SlideShare a Scribd company logo
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
70
AN ENERGY EFFICIENT PROTOCOL BASED STUDY OF
WSN TO INCREASE THE LIFETIME
Anjumol O N
Final Year MTech, Dept of Computer Science & Engineering, Sree Narayana Gurukulam College of Engineering,
Kerala, India
P.K.K Thampi
Associate Professor, Dept of Computer Science & Engineering, Sree Narayana Gurukulam College of Engineering,
Kerala, India
ABSTRACT
Wireless Sensor Network is an emerging area having wide applicability and deployment in coming era. They
can be used in different areas like industry, under water, health; etc.WSN is a network of sensor nodes, which can be
used for sensing or collecting physical as well as environmental information. Each node in the WSN is battery powered,
i.e. efficient energy management is more crucial issue in WSN. The energy dissipation of each and every node in the
network will affect their lifetime, in turn it will affect the lifetime of the entire network. So, in order to prevent this issue
and to maximize the entire lifetime of the network, efficient energy management techniques are necessary. In this paper,
different techniques to increase the lifetime of sensor network like Low Energy Adaptive Clustering Hierarchy
(LEACH), Energy LEACH, Power Efficient Gathering in Sensor Information System (PEGASIS),Threshold Sensitive
Energy Efficient Network (TEEN), Hybrid Energy Efficient Distributed Clustering (HEED) have been studied; which are
coming under the category of Hierarchical or clustering based protocol. These protocols are compared to evaluate their
advantages and disadvantages.
KEYWORDS: Clustering, e-LEACH, EER, HEED, LEACH, PEGASIS, TEEN, WSN.
1. INTRODUCTION
Wireless Sensor Network (WSN) is an emerging area having wide applicability and deployment. It is nothing
but a collection of small nodes called sensor, which can be used for collecting either physical or environmental data
from the area of interest .The data can be temperature, motion, speed, pressure, etc .Each sensor node in the network
having different parts .First part for sensing the data ,is radio transceiver ;Micro controller for processing the collected
information ,electronic circuit for interface and a battery for providing power .Each and every node in the network will
collect the data from the area of interest and it will be send to the sink node via different neighbor nodes and gateway
node .So energy of the node in the network having vital role in communication and processing of data and it in turn will
affect the lifetime of the entire network. The characteristics of WSN are,
Power consumption constrains.
Scalability.
Ease of use.
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 5, Issue 12, December (2014), pp. 70-75
© IAEME: www.iaeme.com/IJCET.asp
Journal Impact Factor (2014): 8.5328 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
71
Mobility of nodes
Less cost
To increase the energy efficiency, better routing protocols are needed. Even though, the sensors are limited by
battery, the sensor network having wide range of applicabity and deployment. In this paper, different protocols which use
the concept of clustering are studied and a comparison is made between them
2. WSN – AFFECTING FACTORS
In wireless sensor network, sensor nodes consume energy when it collects or senses the data, process the data,
transmit the data and receive the data. Data reception and transmission requires more power than collection, since it
passes the data from one node to the destination node via different intermediate nodes or through multiple paths .As the
data propagates through multiple paths needs more energy of each node and will affect the network lifetime .The wastage
of energy through communication as mentioned in [1][2] which is noted below.
• Idle Listening to the channel:
A sensor node is always listening to the idle channel to get the data destined for it.ie, the node doesn’t know
when the packet will come for it ,so the node will listen continuously to not to miss the packet, and it cause
significant amount of energy wastage.
• Collision of data:
The data collision are the main source of energy wastage ,because the collision will cause loss of packet and in
turn it requires the retransmission of that packet and reducing the power of the node .The collision occurs when
two or more nodes transmits or receives one or more packets at the same time or through the same path.
• Overhearing of data:
A node listens to the channel eventually even if it doesn’t have any data to transmit .That is node listens to the
packet that is not destined for it. It may cause reception of unwanted signals and energy wastage.
• Control data overhead:
Through the radio channel not only the data packets but also the control packets are transmitted between nodes
.The control packets provides control information for the communication in the network .A good energy
efficient routing for the WSN needs minimized amount of control packets along with the data packets so as to
reduce energy dissipation.
• Overmitting of data:
A packet will be lost, if the receiver is not at all ready to receive the message from the source but the source
have been already send .So it requires retransmission of the packet and energy will be wasted.
• Interference:
Interferences occurred during the transmission will cause energy wastage than without interference.
3. ENERGY EFFICIENT ROUTING TECHNIQUES USED IN WSN
The energy efficient routing protocols are aimed to reduce the energy dissipation and wastage of power so as to
improve the life of entire network. In Wireless Sensor Networks the routing protocols are selected in accordance with the
path which results in the prolonged life of the network and it also depends on the application in which it is deployed. The
different categories of the EER given in [1] are,
• Protocols relaying on Data
• Data centric
• Hierarchical or clustering based
• Geographical or Location based
• Mobility based
• Heterogeneous
4.CLUSTERING OR HIERARCHICAL BASED PROTOCOLS
This [3][4] category of EER guarantees significant amount of energy saving while communication. Clustering
or hierarchical protocols arranges the nodes to clusters and also improves the performance of the network.
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
72
Fig.1: Clustering
The Sensor network is deployed in the area of interest and the area is clustered; that is each and every node in
the network becomes a member of any of the cluster but not more than one. One node from the each cluster taken as
leader node or the cluster head and this cluster head (CH) is responsible for the communication. Every other node in the
cluster will send the data to the CH rather than send to the base station (BS) directly .CH will collect and aggregate the
packets and transmit to the BS, thereby reducing the number of traffic to the base station and also reduces the energy
dissipation and so increasing the lifetime of the entire network.
The different types of hierarchical protocols are LEACH, e-LEACH, PEGASIS ,TEEN , APTEEN ,etc. In this
paper, some of these protocols are discussed below.
4.1 LEACH
LEACH [3][4][5] is a hierarchical protocol , means Low-Energy Adaptive Clustering Hierarchy. This protocol
is proposed by Dr.Wendi Rabnir Heinzelman. This protocol is mainly made by using the concept of clustering, i.e. It
selects the cluster head randomly and this CH will collect the data from the other nodes in the cluster and combines or
aggregates the data to reduce the size of the data packets and transmit it to other nodes. In the paper [5],it describes the
working of LEACH .The steps are,
1. Select initial network
2. Selection the cluster heads.
3. According to the CH divide network into clusters.
4. Compute the energy consumption of every node in the network.
5. Check whether the lifetime is closed or not.
6. If closed go to step 2.
7. Else give the output.
Fig.2: LEACH
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
73
LEACH breaks downs the entire network into clusters and it will select the cluster head based on the energy.
That is high energy node will be selected as CH, it will change round to round. Every node will get a chance become the
CH, so that it will reduces the energy dissipation of individual nodes. It uses TDMA scheduling within the cluster and
Code Division Multiple Access is used for communicating between the clusters. LEACH performs local aggregation of
information or data from the sensor nodes in the network .It reduces the energy consumption by factor 7.Eventhough it
having some advantages it still suffers because of some drawbacks.
• LEACH protocol is inefficient to cover large area.
• It selects the CH randomly, no assurance for efficient energy management.
• Cluster heads are distributed non-uniformly; it can be at the edge.
4.2 Energy-LEACH
Its [5] an enhancement to the LEACH protocol by considering another important metric called residual energy.
In accordance with the residual energy it will decide whether a sensor node have to become a cluster head or not. This
protocol has more than one round. The working of Energy Leach is described in [5], is given here,
1. Start first round.
2. Select the nodes with more residual energy.
3. Compute residual energy of each node.
4. Check whether the energy computed is more than the scheduled energy.
5. If yes,
5.1. Select it as cluster head.
5.2. Broadcast the CH information to other nodes
6. If no,
6.1 Consider it as a common node
6.2 Send joining information to cluster head.
Fig.3: e-Leach
4.3 PEGASIS
PEGASIS [6] stands for Power Efficient Gathering in Sensor Information System is an improvement of LEACH
protocol and it is based on near optimal chain based technique .In this protocol each sensor node transmits or receive the
packet only to or from to the closest neighbor node only, that is only one node will communicate with the base station
once, means chances of collision is less and thereby we can improve the performance of the network by reducing energy
consumption. By sending data to the nearest node the nodes may form a chain starts from any selected node to the base
station i.e.; the communication overhead and energy load are distributed equally to each and every node in the network
.Through the chain the gathered or collected data from a node to the sink node is transmitted and average energy
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
74
dissipation is minimized .This model is similar to the travelling sales man problem .It gains 100 to 300 percentage
improvement when compared with LEACH.
It works by using the concept token passing. The nodes which transmit the data to BS, that is the node which is
closer to BS will be the leader node, this node will be at random position in each round. The leader node will start the
communication by passing the token to the sending node. So the main problem in PEGASIS is the chances for single
point failure.
4.4 TEEN
TEEN [7][3][1] means Threshold Sensitive Energy Efficient Network is a protocol which is well suited for
reactive networks . It’s a combination of both hierarchical and data centric approaches .It arranges the sensor nodes into
multiple levels of hierarchy .That is it create cluster by grouping the nearest nodes in the primary level and same process
will repeats in each round until the sink node reaches .The energy consumption is reduced in TEEN by minimizing the
number of transmissions in the network. After the formation of cluster the CH is broadcasts by involvement of two
parameters known as Hard and Soft thresholds.
Hard Threshold: It is the sensed attribute’s threshold value. The node which senses this absolute value has to
switch on the transmitter and should report to CH.
Soft Threshold: A node has to switch on the transmitter and to transmit the data if any changes occurred to this
value.
TEEN is more good to save significant amount of energy but it cannot be used in the situations which require
periodic updates of sensed data. The implementation of this protocol is difficult as it requires multi level hierarchy,
attribute based naming etc.
4.5 HEED
HEED [3] is Hybrid Energy Efficient Distributed Clustering is a multi-hop clustering technique used to
minimize the energy consumption. The main aim of this protocol is to distribute the energy load to every node in the
network, minimizing the usage of energy during the CH selection and to decrease the overall control overhead over the
network. The cluster head selection in HEED is depending on two other parameters; Initial set of cluster head are
selected on the basis of the parameter residual energy and Intra cluster communication cost is the second parameter.
Lower the cost the more chance for communication between a node and its cluster head. Average Minimum Reachability
Power (AMRP) is used to find the cost; it is measured by taking the average value of minimum power level of each node
in the cluster.
5. COMPARISON
Table.1: Comparison
5. CONCLUSION
Wireless sensor networks are an emerging area and having many applications in different areas. But main issue
regarding WSN is minimized energy and lifetime. There are many studies undergoing in the network about the efficient
management of energy. In this paper different techniques were discussed to minimizing the energy dissipation and to
improve the lifetime of the network. And a comparative study between the different techniques is made to evaluate their
performance.
Protocols Main Concept Lifetime Energy
Efficient?
Drawback
LEACH Clustering Good Yes Random selection of
CH
Energy LEACH CH selection according
to residual energy
More than
LEACH
Yes Clustering overhead
PEGASIS Near optimal chain
based clustering
100-300 %
than LEACH
Yes Single point failure
TEEN Hierarchical method +
data centric
Good Yes Implementation
overhead
HEED Multi-hoping Good Yes Control and deploying
overhead
Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14)
30 – 31, December 2014, Ernakulam, India
75
REFERENCES
[1] A Survey on Energy Efficient Routing Techniques in Wireless Sensor Networl,Md. Atiqur Rahman, Shahed
Anwar, Md. I1eas Pramanik ,ICACT 2013,January 27-30,2013
[2] Cross-Layer Design for energy efficient in wireless underwater communication: Acoustic frequency
Identification case study, ghada ZAIBI, Nejah NASRI, Abdennacer Kachouri,Laurent Andrieux and Mounir
Samet,IJCSI International journal of Computer Science, vol 8, issue 3, No.2 may 2011.
[3] A Survey of Hierarchical Routing Protocols in Wireless Sensor Network Ankita Joshi , Lakshmi Priya.M , MES
Journal of Technology and Management.
[4] An approach to increase wireless sensor network lifetime, Nikhil Marriwala, Priyanka Rathee, 2012 IEEE.
[5] Improvement on LEACH protocol of wireless sensor network, Fan Xiangning & Song Yulin, 2007 IEEE.
[6] PEGASIS: Power-Efficient Gathering in Sensor Information Systems, Stephanie Lmdsey and Cauligi S.
Raghavendra, IEEE 2002.
[7] TEEN: A Routing Protocol for Enhanced Efficiency in Wireless Sensor Networks, Arati Manjeshwar and
Dharma P. Agrawal,2001 IEEEs.
[8] Prathap P and Manjula S, “To Improve Energy-Efficient and Secure Multipath Communication in Underwater
Sensor Network”, International Journal of Computer Engineering & Technology (IJCET), Volume 5, Issue 2,
2014, pp. 145 - 152, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
[9] L.Malathi and Dr.R.K.Gnanamurthy, “A Novel Cluster Based Routing Protocol with Lifetime Maximizing
Clustering Algorithm”, International Journal of Computer Engineering & Technology (IJCET), Volume 3,
Issue 2, 2012, pp. 256 - 264, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.

More Related Content

What's hot

Kianoosh&sajjad
Kianoosh&sajjadKianoosh&sajjad
Kianoosh&sajjad
bardia kazemi
 
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
IJMIT JOURNAL
 
Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...
IJCNCJournal
 
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...
CSCJournals
 
Energy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolEnergy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocol
ARUNP116
 
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ijasuc
 
H0421043049
H0421043049H0421043049
H0421043049
ijceronline
 
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
Sathish Silence
 
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor NetworkA QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
ijassn
 
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKSALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
Editor IJCTER
 
Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network
dilip pareek
 
Iaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd Iaetsd
 
C018141418
C018141418C018141418
C018141418
IOSR Journals
 
BEE BASED ROUTING PROTOCOL FOR MANET
BEE BASED ROUTING PROTOCOL FOR MANETBEE BASED ROUTING PROTOCOL FOR MANET
BEE BASED ROUTING PROTOCOL FOR MANET
Editor IJCTER
 
Data Collection Method to Improve Energy Efficiency in Wireless Sensor Network
Data Collection Method to Improve Energy Efficiency in Wireless Sensor NetworkData Collection Method to Improve Energy Efficiency in Wireless Sensor Network
Data Collection Method to Improve Energy Efficiency in Wireless Sensor Network
KhushbooGupta145
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Ali Habeeb
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor networkshashankcsnits
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET Journal
 

What's hot (20)

Kianoosh&sajjad
Kianoosh&sajjadKianoosh&sajjad
Kianoosh&sajjad
 
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
 
Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...Qos group based optimal retransmission medium access protocol for wireless se...
Qos group based optimal retransmission medium access protocol for wireless se...
 
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...
 
1909 1913
1909 19131909 1913
1909 1913
 
Energy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolEnergy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocol
 
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
 
H0421043049
H0421043049H0421043049
H0421043049
 
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
 
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor NetworkA QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
 
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKSALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
 
Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network
 
Iaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routing
 
C018141418
C018141418C018141418
C018141418
 
BEE BASED ROUTING PROTOCOL FOR MANET
BEE BASED ROUTING PROTOCOL FOR MANETBEE BASED ROUTING PROTOCOL FOR MANET
BEE BASED ROUTING PROTOCOL FOR MANET
 
Data Collection Method to Improve Energy Efficiency in Wireless Sensor Network
Data Collection Method to Improve Energy Efficiency in Wireless Sensor NetworkData Collection Method to Improve Energy Efficiency in Wireless Sensor Network
Data Collection Method to Improve Energy Efficiency in Wireless Sensor Network
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
 
Routing protocol on wireless sensor network
Routing protocol on wireless sensor networkRouting protocol on wireless sensor network
Routing protocol on wireless sensor network
 
Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1
 
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
IRJET- Energy Efficient Secure Communication in Wireless Sensor Networks: A S...
 

Viewers also liked

An Energy Efficient Protocol To Increase Network Life In WSN
An Energy Efficient Protocol To Increase Network Life In WSNAn Energy Efficient Protocol To Increase Network Life In WSN
An Energy Efficient Protocol To Increase Network Life In WSN
IOSR Journals
 
stable election protocol
stable election protocolstable election protocol
stable election protocol
apuu34
 
Leach
LeachLeach
Wi Fi Security
Wi Fi SecurityWi Fi Security
Wi Fi Security
yousef emami
 
Leach
Leach Leach
Energy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSNEnergy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSN
Zubin Bhuyan
 
Leach-Protocol
Leach-ProtocolLeach-Protocol
Leach-Protocol
zhendong
 
Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & Pegasis
ReenaShekar
 

Viewers also liked (9)

An Energy Efficient Protocol To Increase Network Life In WSN
An Energy Efficient Protocol To Increase Network Life In WSNAn Energy Efficient Protocol To Increase Network Life In WSN
An Energy Efficient Protocol To Increase Network Life In WSN
 
stable election protocol
stable election protocolstable election protocol
stable election protocol
 
Leach
LeachLeach
Leach
 
Wi Fi Security
Wi Fi SecurityWi Fi Security
Wi Fi Security
 
Leach
Leach Leach
Leach
 
Energy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSNEnergy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSN
 
Leach-Protocol
Leach-ProtocolLeach-Protocol
Leach-Protocol
 
Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & Pegasis
 
Leach protocol
Leach protocolLeach protocol
Leach protocol
 

Similar to An energy efficient protocol based study of wsn to increase the lifetime

Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor NetworksEnergy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
IRJET Journal
 
B05630814
B05630814B05630814
B05630814
IOSR-JEN
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
ijwmn
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
ijwmn
 
Energy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networksEnergy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networks
ijassn
 
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKSENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ijassn
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor network
eSAT Journals
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor network
eSAT Publishing House
 
Data gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodesData gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodes
IJCNCJournal
 
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
IJMIT JOURNAL
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
ijwmn
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
ijwmn
 
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
IJCNCJournal
 
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
IJCNCJournal
 
A04560105
A04560105A04560105
A04560105
IOSR-JEN
 
Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a survey
IAEME Publication
 
Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...
Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...
Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...
IOSR Journals
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
ijsrd.com
 
An efficient routing approach for aggregated data transmission along with per...
An efficient routing approach for aggregated data transmission along with per...An efficient routing approach for aggregated data transmission along with per...
An efficient routing approach for aggregated data transmission along with per...
eSAT Publishing House
 

Similar to An energy efficient protocol based study of wsn to increase the lifetime (20)

Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor NetworksEnergy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
 
B05630814
B05630814B05630814
B05630814
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
1909 1913
1909 19131909 1913
1909 1913
 
Energy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networksEnergy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networks
 
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKSENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor network
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor network
 
Data gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodesData gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodes
 
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
 
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
 
A04560105
A04560105A04560105
A04560105
 
Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a survey
 
Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...
Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...
Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
An efficient routing approach for aggregated data transmission along with per...
An efficient routing approach for aggregated data transmission along with per...An efficient routing approach for aggregated data transmission along with per...
An efficient routing approach for aggregated data transmission along with per...
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 

Recently uploaded (20)

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 

An energy efficient protocol based study of wsn to increase the lifetime

  • 1. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 70 AN ENERGY EFFICIENT PROTOCOL BASED STUDY OF WSN TO INCREASE THE LIFETIME Anjumol O N Final Year MTech, Dept of Computer Science & Engineering, Sree Narayana Gurukulam College of Engineering, Kerala, India P.K.K Thampi Associate Professor, Dept of Computer Science & Engineering, Sree Narayana Gurukulam College of Engineering, Kerala, India ABSTRACT Wireless Sensor Network is an emerging area having wide applicability and deployment in coming era. They can be used in different areas like industry, under water, health; etc.WSN is a network of sensor nodes, which can be used for sensing or collecting physical as well as environmental information. Each node in the WSN is battery powered, i.e. efficient energy management is more crucial issue in WSN. The energy dissipation of each and every node in the network will affect their lifetime, in turn it will affect the lifetime of the entire network. So, in order to prevent this issue and to maximize the entire lifetime of the network, efficient energy management techniques are necessary. In this paper, different techniques to increase the lifetime of sensor network like Low Energy Adaptive Clustering Hierarchy (LEACH), Energy LEACH, Power Efficient Gathering in Sensor Information System (PEGASIS),Threshold Sensitive Energy Efficient Network (TEEN), Hybrid Energy Efficient Distributed Clustering (HEED) have been studied; which are coming under the category of Hierarchical or clustering based protocol. These protocols are compared to evaluate their advantages and disadvantages. KEYWORDS: Clustering, e-LEACH, EER, HEED, LEACH, PEGASIS, TEEN, WSN. 1. INTRODUCTION Wireless Sensor Network (WSN) is an emerging area having wide applicability and deployment. It is nothing but a collection of small nodes called sensor, which can be used for collecting either physical or environmental data from the area of interest .The data can be temperature, motion, speed, pressure, etc .Each sensor node in the network having different parts .First part for sensing the data ,is radio transceiver ;Micro controller for processing the collected information ,electronic circuit for interface and a battery for providing power .Each and every node in the network will collect the data from the area of interest and it will be send to the sink node via different neighbor nodes and gateway node .So energy of the node in the network having vital role in communication and processing of data and it in turn will affect the lifetime of the entire network. The characteristics of WSN are, Power consumption constrains. Scalability. Ease of use. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 12, December (2014), pp. 70-75 © IAEME: www.iaeme.com/IJCET.asp Journal Impact Factor (2014): 8.5328 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 71 Mobility of nodes Less cost To increase the energy efficiency, better routing protocols are needed. Even though, the sensors are limited by battery, the sensor network having wide range of applicabity and deployment. In this paper, different protocols which use the concept of clustering are studied and a comparison is made between them 2. WSN – AFFECTING FACTORS In wireless sensor network, sensor nodes consume energy when it collects or senses the data, process the data, transmit the data and receive the data. Data reception and transmission requires more power than collection, since it passes the data from one node to the destination node via different intermediate nodes or through multiple paths .As the data propagates through multiple paths needs more energy of each node and will affect the network lifetime .The wastage of energy through communication as mentioned in [1][2] which is noted below. • Idle Listening to the channel: A sensor node is always listening to the idle channel to get the data destined for it.ie, the node doesn’t know when the packet will come for it ,so the node will listen continuously to not to miss the packet, and it cause significant amount of energy wastage. • Collision of data: The data collision are the main source of energy wastage ,because the collision will cause loss of packet and in turn it requires the retransmission of that packet and reducing the power of the node .The collision occurs when two or more nodes transmits or receives one or more packets at the same time or through the same path. • Overhearing of data: A node listens to the channel eventually even if it doesn’t have any data to transmit .That is node listens to the packet that is not destined for it. It may cause reception of unwanted signals and energy wastage. • Control data overhead: Through the radio channel not only the data packets but also the control packets are transmitted between nodes .The control packets provides control information for the communication in the network .A good energy efficient routing for the WSN needs minimized amount of control packets along with the data packets so as to reduce energy dissipation. • Overmitting of data: A packet will be lost, if the receiver is not at all ready to receive the message from the source but the source have been already send .So it requires retransmission of the packet and energy will be wasted. • Interference: Interferences occurred during the transmission will cause energy wastage than without interference. 3. ENERGY EFFICIENT ROUTING TECHNIQUES USED IN WSN The energy efficient routing protocols are aimed to reduce the energy dissipation and wastage of power so as to improve the life of entire network. In Wireless Sensor Networks the routing protocols are selected in accordance with the path which results in the prolonged life of the network and it also depends on the application in which it is deployed. The different categories of the EER given in [1] are, • Protocols relaying on Data • Data centric • Hierarchical or clustering based • Geographical or Location based • Mobility based • Heterogeneous 4.CLUSTERING OR HIERARCHICAL BASED PROTOCOLS This [3][4] category of EER guarantees significant amount of energy saving while communication. Clustering or hierarchical protocols arranges the nodes to clusters and also improves the performance of the network.
  • 3. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 72 Fig.1: Clustering The Sensor network is deployed in the area of interest and the area is clustered; that is each and every node in the network becomes a member of any of the cluster but not more than one. One node from the each cluster taken as leader node or the cluster head and this cluster head (CH) is responsible for the communication. Every other node in the cluster will send the data to the CH rather than send to the base station (BS) directly .CH will collect and aggregate the packets and transmit to the BS, thereby reducing the number of traffic to the base station and also reduces the energy dissipation and so increasing the lifetime of the entire network. The different types of hierarchical protocols are LEACH, e-LEACH, PEGASIS ,TEEN , APTEEN ,etc. In this paper, some of these protocols are discussed below. 4.1 LEACH LEACH [3][4][5] is a hierarchical protocol , means Low-Energy Adaptive Clustering Hierarchy. This protocol is proposed by Dr.Wendi Rabnir Heinzelman. This protocol is mainly made by using the concept of clustering, i.e. It selects the cluster head randomly and this CH will collect the data from the other nodes in the cluster and combines or aggregates the data to reduce the size of the data packets and transmit it to other nodes. In the paper [5],it describes the working of LEACH .The steps are, 1. Select initial network 2. Selection the cluster heads. 3. According to the CH divide network into clusters. 4. Compute the energy consumption of every node in the network. 5. Check whether the lifetime is closed or not. 6. If closed go to step 2. 7. Else give the output. Fig.2: LEACH
  • 4. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 73 LEACH breaks downs the entire network into clusters and it will select the cluster head based on the energy. That is high energy node will be selected as CH, it will change round to round. Every node will get a chance become the CH, so that it will reduces the energy dissipation of individual nodes. It uses TDMA scheduling within the cluster and Code Division Multiple Access is used for communicating between the clusters. LEACH performs local aggregation of information or data from the sensor nodes in the network .It reduces the energy consumption by factor 7.Eventhough it having some advantages it still suffers because of some drawbacks. • LEACH protocol is inefficient to cover large area. • It selects the CH randomly, no assurance for efficient energy management. • Cluster heads are distributed non-uniformly; it can be at the edge. 4.2 Energy-LEACH Its [5] an enhancement to the LEACH protocol by considering another important metric called residual energy. In accordance with the residual energy it will decide whether a sensor node have to become a cluster head or not. This protocol has more than one round. The working of Energy Leach is described in [5], is given here, 1. Start first round. 2. Select the nodes with more residual energy. 3. Compute residual energy of each node. 4. Check whether the energy computed is more than the scheduled energy. 5. If yes, 5.1. Select it as cluster head. 5.2. Broadcast the CH information to other nodes 6. If no, 6.1 Consider it as a common node 6.2 Send joining information to cluster head. Fig.3: e-Leach 4.3 PEGASIS PEGASIS [6] stands for Power Efficient Gathering in Sensor Information System is an improvement of LEACH protocol and it is based on near optimal chain based technique .In this protocol each sensor node transmits or receive the packet only to or from to the closest neighbor node only, that is only one node will communicate with the base station once, means chances of collision is less and thereby we can improve the performance of the network by reducing energy consumption. By sending data to the nearest node the nodes may form a chain starts from any selected node to the base station i.e.; the communication overhead and energy load are distributed equally to each and every node in the network .Through the chain the gathered or collected data from a node to the sink node is transmitted and average energy
  • 5. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 74 dissipation is minimized .This model is similar to the travelling sales man problem .It gains 100 to 300 percentage improvement when compared with LEACH. It works by using the concept token passing. The nodes which transmit the data to BS, that is the node which is closer to BS will be the leader node, this node will be at random position in each round. The leader node will start the communication by passing the token to the sending node. So the main problem in PEGASIS is the chances for single point failure. 4.4 TEEN TEEN [7][3][1] means Threshold Sensitive Energy Efficient Network is a protocol which is well suited for reactive networks . It’s a combination of both hierarchical and data centric approaches .It arranges the sensor nodes into multiple levels of hierarchy .That is it create cluster by grouping the nearest nodes in the primary level and same process will repeats in each round until the sink node reaches .The energy consumption is reduced in TEEN by minimizing the number of transmissions in the network. After the formation of cluster the CH is broadcasts by involvement of two parameters known as Hard and Soft thresholds. Hard Threshold: It is the sensed attribute’s threshold value. The node which senses this absolute value has to switch on the transmitter and should report to CH. Soft Threshold: A node has to switch on the transmitter and to transmit the data if any changes occurred to this value. TEEN is more good to save significant amount of energy but it cannot be used in the situations which require periodic updates of sensed data. The implementation of this protocol is difficult as it requires multi level hierarchy, attribute based naming etc. 4.5 HEED HEED [3] is Hybrid Energy Efficient Distributed Clustering is a multi-hop clustering technique used to minimize the energy consumption. The main aim of this protocol is to distribute the energy load to every node in the network, minimizing the usage of energy during the CH selection and to decrease the overall control overhead over the network. The cluster head selection in HEED is depending on two other parameters; Initial set of cluster head are selected on the basis of the parameter residual energy and Intra cluster communication cost is the second parameter. Lower the cost the more chance for communication between a node and its cluster head. Average Minimum Reachability Power (AMRP) is used to find the cost; it is measured by taking the average value of minimum power level of each node in the cluster. 5. COMPARISON Table.1: Comparison 5. CONCLUSION Wireless sensor networks are an emerging area and having many applications in different areas. But main issue regarding WSN is minimized energy and lifetime. There are many studies undergoing in the network about the efficient management of energy. In this paper different techniques were discussed to minimizing the energy dissipation and to improve the lifetime of the network. And a comparative study between the different techniques is made to evaluate their performance. Protocols Main Concept Lifetime Energy Efficient? Drawback LEACH Clustering Good Yes Random selection of CH Energy LEACH CH selection according to residual energy More than LEACH Yes Clustering overhead PEGASIS Near optimal chain based clustering 100-300 % than LEACH Yes Single point failure TEEN Hierarchical method + data centric Good Yes Implementation overhead HEED Multi-hoping Good Yes Control and deploying overhead
  • 6. Proceedings of the International Conference on Emerging Trends in Engineering and Management (ICETEM14) 30 – 31, December 2014, Ernakulam, India 75 REFERENCES [1] A Survey on Energy Efficient Routing Techniques in Wireless Sensor Networl,Md. Atiqur Rahman, Shahed Anwar, Md. I1eas Pramanik ,ICACT 2013,January 27-30,2013 [2] Cross-Layer Design for energy efficient in wireless underwater communication: Acoustic frequency Identification case study, ghada ZAIBI, Nejah NASRI, Abdennacer Kachouri,Laurent Andrieux and Mounir Samet,IJCSI International journal of Computer Science, vol 8, issue 3, No.2 may 2011. [3] A Survey of Hierarchical Routing Protocols in Wireless Sensor Network Ankita Joshi , Lakshmi Priya.M , MES Journal of Technology and Management. [4] An approach to increase wireless sensor network lifetime, Nikhil Marriwala, Priyanka Rathee, 2012 IEEE. [5] Improvement on LEACH protocol of wireless sensor network, Fan Xiangning & Song Yulin, 2007 IEEE. [6] PEGASIS: Power-Efficient Gathering in Sensor Information Systems, Stephanie Lmdsey and Cauligi S. Raghavendra, IEEE 2002. [7] TEEN: A Routing Protocol for Enhanced Efficiency in Wireless Sensor Networks, Arati Manjeshwar and Dharma P. Agrawal,2001 IEEEs. [8] Prathap P and Manjula S, “To Improve Energy-Efficient and Secure Multipath Communication in Underwater Sensor Network”, International Journal of Computer Engineering & Technology (IJCET), Volume 5, Issue 2, 2014, pp. 145 - 152, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [9] L.Malathi and Dr.R.K.Gnanamurthy, “A Novel Cluster Based Routing Protocol with Lifetime Maximizing Clustering Algorithm”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 256 - 264, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.