiz, W. Su, Y. Sankarasubramaniam,E. Cayirci, “Wireless sensor networks: a survey,”
Comput. Networks, vol. 38, pp. 393–422, 2002.
[3] D. Zhang, G. Li, K. Zheng, X. Ming, Z. H. Pan, “An energy-balanced routing method based on
forward-aware factor for wireless sensor networks,” IEEE TRANSACTIONS ON INDUSTRIAL
INFORMATICS, vol. 10, no. 1, pp. 766–773,2014.
[4] L. Jian-qi, C. Bin-fang, W. Li, W. Wen-Hu, “Energy optimized approach based on clustering routing
protocol for wireless sensor networks,” 2013 25th Chinese Control Decision. Conference, pp. 3710–
3715, 2013.
[5] S. Singh and C. S. Raghavendra, “PAMAS---power aware multi-access protocol with
signalling for ad hoc networks,” ACM SIGCOMM Computer. Communication. Review., vol. 28,
pp. 5–26, 1998.
[6] Yassein, “Improvement on LEACH Protocol of Wireless Sensor Network (VLEACH),” International.
Journal of Digital Content Technology and its Application, vol. 3, pp. 132–136, 2009.
[7] P. Nayak and D. Ph, “Comparison of Routing Protocols in WSN using NetSim Simulator : LEACH
Vs LEACH-C,” vol. 106, no. 11, pp. 1–6, 2014.
[8] A. Kaur and A. Grover, “LEACH and Extended LEACH Protocols in Wireless Sensor
Network-A Survey,” International. Journal of Computer Application vol. 116, no. 10, pp. 1–5, 2015.
[9] D. Xu and J. Gao, “Comparison Study to Hierarchical Routing Protocols in Wireless Sensor
Networks,” Procedia Environmental Science,Elsevier, vol. 10, pp. 595–600, 2011.
[10] S. Yadav and S. S. Yadav, “Review for Leach Protocol in WSN,” International Journal of Recent
Development in Engineering and Technology vol. 2, no 6, pp. 69–71, 2014.
[11] A. Ahlawat and V. Malik, “An extended vice-cluster selection approach to improve v leach protocol
in WSN,” 3rd Third International Conference on Advanced Computing & Communication
Technologies, ACCT, pp. 236–240, 2013.
[12] N. Singh, P. Rajeshwar, L. Dua, and V. Mathur, “Network Simulator NS2-2 .35,” International
Journal of Advanced Research in Computer Science and Software Engineering vol. 2, no. 5, pp. 224–
228, 2012.
[13] R. Ramesh, R. M. D. Charaan, N. T. M. Kumar, and E. Uma, “Implementation of Load Balancing in
Leach Protocol for Wireless Sensor Networks,”2nd international conference on emerging trends in
Engineering and technology,London(U.K) , pp. 80–84, 2014.
[14] R. Kumar, “Analysis and Enhancement of Adaptive Packet Technique in Wireless Sensor Network,”
vol. 24, no. 5, pp. 227– 230, 2015.
[15] Gagandeep kaur , poonam arora, “To Reduce the Packet Collision by Using Adaptive Technique in
WSN, International Journal of Advanced Research in Electrical Electronics
andInstrumentationEngineering” Vol. 3, pp. 11336–11341, 2014.
[16] L. Y. Barai, “Performance Evaluation of LEACH Protocol for Wireless Sensor Network,” vol. 1, no.
6, pp. 141–145, 2014.
[17] Singh S. & Singh G., “A Noble Routing Protocol for Vehicular Adhoc Networks with Less
RoutingOverheads,”International Journal of Future Generation Communication and Networking,
Vol. 7, no.5,pp23-34,2014.

More Related Content

What's hot

International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )ijassn
 
Energy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolEnergy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolARUNP116
 
Cluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor NetworksCluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor Networkseditor1knowledgecuddle
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNIJCNCJournal
 
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...IJERD Editor
 
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...IJMIT JOURNAL
 
Various Clustering Techniques in Wireless Sensor Network
Various Clustering Techniques in Wireless Sensor NetworkVarious Clustering Techniques in Wireless Sensor Network
Various Clustering Techniques in Wireless Sensor NetworkEditor IJCATR
 
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...IOSRJECE
 
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyData Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyCSCJournals
 
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor NetworksEnhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor NetworksAssociate Professor in VSB Coimbatore
 
Energy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networksEnergy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networksijassn
 
Iaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd Iaetsd
 

What's hot (17)

International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
 
Energy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolEnergy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocol
 
B045070510
B045070510B045070510
B045070510
 
Cluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor NetworksCluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor Networks
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
 
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
 
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
 
Kianoosh&amp;sajjad
Kianoosh&amp;sajjadKianoosh&amp;sajjad
Kianoosh&amp;sajjad
 
Various Clustering Techniques in Wireless Sensor Network
Various Clustering Techniques in Wireless Sensor NetworkVarious Clustering Techniques in Wireless Sensor Network
Various Clustering Techniques in Wireless Sensor Network
 
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
 
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyData Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
 
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor NetworksEnhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
Enhanced Hybrid Clustering Scheme for Dense Wireless Sensor Networks
 
Energy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networksEnergy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networks
 
Iaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routing
 
Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & Pegasis
 
Ijetcas14 591
Ijetcas14 591Ijetcas14 591
Ijetcas14 591
 
1909 1913
1909 19131909 1913
1909 1913
 

Similar to Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network

INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...ijsrd.com
 
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...IJSRED
 
An energy saving algorithm to prolong
An energy saving algorithm to prolongAn energy saving algorithm to prolong
An energy saving algorithm to prolongijwmn
 
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor NetworksEnergy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor NetworksIRJET Journal
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkeSAT Publishing House
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkeSAT Journals
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET Journal
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Editor IJCATR
 
Review of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor NetworkReview of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor Networkijsrd.com
 
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...IJMIT JOURNAL
 
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKSENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKSijassn
 

Similar to Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network (20)

INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
 
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
 
An energy saving algorithm to prolong
An energy saving algorithm to prolongAn energy saving algorithm to prolong
An energy saving algorithm to prolong
 
B05630814
B05630814B05630814
B05630814
 
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor NetworksEnergy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor network
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor network
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
 
Review of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor NetworkReview of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor Network
 
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
 
Ed33777782
Ed33777782Ed33777782
Ed33777782
 
Ed33777782
Ed33777782Ed33777782
Ed33777782
 
A04560105
A04560105A04560105
A04560105
 
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKSENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
 

More from josephjonse

2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...josephjonse
 
Global mobility and Handover management for heterogeneous network in vanet
Global mobility and Handover management for heterogeneous network in vanetGlobal mobility and Handover management for heterogeneous network in vanet
Global mobility and Handover management for heterogeneous network in vanetjosephjonse
 
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)josephjonse
 
10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...josephjonse
 
Network Parameters Impact on Dynamic Transmission Power Control in Vehicular ...
Network Parameters Impact on Dynamic Transmission Power Control in Vehicular ...Network Parameters Impact on Dynamic Transmission Power Control in Vehicular ...
Network Parameters Impact on Dynamic Transmission Power Control in Vehicular ...josephjonse
 
2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...josephjonse
 
10th International Conference on Data Mining (DaMi 2024)
10th International Conference on Data Mining (DaMi 2024)10th International Conference on Data Mining (DaMi 2024)
10th International Conference on Data Mining (DaMi 2024)josephjonse
 
10th International Conference on Artificial Intelligence and Soft Computing (...
10th International Conference on Artificial Intelligence and Soft Computing (...10th International Conference on Artificial Intelligence and Soft Computing (...
10th International Conference on Artificial Intelligence and Soft Computing (...josephjonse
 
On the Equality of the Grundy Numbers of a Graph
On the Equality of the Grundy Numbers of a GraphOn the Equality of the Grundy Numbers of a Graph
On the Equality of the Grundy Numbers of a Graphjosephjonse
 
10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...josephjonse
 
Cache Performance Analysis of Virtualized Router on Virtual Content-Centric N...
Cache Performance Analysis of Virtualized Router on Virtual Content-Centric N...Cache Performance Analysis of Virtualized Router on Virtual Content-Centric N...
Cache Performance Analysis of Virtualized Router on Virtual Content-Centric N...josephjonse
 
10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...josephjonse
 
2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...josephjonse
 
A Cognitive Radio And Dynamic Spectrum Access – A Study
A Cognitive Radio And Dynamic Spectrum Access – A StudyA Cognitive Radio And Dynamic Spectrum Access – A Study
A Cognitive Radio And Dynamic Spectrum Access – A Studyjosephjonse
 
5G Technology: An Assessment of the Opportunities and Challenges in an Emergi...
5G Technology: An Assessment of the Opportunities and Challenges in an Emergi...5G Technology: An Assessment of the Opportunities and Challenges in an Emergi...
5G Technology: An Assessment of the Opportunities and Challenges in an Emergi...josephjonse
 
2nd International Conference on Education in Post Pandemic (EDUPAN 2024)
2nd International Conference on Education in Post Pandemic (EDUPAN 2024)2nd International Conference on Education in Post Pandemic (EDUPAN 2024)
2nd International Conference on Education in Post Pandemic (EDUPAN 2024)josephjonse
 
5G Technology: An Assessment of the Opportunities and Challenges in an Emergi...
5G Technology: An Assessment of the Opportunities and Challenges in an Emergi...5G Technology: An Assessment of the Opportunities and Challenges in an Emergi...
5G Technology: An Assessment of the Opportunities and Challenges in an Emergi...josephjonse
 
4th International Conference on AI, Machine Learning and Applications (AIMLA ...
4th International Conference on AI, Machine Learning and Applications (AIMLA ...4th International Conference on AI, Machine Learning and Applications (AIMLA ...
4th International Conference on AI, Machine Learning and Applications (AIMLA ...josephjonse
 
3rd International Conference on Computing and Information Technology Trends (...
3rd International Conference on Computing and Information Technology Trends (...3rd International Conference on Computing and Information Technology Trends (...
3rd International Conference on Computing and Information Technology Trends (...josephjonse
 
2nd International Conference on Computer Science and Machine Learning (CSML 2...
2nd International Conference on Computer Science and Machine Learning (CSML 2...2nd International Conference on Computer Science and Machine Learning (CSML 2...
2nd International Conference on Computer Science and Machine Learning (CSML 2...josephjonse
 

More from josephjonse (20)

2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...
 
Global mobility and Handover management for heterogeneous network in vanet
Global mobility and Handover management for heterogeneous network in vanetGlobal mobility and Handover management for heterogeneous network in vanet
Global mobility and Handover management for heterogeneous network in vanet
 
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)
 
10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...
 
Network Parameters Impact on Dynamic Transmission Power Control in Vehicular ...
Network Parameters Impact on Dynamic Transmission Power Control in Vehicular ...Network Parameters Impact on Dynamic Transmission Power Control in Vehicular ...
Network Parameters Impact on Dynamic Transmission Power Control in Vehicular ...
 
2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...
 
10th International Conference on Data Mining (DaMi 2024)
10th International Conference on Data Mining (DaMi 2024)10th International Conference on Data Mining (DaMi 2024)
10th International Conference on Data Mining (DaMi 2024)
 
10th International Conference on Artificial Intelligence and Soft Computing (...
10th International Conference on Artificial Intelligence and Soft Computing (...10th International Conference on Artificial Intelligence and Soft Computing (...
10th International Conference on Artificial Intelligence and Soft Computing (...
 
On the Equality of the Grundy Numbers of a Graph
On the Equality of the Grundy Numbers of a GraphOn the Equality of the Grundy Numbers of a Graph
On the Equality of the Grundy Numbers of a Graph
 
10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...
 
Cache Performance Analysis of Virtualized Router on Virtual Content-Centric N...
Cache Performance Analysis of Virtualized Router on Virtual Content-Centric N...Cache Performance Analysis of Virtualized Router on Virtual Content-Centric N...
Cache Performance Analysis of Virtualized Router on Virtual Content-Centric N...
 
10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...
 
2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...
 
A Cognitive Radio And Dynamic Spectrum Access – A Study
A Cognitive Radio And Dynamic Spectrum Access – A StudyA Cognitive Radio And Dynamic Spectrum Access – A Study
A Cognitive Radio And Dynamic Spectrum Access – A Study
 
5G Technology: An Assessment of the Opportunities and Challenges in an Emergi...
5G Technology: An Assessment of the Opportunities and Challenges in an Emergi...5G Technology: An Assessment of the Opportunities and Challenges in an Emergi...
5G Technology: An Assessment of the Opportunities and Challenges in an Emergi...
 
2nd International Conference on Education in Post Pandemic (EDUPAN 2024)
2nd International Conference on Education in Post Pandemic (EDUPAN 2024)2nd International Conference on Education in Post Pandemic (EDUPAN 2024)
2nd International Conference on Education in Post Pandemic (EDUPAN 2024)
 
5G Technology: An Assessment of the Opportunities and Challenges in an Emergi...
5G Technology: An Assessment of the Opportunities and Challenges in an Emergi...5G Technology: An Assessment of the Opportunities and Challenges in an Emergi...
5G Technology: An Assessment of the Opportunities and Challenges in an Emergi...
 
4th International Conference on AI, Machine Learning and Applications (AIMLA ...
4th International Conference on AI, Machine Learning and Applications (AIMLA ...4th International Conference on AI, Machine Learning and Applications (AIMLA ...
4th International Conference on AI, Machine Learning and Applications (AIMLA ...
 
3rd International Conference on Computing and Information Technology Trends (...
3rd International Conference on Computing and Information Technology Trends (...3rd International Conference on Computing and Information Technology Trends (...
3rd International Conference on Computing and Information Technology Trends (...
 
2nd International Conference on Computer Science and Machine Learning (CSML 2...
2nd International Conference on Computer Science and Machine Learning (CSML 2...2nd International Conference on Computer Science and Machine Learning (CSML 2...
2nd International Conference on Computer Science and Machine Learning (CSML 2...
 

Recently uploaded

High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 

Recently uploaded (20)

High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 

Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network

  • 1. International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016 DOI : 10.5121/ijngn.2016.8102 13 SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK Tarun Sharma1, Harsukhpreet Singh2, Anurag sharma3 Dept” of Computer Science & Engineering, CT Institute of Technology & Research1 Dept” of Electronics & Communication Engineering, CT Institute of Technology & Research 2,3,Jalandhar, Punjab,India1,2,3 ABSTRACT The modern growth in fabricate energy efficient Wireless Sensor Network is liberal a novel way to systematize WSN in applications like surveillance, industrial monitoring, traffic monitoring, habitat monitoring, cropping monitoring, crowd including etc. The rising use of these networks is making engineers evolve novel and efficient ideas in this field. A group of research in data routing, data density and in network aggregation has been proposed in recent years. The energy consumption is the main apprehension in the wireless sensor network. There are many protocols in wireless sensor network to diminish the energy consumption and to put in to the network lifetime. Among a range of types of techniques, clustering is the most efficient technique to diminish the energy expenditure of network. In this effort, LEACH protocol has been second-hand for clustering in which cluster heads are nominated on the basis of distance and energy. The LEACH protocol is been implemented in a simulated environment and analyze their performance graphically. KEYWORDS Wireless sensor networks, energy efficiency, Clustering, LEACH protocol 1. INTRODUCTION A wireless sensor network is complete up of a huge quantity of sensor nodes and a sink [2]. The WSN is self-confident of sensor nodes from hundreds or thousands and every node is coupled to one sensor nodes. A wireless sensor network entire up of a large number of nodes extend over a precise area. A sensor node self-confident of the sensor, actuators, memory, a mainframe and they do have communication aptitude. All the sensor nodes are permitted to communicate in the course of a wireless intermediary. The wireless standard is of infrared, radio frequency that having no wired tie friendly. So the sensor nodes are deployed in a random conduct and it make ad-hoc network because they can discuss themselves [1]. If the node is unable to converse with other nodes of the network through a direct link, it means the node is out of range. In such kind of networks data broadcast from one node to another is perform via in the middle of nodes. This idea is referred as multi- hoping. All sensors nodes work helpfully to serve the requests [4]. 1.1Energy Consumption Issues The chief complicatedness in WSN, sensor node have classified battery life because the sensor nodes size is small so battery size, processor, storage liberty for data, these all are small as sensor nodes. So the main central point on lessening energy expenses in wireless sensor networks. In
  • 2. International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016 14 WSN a package of sensed information and routing in order has to be send which after have some time constraint so that information can be employable before any disaster occurs e.g. manufacturing monitoring, apparatus Monitoring etc. In WSN the power authority utilization is much better-quality data communication then internal processing. So, Energy preservation in WSN is the need to the address [3]. The Wireless sensor is flat to node stop working due to power hitting. In order to supply a reliable examine through a network, the network should be celebrity adjusting and must have elastic properties as requisite from point in time to time. A classified contact node may meet failure due to imperfect battery subsistence. In such case the network protocol should be logical enough to such collapse to keep the network organized many techniques are proposed for energy concession, clustering is single of them. The cluster heads are voted periodically such that members of a cluster can converse with their cluster heads. These cluster heads send data documented from its members to a base station. The multi-clustering can also be used. The cluster head should have to be rotated for the complementary of energy and then there will be an equal heaviness on every node. The energy expenditure can be strong [3]. Energy plays a vital task in wireless sensor networks because nodes are battery operated. Therefore numerous protocols have been proposed in order to diminish the energy consumption of these nodes such as LEACH [6], PAMAS [5]. LEACH is conscious as the most fashionable routing protocol that exploit cluster based routing in order to weaken the energy consumption, in this paper suggest a development on the LEACH protocol that supplementary recover the power consumption, simulation results express out that our protocol outperforms LEACH protocol in term of energy consumption and overall throughput. LEACH is “Low Energy Adaptive Clustering Protocol” [10]. LEACH form clusters and selects randomly cluster Heads for each cluster. Non- cluster heads sense the data and broadcast this data to cluster head, and then cluster head combined the data and forward this data to sink. The principle of this protocol is that it assigns overall energy consumption of the network uniformly to each node by selecting periodically different nodes as a cluster head. There are two phases of LEACH that are Setup phase and Steady state phase. In set up phase, clusters are shaped and cluster heads are chosen. In steady state phase, data from non-cluster heads is transmitted to sink. The sensor nodes communicate with cluster heads with allotted time using TDMA. Cluster heads are arbitrarily chosen in each round. LEACH operation is divided into several rounds. Each round begins with set-up phase. In this clusters are structured. LEACH set a threshold value T(n) and then sensor node I generate a random number between 0 and 1. If the random number is < T(n), the node will become cluster head for the current round and ordinary nodes link the cluster and become cluster members [6]. T (n) = p/1-p ×( r mod p-1 ) p is a probability of node to be selected as a cluster head, r is a number of rounds passed, G is a selection of ordinary nodes. Once a node become cluster head never become cluster head once more, only the node which have not become the cluster head and have elevated energy can become cluster head at r+1.When cluster head assigns time slots to the members using TDMA then it shifted to the steady state phase. After a shift in steady-state phase, members sent data to cluster heads; cluster head procedure the data and then send data sequence to the base station. After this round, it turn to next round and begin reconstruction new round. compensation of LEACH are that LEACH is completely distributed. LEACH does not necessitate the control information from the base station and the nodes do not require information of the global network in order for LEACH to work. LEACH reduces communication energy by 8 times as contrast to straight broadcast and smallest amount transmission energy routing. Disadvantages of LEACH are that the cluster heads are chosen arbitrarily. So the distribution of cluster heads cannot be ensured. In this protocol, the nodes with low energy have the same precedence as the nodes having high energy and nodes having low energy can become cluster heads [10].
  • 3. International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016 15 In section ii presents the connected works, In section iii initiate problem formulation, In section iv Simulation Setup, In section v result and discussion and section vi conclude the paper. Figure1: LEACH protocol Architecture 2. LITERATURE REVIEW A majority beneficial energy-saving spare organization, including spare collection and named it LEACH-SM protocol (modified form of prominent LEACH protocol) was deliberate by Baker B. et al.; (2014).In this author available a quantitative difference of energy consumption and WSN lifetime for both mentioned protocols [6]. Genetic algorithm and optimization of LEACH protocol that are worn on LEACH protocol and compare both domino effect on the basis of rounds that was discussed by Yadav S. et al.; (2014). This comparison was based on optimal thresholding probability for cluster structure. Finally, after comparison finds LEACH- GA method outperforms MTE, DT and LEACH in terms of network lifetime, use for optimal vigor- efficient clustering [11]. The two significant clustering protocols, namely LEACH and LEACH-C (centralized), using NS2 tool for numerous chosen scenarios, and study of simulation results against chosen performance metrics with latency and network lifetime was planned by Nayak P.et al.; (2014). As a conclusion of surveillance from results, it can be mentioned that LEACH can be favored if restricted harmonization of nodes in clustering without involving to BS is of tall priority than other factors like declaration over the desired number of clusters etc.; and LEACH- C can be designated when centralized and deterministic approach jacket complete network is unsurprising still bringing in enlarged network lifetime and desired number of clusters [7]. The tailored version of LEACH protocol called V-LEACH protocol and the contrast of LEACH protocol with V-LEACH protocol was designed by Alhawat A. et al.;(2013). from the simulation results were, first the numeral of busy nodes is more than the unique LEACH. Second the figure of dead nodes is less than the unique LEACH protocol. Network life-time is enlarged by 49.37% then original LEACH [6].
  • 4. International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016 16 Energy-LEACH protocol improves the CH selection procedure. It makes the lingering energy of nodes as the major metric which decides whether the nodes twist into CH or not after the first round. It same as LEACH protocol was projected by Xianging F. et al. ;( 2007). E-LEACH is alienated into rounds, in the first round, every node has the alike likelihood to turn into CH, that mean nodes are randomly chosen as CHs, In the next rounds, the left behind energy of each node is dissimilar after one round e-mail and taken into account for the collection of the CHs. That mean nodes have extra energy will develop into a CHs rather than nodes with fewer energy [6]. A novel version of LEACH called two-level LEACH was planned by Loscri V. In this protocol, CH collects data from other cluster members as exclusive LEACH, but rather than transport data to the BS openly, it uses one of the CHs that mendacity between the CH and the BS as a transmit station [8]. In LEACH, each CH straight communicates with BS no matter the distances between CH and BS It will guzzle a lot of its energy if the distance is distant. So conquer this drawback multihop- LEACH protocol was proposed by Zhou H. It selects a best possible path between the CH and the BS through other CHs and use these CHs as a relay station to televise data over through them [6]. 3. PROBLEM FORMULATION In this work, LEACH protocol has been worn for clustering in which cluster heads are preferred on the basis of distance and energy. • In LEACH protocol Cluster head straight communiqué with BS no matter the distance between Cluster head and the base station; it will use a group of its energy if the distance is far [13]. • Due to far distance packet does not arrive at the destination because CHs straight communicate with sink there is no inter-cluster communication, and this needs high trans-mission power due to this node dies earlier before transmission. 4. SIMULATION SET UP In this section, we evaluate the performance of LEACH protocol using NS2 tool. NS2 is used as simulation podium. NS is a distinct event simulator, where the go forward of time depends on the timing of events which are preserve by the scheduler. NS simulator is depending on two languages: C++, and an OTcl (an object-oriented tool command language).
  • 5. International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016 17 Table 1: NS-2 simulation parameters Parameter settings Simulation Area 500*500 meters No of nodes 41 Channel Type Channel/wireless Antennae model Antenna/omni antenna Energy model battery Interface queue Type Queue/Droptail/Priqueue Link layer type LL Initial energy 100 Routing protocol AODV Traffic Source CBR Type of MAC IEEE 802.11 Packet size 1000 bytes The C++ defines the interior instrument of the simulation objects, the OTcL sets up simulation by assembling and configuring the objects and scheduling discrete events. The OTcL are linked together using TclCL [12]. The experiments are performed with a diverse number of nodes placed in a 500m *500m field. Each sensor nodes is assumed to have an initial energy of 100 joules. The general simulation parameters are To evaluate the performance of LEACH protocol using parameters such as Energy consumption, Packet loss, End to End delay, Throughput and control overhead. Figure 2, shows energy consumption graph, in this graph 100 joules energy is to be addicted in 10 seconds because every cluster heads in LEACH protocol immediately communication with BS no stuff the distance between Cluster head and the base station; it will use a lot of its energy if the remoteness is far [13]. In figure 3, shows the packet loss graph, In this graph 16 number of the packet is lost in 10 seconds because in LEACH protocol CHs minter cluster communication, and this needs high trans-mission power due to this node dies earlier before transmission, packet does not reach the destination [14,15]. In Figure 4, shows End to End Delay graph, in this graph to increase the time delay is high due to high overhead which is a limitation of LEACH protocol [16]. In Figure 5, shows the throughput graph, in this graph 12 packet delivered in 10 seconds because due to high packet loss, delay, and control overhead so that the overall efficiency of the network is decreased [16]. In Figure 6, shows the control overhead. In this graph overhead is giant because in LEACH protocol extra overheads due to cluster head change and calculation leading to energy incompetence for dynamic clustering in large networks [17].
  • 6. International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016 18 Figure 2: Energy consumption graph of LEACH Protocol Figure 3: packet losses graph of LEACH protocol
  • 7. International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016 19 Figure 4 : End to End Delay of LEACH protocol Figure 5:Throughput graph of LEACH protocol
  • 8. International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016 20 Figure 6: Control overhead in LEACH protocol 6. CONCLUSION AND FUTURE WORK The conclusion of this paper is to apply and evaluate the performance of LEACH protocol using QoS parameters such as energy consumption, packet loss, End-to End-Delay, Throughput, and Control Overhead. The energy consumption of LEACH is very high because each cluster heads straight communiqué with BS no material the distance between Cluster head and the base station; it will use a group of its energy if the remoteness is far. Due to far distance packet does not arrive at the sink, packet loss problem is occurred so the overall performance of the networks is decreased. With the outcome obtained in this paper, a further issue worthy of consideration with RFID protocol can be done named as R- LEACH protocol. The design system can be extended using R-LEACH protocol; Of course, since we have focused only on LEACH protocol in this paper, the diagnosis can be done using R- LEACH protocol. We would like to consider these issues in subsequent work. ACKNOWLEDGEMENT I hereby acknowledge that the above-referred work is my own research work and I am entirely responsible for any kind of misuse of material. I thank my mentor Er. Harsukh Singh to guide and encourage me and for putting all her valuable time for me to get the desired output.
  • 9. International Journal of Next-Generation Networks (IJNGN) Vol.8, No.1, March 2016 21 REFERENCES [1] S. Pant, N. Chauhan,P. Kumar, “Effective Cache based Policies in Wireless Sensor Networks: A Survey,” International. Journal of Computer Application., vol. 11, no. 10, pp. 17–21, 2010. [2] I. Akyildiz, W. Su, Y. Sankarasubramaniam,E. Cayirci, “Wireless sensor networks: a survey,” Comput. Networks, vol. 38, pp. 393–422, 2002. [3] D. Zhang, G. Li, K. Zheng, X. Ming, Z. H. Pan, “An energy-balanced routing method based on forward-aware factor for wireless sensor networks,” IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, vol. 10, no. 1, pp. 766–773,2014. [4] L. Jian-qi, C. Bin-fang, W. Li, W. Wen-Hu, “Energy optimized approach based on clustering routing protocol for wireless sensor networks,” 2013 25th Chinese Control Decision. Conference, pp. 3710– 3715, 2013. [5] S. Singh and C. S. Raghavendra, “PAMAS---power aware multi-access protocol with signalling for ad hoc networks,” ACM SIGCOMM Computer. Communication. Review., vol. 28, pp. 5–26, 1998. [6] Yassein, “Improvement on LEACH Protocol of Wireless Sensor Network (VLEACH),” International. Journal of Digital Content Technology and its Application, vol. 3, pp. 132–136, 2009. [7] P. Nayak and D. Ph, “Comparison of Routing Protocols in WSN using NetSim Simulator : LEACH Vs LEACH-C,” vol. 106, no. 11, pp. 1–6, 2014. [8] A. Kaur and A. Grover, “LEACH and Extended LEACH Protocols in Wireless Sensor Network-A Survey,” International. Journal of Computer Application vol. 116, no. 10, pp. 1–5, 2015. [9] D. Xu and J. Gao, “Comparison Study to Hierarchical Routing Protocols in Wireless Sensor Networks,” Procedia Environmental Science,Elsevier, vol. 10, pp. 595–600, 2011. [10] S. Yadav and S. S. Yadav, “Review for Leach Protocol in WSN,” International Journal of Recent Development in Engineering and Technology vol. 2, no 6, pp. 69–71, 2014. [11] A. Ahlawat and V. Malik, “An extended vice-cluster selection approach to improve v leach protocol in WSN,” 3rd Third International Conference on Advanced Computing & Communication Technologies, ACCT, pp. 236–240, 2013. [12] N. Singh, P. Rajeshwar, L. Dua, and V. Mathur, “Network Simulator NS2-2 .35,” International Journal of Advanced Research in Computer Science and Software Engineering vol. 2, no. 5, pp. 224– 228, 2012. [13] R. Ramesh, R. M. D. Charaan, N. T. M. Kumar, and E. Uma, “Implementation of Load Balancing in Leach Protocol for Wireless Sensor Networks,”2nd international conference on emerging trends in Engineering and technology,London(U.K) , pp. 80–84, 2014. [14] R. Kumar, “Analysis and Enhancement of Adaptive Packet Technique in Wireless Sensor Network,” vol. 24, no. 5, pp. 227– 230, 2015. [15] Gagandeep kaur , poonam arora, “To Reduce the Packet Collision by Using Adaptive Technique in WSN, International Journal of Advanced Research in Electrical Electronics andInstrumentationEngineering” Vol. 3, pp. 11336–11341, 2014. [16] L. Y. Barai, “Performance Evaluation of LEACH Protocol for Wireless Sensor Network,” vol. 1, no. 6, pp. 141–145, 2014. [17] Singh S. & Singh G., “A Noble Routing Protocol for Vehicular Adhoc Networks with Less RoutingOverheads,”International Journal of Future Generation Communication and Networking, Vol. 7, no.5,pp23-34,2014.