SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 616
ANALYSIS OF DIFFERENT HIERARCHICAL ROUTING PROTOCOLS
OF WIRELESS SENSOR NETWORK
Dipti Balkrushna Ram1
, Grishma Shaileshkumar Shah2
1,2
Master of engineering, Electronics and Communication, SAL Institute of technology and engineering research,
Gujarat, India
, Abstarct
Wireless sensored network is nowadays very popular in the field of research because world is now switching faster from wired
communication to the wireless communication. It is used in environment monitoring, habitat monitoring, battlefield etc. WSN is
made up of tiny sensor nodes which senses the data and communicate to the base station via other nodes.WSN networks are data-
centric rather than node centric. So, main issues in WSN networks are energy consumption of network, lifetime of a network,
delay, latency, quality of service etc.WSN has defined many routing protocols for the network. The main challenge in WSN is to
design a routing protocol which gives the maximum energy efficient routing because nodes in sensored network are equipped with
the battery. So, as time passes the battery of nodes will decrease so in turn network lifetime will decreases. There are many
routing protocols which are classified as their working and their application to different conditions. This paper describes a brief
information about routing protocols. The main focus of this paper is to give the comparison of different hierarchical routing
protocols.
Keywords: Leach, Pegasis,Teen/Apteen, WSN
-------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
Designing of a wireless sensored network having increased
energy efficiency is the hot research area nowadays. In
recent years sensored network has reach the most of fields
like medical monitoring, environment monitoring, habitat
monitoring, home security system etc. The future is not for
any when the wireless sensor network will be spreaded over
the large area of the world. Because it is an emerging
technology, at present there are lots of things in WSN which
needs the attention by the researchers. There are many
models which have been introduced and applied to wireless
sensored network for better energy efficiency, network
lifetime, delay, latency, etc. WSN have data centric
architecture compared to ad-hoc network which consist of
node centric architecture. In WSN there is no IP address
scheme for each node because it has densely deployed
sensor nodes in its large area. Due to these unique features
of WSN protocol design is very important parameter in
WSN. By designing proper routing protocol one can utilize
the limited resources of the network.
There are many types of routing protocols in wireless sensor
network, which are classified as follows:
1. Flooding and gossiping
Flooding and gossiping is the basic routing protocols of
WSN. In flooding each node broadcast the receiving packets
to all its neighbour and this process is continued until the
packets has been reached to its destination.
2. Directed diffusionIt uses the attribute value pairs of the
data and queries the sensors in an on demand basis. It
diffuses data through sensor nodes by using a scheme of
naming to the data.
3. Rumour routing
It is similar to the directed diffusion but it is mostly
applicable where geographic routing conditions are not
preferred.
4. Gradient based routing
It is also a changed version of directed diffusion.
In GBR the number of hopes when node is diffused in the
network is recorded. So, each node will discover the
minimum number of hops to the sink which is known as the
height of that node.
“The difference between node’s height and that of its
neighbour is called gradient on that link.”[2]
And the packet is forwarded on a link which has largest
gradient.
5. Energy aware routing
Energy aware routing is based on the stochastic model.
In this scheme the set of sub optimal path is used to increase
the lifetime of a network.
It says that using minimum energy path every time will
dissipate the energy of nodes on that path. Instead, we can
use multiple paths with some probability which in turn
increase the lifetime of the network.
6. Hierarchical protocols
Network scalability is the major issue in designing a
wireless sensor network.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 617
As the network area and nodes density increases there may
be overload in single tire network. This overload causes
latency and unnecessary tracking of events. Other thing is
that single tire network is not scalable for a large set of
sensors in large area and there is a problem of service
degradation. To overcome all these problems the
hierarchical routing approach is used in some of the
protocols of WSN. It maintains the energy consumption of
the nodes using multi hop communication forming a cluster
of nodes. LEACH (lower energy adaptive clustering
hierarchy) is the first routing protocol invented for the
hierarchical routing.
This routing protocol has inspired many other hierarchical
routing protocols like PEGASIS, TEEN, APTEEN, etc. In
the next section we will explore the different hierarchical
routing protocols.
2. HIERARCHICAL ROUTING PROTOCOLS
2.1 Leach
LEACH is the first hierarchical routing protocol used for
wireless sensored network. LEACH uses adaptive clustering
scheme for the communication between nodes. It uses
TDMA scheme for the timeline operation LEACH can
prolong the network lifetime with a proportion of 15%.
LEACH forms the clusters head. The nodes which want to
communicate with other nodes will not directly
communicate but it will be communicated via cluster heads.
In each TDMA frame in each round the cluster head nodes
will be changed. The selection of cluster heads will be done
by the following equation:
𝑇 𝑛 =
p
1 − p. rmod
1
p
, n ∈ G
Where P= percentage of cluster heads
R=the current round
G= set of nodes that haven’t been cluster heads in the last
1/P rounds.
Here, T(n) is the threshold value of the selection of cluster
heads in each round. Cluster heads are produced according
to this equation the sensor node generate a random number
between 0 and 1, if the number is smaller than the threshold
T(n), then the node is selected as cluster head
Fig-1: Flow chart for CH selection
As shown in figure the node will become cluster head when
its energy is higher than the energy of other nodes. The CH
node will send the joining request message to all common
nodes in its cluster. The common nodes will decide to join
or not the CH. After getting acknowledgement from
common nodes CH will assign TDMA scheme to all nodes.
In this way the LEACH protocol will work using clustering
scheme. Some features of LEACH protocol is as follows.
1. LEACH protocol randomly selects cluster heads in each
round. So, to become CH using quickly some nodes will
dissipate energy very fast to be selected as a cluster head
more times.
2. In LEACH cluster heads directly communicate with sink.
So, the energy consumption between CH and sink in greater
than the energy consumption of communication between
CH’s.
3. LEACH has great improvement in energy consumption
great improvement in energy consumption of direct
communication because it uses clustering hierarchy and also
it is not a single tire communication as direct diffusion
scheme or gossiping and flooding scheme.
4. Though LEACH has improved the energy consumption,
further improvement is needed as the unbalanced energy
load and large unnecessary energy dissipation. It is caused
by the randomicity in electing cluster-head nodes.
5. There is an extra energy dissipation, because in each
round nodes acting as CH will consume a lot of energy to
transmit data to far distance base station.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 618
Fig-2: architecture of LEACH protocol
2.2 Pegasis
The improvement of LEACH protocol is PEGASIS (power
efficient gathering in sensor information system). It makes
the chain of nodes instead of making clusters of it. The
farther node will transmit the data via its neighbour node
and in this way chain is created. The last node in the chain is
called the leader node which will transmit all the data to sink
(base station).
LEADER NODE
a0 a1 a2 a3 a4 a5 a6
BASE STATION
Fig-3: PEGASIS protocol
As shown in figure the nodes a0 to a6 are the chain partners
for data transmission. Here a3 is the leader node which will
transfer all the data to base station (sink).
Features of PEGASIS
1. PEGASIS uses multihop routing by forming chains and
use only one node to transmit to the Base station.
2. Compare to LEACH protocol PRGASIS has been shown
performance of about 100-300% for different network
topologies of WSN.
3. Compare to LEACH protocol the lifetime of a PEGASIS
is long.
4. In PEGASIS there is only one node which does the data
aggregation and data fusion. So, compared to LEACH where
each cluster head is taking part in communication with base
station. So, in turn the energy will also be dissipated by each
cluster head, PEGASIS will dissipate less energy because
only leader node in chain will actively take part in data
aggregation and data fusion.
5. In PEGASIS each node should be aware of the remaining
energy status of its neighbours.
6. Compare to LEACH, PEGASIS removes the energy
dissipated by the reformation of cluster in each round.
7. In PEGASIS, if node death occurs, the chain must be
rebuilt which increases the energy consumption.
8. Node far away from the leader node will forward the data
many times by the chain which causes the long time delay.
So, there is a problem of time delay in PEGASIS protocol
which should be improved.
2.3 TEEN and APTEEN (Threshold sensitive
energy efficient sensor network)
These protocols are bit different from LEACH and
PEGASIS protocols because it uses the sensored attributes
such as temporary for communication. These protocols are
very useful in time critical applications, where wireless
network is reactive. In LEACH and PEGASIS the network
is proactive where there is no event driven things occur
where as in reactive network the things which are event
driven which are sensitive to nodes sensitivity like
temperature, weather or any other environmental conditions.
TEEN uses hierarchical network architecture with data
centric mechanism. The figure shows the mechanism of
cluster forming in TEEN and APTEEN. As shown in figure
clusters are formed and this process of formation of cluster
is continued to the second level till the base station (sink) is
reached. There are two types of thresholds: hard and soft.
After formation of cluster head’s the cluster head will
broadcast the threshold to the common nodes in its clusters.
The first threshold sent to all nodes by cluster head is hard
threshold which is the minimum value of sensory attributes
to trigger node for switching on its transmitter. So,
transmission occurs only when the node’s sensed attribute in
turn lower the number of transmissions. Once, the node had
sensed a value beyond hard threshold, it only transmits a
data when value of sensed attribute changes by an amount
equal or greater than the soft threshold. So, soft threshold
will also decreases the number of transmissions.
Fig-4:TEEN/APTEEN protocol architecture
APTEENC Adaptive threshold sensitive energy efficient
sensor network protocol is extension of TEEN.
Features of TEEN and APTEEN
1. TEEN is not applicable where periodic reports are needed
because it is based on thresholds.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 619
2. The APTEEN gives the facilities which TEEN does not
gives as follows:
 Analysing past data values
 Taking snapshot view of the network.
 To monitor an event for a period of time.
3. In APTEEN cluster head’s broadcast the attributes the
threshold values and schedule of transmission of all nodes.
4. TEEN and APTEEN gives better performance than
LEACH. Energy dissipation of APTEEN is in between of
LEACH and TEEN.
5. Compared to LEACH, TEEN/APTEEN has overhead and
complexity of cluster formation and problem of giving
threshold based functions.
3. CONCLUSION AND FUTURE SCOPE
From the analysis of the different routing protocols we have
shown that there is further need of improvement in LEACH
protocol as compared to PEGASIS and TEEN/APTEEN
protocols. The table shown below gives the comparison of
these four protocols.
Table-1: Protols and their Parameters
LEACH PEGASI
S
TEEN/APTEE
N
DATA
DELIVERY
MODEL
CLUSTE
R HEAD
CHAIN
BASED
ACTIVE
THRESHOLD
DATA
AGGREGATIO
N
YES NO YES
POWER
USAGE
HIGH MAX HIGH
SCALABILITY GOOD GOOD GOOD
QUALITY OF
SERVICE
NO NO GOOD
NETWORK
LIFETIME
GOOD VERY
GOOD
VERY GOOD
RESOURCE
AWARENESS
YES YES YES
From chart-1 shown below we can see that when first node
dies the energy dissipation of LEACH is very much poor, so
in terms of energy dissipation and network lifetime there is a
lot more to do research work. Also researchers can futher
make improvements in PEGASIA in terms of time delay.
There are many open issues in WSN for improving the
routing algorithms of LEACH, PEGASIS, TEEN/APTEEN.
Chart-1:Dead nodes VS Lifetime of nodes
REFERENCES
[1] Kemal Akkaya, Mohamed Younis, “A survey on routing
protocols for wireless sensor networks”, 26 November 2003.
[2] Tintu Devasia, Gopika S, “Statistical Analysis of Energy
Efficient Hierarchical Routing Protocols in WSN”,
International Journal of Advanced Research in Computer
and Communication Engineering, Vol. 2, Issue 5, May
2013.
[3] Fan Xiangning, Song Yulin, “Improvement on LEACH
Protocol of Wireless Sensor Network”, 2007 International
Conference on Sensor Technologies and Applications,
IEEE.
[4] Mu Tong, Minghao Tang, “LEACH-B:An Improved
LEACH Protocol for Wireless Sensor Network”, 978-1-
4244-3709, 2010 IEEE.
[5]Jindal V, Verma AK And Bawa S, “How The Two
Adhoc Networks Can Be Different: Manet & WSNs”,
International Journal Of Computer Science & Technology,
2011, 2(4), 122-126.
[6]Wang J, yang G and Chen S,“Secure Leach Routing
Protocol Based On Low-Power Cluster-Head Selection
Algorithm For Wireless Sensor Networks”, International
Symposium On Intelligent Signal Processing And
Communication Systems, 2007, 341-344.
[7]Liu Y, Gao J, Jia Y and Zhu L, “A Cluster Maintenance
Algorithm Based on LEACH-DCHS Protoclol”,
International Conference on Networking, Architecture, and
Storage, 2008, 165-166.
[8]Junping h, Yuhui J and Liang D, “A Time-based Cluster-
Head Selection Algorithm for LEACH”, In Computer and
Communication, 2008.
[9]Zhixiang D and Bensheng Q, “Three-layered routing
protocol for WSN based on LEACH algorithm”, IEEE
Xplore, 2007, 72-75.
[10]Tong M and tang M, “LEACH-B: An Improved
LEACH Protocol for Wireless Sensor Network”, 6th
International Conference on Wireless Communications
Networking and Mobile Computing, 2010.
[11]Heinzelman WB, Chandraskan PA and Blakrisshnan H,
"An Application-Specific Protocol Architecture for Wireless
0%
20%
40%
60%
80%
100%
FND HNA LND
200 450 500
350 700
900
500 800
1200
500 1200 2100
TIME
APTEEN
TEEN
PEGASIS
LEACH
PARAMETER
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 620
Microsensor Networks", IEEE Trans. on Wireless
Communication, 2002, 1(4), 660-670.
[12]Zhi-Jun L and La-Yuan L, “Based on Energy Balance
LEACH-DC Protocol Design”, 6th
IEEE Joint International
Conference on Information Technology and Artificial
Intelligence Conference (ITAIC), 2011.
[13]Kumar N And Kaur J, “Improved LEACH Protocol for
Wireless Sensor Networks”, 7th
International Conference
on Wireless Communications, Networking and Mobile
omputing (WiCOM), 2011.
[14]Tang L and Liu S, “Improvement on LEACH Routing
Algorithm for Wireless Sensor Networks”, International
Conference on Internet Computing and Information
Services, 2011.
[15] Sunita Rani, Tarun Gulati, “ An improved PEGASIS
protocol to enhance energy utilization in wireless sensor
network”, International Journal of Advanced Research in
computer science and software engineering, volume:2, Issue
11. November,2012.

More Related Content

What's hot

Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyAli Habeeb
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECYogesh Fulara
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...ijsrd.com
 
clustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHclustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHJimit Rupani
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
 
Performance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksPerformance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksDarpan Dekivadiya
 
Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network dilip pareek
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Routing in Wireless Sensor Network
Routing in Wireless Sensor NetworkRouting in Wireless Sensor Network
Routing in Wireless Sensor NetworkAarthi Raghavendra
 
Leach-Protocol
Leach-ProtocolLeach-Protocol
Leach-Protocolzhendong
 
Qos aware routing protocol for wsn
Qos aware routing protocol for wsnQos aware routing protocol for wsn
Qos aware routing protocol for wsnKamal Patel
 
Review on State-Of-The-Art of PEGASIS Protocol in WSNS
Review on State-Of-The-Art of PEGASIS Protocol in WSNSReview on State-Of-The-Art of PEGASIS Protocol in WSNS
Review on State-Of-The-Art of PEGASIS Protocol in WSNSrahulmonikasharma
 
Energy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolEnergy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolARUNP116
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingHabibur Rahman
 
Energy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksEnergy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksSpandan Spandy
 
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH ProtocolUniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH Protocolidescitation
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 

What's hot (20)

wsn routing protocol
 wsn routing protocol wsn routing protocol
wsn routing protocol
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEEC
 
Leach
LeachLeach
Leach
 
Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
 
clustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHclustering protocol in WSN:LEACH
clustering protocol in WSN:LEACH
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
Performance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksPerformance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor Networks
 
Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Routing in Wireless Sensor Network
Routing in Wireless Sensor NetworkRouting in Wireless Sensor Network
Routing in Wireless Sensor Network
 
Leach-Protocol
Leach-ProtocolLeach-Protocol
Leach-Protocol
 
Qos aware routing protocol for wsn
Qos aware routing protocol for wsnQos aware routing protocol for wsn
Qos aware routing protocol for wsn
 
Review on State-Of-The-Art of PEGASIS Protocol in WSNS
Review on State-Of-The-Art of PEGASIS Protocol in WSNSReview on State-Of-The-Art of PEGASIS Protocol in WSNS
Review on State-Of-The-Art of PEGASIS Protocol in WSNS
 
Energy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolEnergy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocol
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
 
Energy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksEnergy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networks
 
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH ProtocolUniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 

Viewers also liked

EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSijassn
 
An energy efficient protocol based study of wsn to increase the lifetime
An energy efficient protocol based study of wsn to increase the lifetimeAn energy efficient protocol based study of wsn to increase the lifetime
An energy efficient protocol based study of wsn to increase the lifetimeIAEME Publication
 
ECMFA 2015 - Energy Consumption Analysis and Design with Foundational UML
ECMFA 2015 - Energy Consumption Analysis and Design with Foundational UMLECMFA 2015 - Energy Consumption Analysis and Design with Foundational UML
ECMFA 2015 - Energy Consumption Analysis and Design with Foundational UMLLuca Berardinelli
 
Energy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSNEnergy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSNZubin Bhuyan
 
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...divya_prabha
 
Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technologyKapil Dev
 
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...divya_prabha
 

Viewers also liked (10)

EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKSEFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
EFFICIENT HIERARCHICAL ROUTING PROTOCOL IN SENSOR NETWORKS
 
An energy efficient protocol based study of wsn to increase the lifetime
An energy efficient protocol based study of wsn to increase the lifetimeAn energy efficient protocol based study of wsn to increase the lifetime
An energy efficient protocol based study of wsn to increase the lifetime
 
Energy efficient routing protocol
Energy efficient routing protocolEnergy efficient routing protocol
Energy efficient routing protocol
 
ECMFA 2015 - Energy Consumption Analysis and Design with Foundational UML
ECMFA 2015 - Energy Consumption Analysis and Design with Foundational UMLECMFA 2015 - Energy Consumption Analysis and Design with Foundational UML
ECMFA 2015 - Energy Consumption Analysis and Design with Foundational UML
 
Energy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSNEnergy Efficient Data Gathering Protocol in WSN
Energy Efficient Data Gathering Protocol in WSN
 
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...
Report on I-LEACH: An Energy Efficient Routing Protocol in Wireless Sensor Ne...
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technology
 
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
 
Routing
RoutingRouting
Routing
 

Similar to Analysis of different hierarchical routing protocols of wireless sensor network

IRJET- Clustering Protocols in Wireless Sensor Network: A Review
IRJET-  	  Clustering Protocols in Wireless Sensor Network: A ReviewIRJET-  	  Clustering Protocols in Wireless Sensor Network: A Review
IRJET- Clustering Protocols in Wireless Sensor Network: A ReviewIRJET Journal
 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolIJTET Journal
 
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...IJSRED
 
An energy saving algorithm to prolong
An energy saving algorithm to prolongAn energy saving algorithm to prolong
An energy saving algorithm to prolongijwmn
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Editor IJCATR
 
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKSIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKijngnjournal
 
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor NetworkSimulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Networkjosephjonse
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
 
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...IRJET Journal
 
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor NetworksEnergy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor NetworksIRJET Journal
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
Cluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor NetworksCluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor Networkseditor1knowledgecuddle
 
Review of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor NetworkReview of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor Networkijsrd.com
 
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...IJCNCJournal
 
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...IJERD Editor
 

Similar to Analysis of different hierarchical routing protocols of wireless sensor network (20)

F04623943
F04623943F04623943
F04623943
 
IRJET- Clustering Protocols in Wireless Sensor Network: A Review
IRJET-  	  Clustering Protocols in Wireless Sensor Network: A ReviewIRJET-  	  Clustering Protocols in Wireless Sensor Network: A Review
IRJET- Clustering Protocols in Wireless Sensor Network: A Review
 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
 
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
 
An energy saving algorithm to prolong
An energy saving algorithm to prolongAn energy saving algorithm to prolong
An energy saving algorithm to prolong
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
 
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKSIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
 
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor NetworkSimulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
 
B045070510
B045070510B045070510
B045070510
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
 
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor NetworksEnergy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
Cluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor NetworksCluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor Networks
 
Review of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor NetworkReview of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor Network
 
A04560105
A04560105A04560105
A04560105
 
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
 
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
 

More from eSAT Journals

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case studyeSAT Journals
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementeSAT Journals
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteeSAT Journals
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Journals
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and VisualizationKIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and VisualizationDr. Radhey Shyam
 
Scaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageScaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageRCC Institute of Information Technology
 
Explosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdfExplosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdf884710SadaqatAli
 
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfA CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfKamal Acharya
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdfKamal Acharya
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdfKamal Acharya
 
Electrostatic field in a coaxial transmission line
Electrostatic field in a coaxial transmission lineElectrostatic field in a coaxial transmission line
Electrostatic field in a coaxial transmission lineJulioCesarSalazarHer1
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdfKamal Acharya
 
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical SolutionsRS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical SolutionsAtif Razi
 
Online resume builder management system project report.pdf
Online resume builder management system project report.pdfOnline resume builder management system project report.pdf
Online resume builder management system project report.pdfKamal Acharya
 
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...Amil baba
 
Natalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in KrakówNatalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in Krakówbim.edu.pl
 
Peek implant persentation - Copy (1).pdf
Peek implant persentation - Copy (1).pdfPeek implant persentation - Copy (1).pdf
Peek implant persentation - Copy (1).pdfAyahmorsy
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdfAhmedHussein950959
 
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...Amil baba
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfPipe Restoration Solutions
 
A case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfA case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfKamal Acharya
 
Top 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering ScientistTop 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering Scientistgettygaming1
 
retail automation billing system ppt.pptx
retail automation billing system ppt.pptxretail automation billing system ppt.pptx
retail automation billing system ppt.pptxfaamieahmd
 

Recently uploaded (20)

KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and VisualizationKIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
 
Scaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageScaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltage
 
Explosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdfExplosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdf
 
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfA CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Electrostatic field in a coaxial transmission line
Electrostatic field in a coaxial transmission lineElectrostatic field in a coaxial transmission line
Electrostatic field in a coaxial transmission line
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdf
 
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical SolutionsRS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
 
Online resume builder management system project report.pdf
Online resume builder management system project report.pdfOnline resume builder management system project report.pdf
Online resume builder management system project report.pdf
 
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
 
Natalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in KrakówNatalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in Kraków
 
Peek implant persentation - Copy (1).pdf
Peek implant persentation - Copy (1).pdfPeek implant persentation - Copy (1).pdf
Peek implant persentation - Copy (1).pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...
NO1 Pandit Black Magic Removal in Uk kala jadu Specialist kala jadu for Love ...
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
A case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfA case study of cinema management system project report..pdf
A case study of cinema management system project report..pdf
 
Top 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering ScientistTop 13 Famous Civil Engineering Scientist
Top 13 Famous Civil Engineering Scientist
 
retail automation billing system ppt.pptx
retail automation billing system ppt.pptxretail automation billing system ppt.pptx
retail automation billing system ppt.pptx
 

Analysis of different hierarchical routing protocols of wireless sensor network

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 616 ANALYSIS OF DIFFERENT HIERARCHICAL ROUTING PROTOCOLS OF WIRELESS SENSOR NETWORK Dipti Balkrushna Ram1 , Grishma Shaileshkumar Shah2 1,2 Master of engineering, Electronics and Communication, SAL Institute of technology and engineering research, Gujarat, India , Abstarct Wireless sensored network is nowadays very popular in the field of research because world is now switching faster from wired communication to the wireless communication. It is used in environment monitoring, habitat monitoring, battlefield etc. WSN is made up of tiny sensor nodes which senses the data and communicate to the base station via other nodes.WSN networks are data- centric rather than node centric. So, main issues in WSN networks are energy consumption of network, lifetime of a network, delay, latency, quality of service etc.WSN has defined many routing protocols for the network. The main challenge in WSN is to design a routing protocol which gives the maximum energy efficient routing because nodes in sensored network are equipped with the battery. So, as time passes the battery of nodes will decrease so in turn network lifetime will decreases. There are many routing protocols which are classified as their working and their application to different conditions. This paper describes a brief information about routing protocols. The main focus of this paper is to give the comparison of different hierarchical routing protocols. Keywords: Leach, Pegasis,Teen/Apteen, WSN -------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION Designing of a wireless sensored network having increased energy efficiency is the hot research area nowadays. In recent years sensored network has reach the most of fields like medical monitoring, environment monitoring, habitat monitoring, home security system etc. The future is not for any when the wireless sensor network will be spreaded over the large area of the world. Because it is an emerging technology, at present there are lots of things in WSN which needs the attention by the researchers. There are many models which have been introduced and applied to wireless sensored network for better energy efficiency, network lifetime, delay, latency, etc. WSN have data centric architecture compared to ad-hoc network which consist of node centric architecture. In WSN there is no IP address scheme for each node because it has densely deployed sensor nodes in its large area. Due to these unique features of WSN protocol design is very important parameter in WSN. By designing proper routing protocol one can utilize the limited resources of the network. There are many types of routing protocols in wireless sensor network, which are classified as follows: 1. Flooding and gossiping Flooding and gossiping is the basic routing protocols of WSN. In flooding each node broadcast the receiving packets to all its neighbour and this process is continued until the packets has been reached to its destination. 2. Directed diffusionIt uses the attribute value pairs of the data and queries the sensors in an on demand basis. It diffuses data through sensor nodes by using a scheme of naming to the data. 3. Rumour routing It is similar to the directed diffusion but it is mostly applicable where geographic routing conditions are not preferred. 4. Gradient based routing It is also a changed version of directed diffusion. In GBR the number of hopes when node is diffused in the network is recorded. So, each node will discover the minimum number of hops to the sink which is known as the height of that node. “The difference between node’s height and that of its neighbour is called gradient on that link.”[2] And the packet is forwarded on a link which has largest gradient. 5. Energy aware routing Energy aware routing is based on the stochastic model. In this scheme the set of sub optimal path is used to increase the lifetime of a network. It says that using minimum energy path every time will dissipate the energy of nodes on that path. Instead, we can use multiple paths with some probability which in turn increase the lifetime of the network. 6. Hierarchical protocols Network scalability is the major issue in designing a wireless sensor network.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 617 As the network area and nodes density increases there may be overload in single tire network. This overload causes latency and unnecessary tracking of events. Other thing is that single tire network is not scalable for a large set of sensors in large area and there is a problem of service degradation. To overcome all these problems the hierarchical routing approach is used in some of the protocols of WSN. It maintains the energy consumption of the nodes using multi hop communication forming a cluster of nodes. LEACH (lower energy adaptive clustering hierarchy) is the first routing protocol invented for the hierarchical routing. This routing protocol has inspired many other hierarchical routing protocols like PEGASIS, TEEN, APTEEN, etc. In the next section we will explore the different hierarchical routing protocols. 2. HIERARCHICAL ROUTING PROTOCOLS 2.1 Leach LEACH is the first hierarchical routing protocol used for wireless sensored network. LEACH uses adaptive clustering scheme for the communication between nodes. It uses TDMA scheme for the timeline operation LEACH can prolong the network lifetime with a proportion of 15%. LEACH forms the clusters head. The nodes which want to communicate with other nodes will not directly communicate but it will be communicated via cluster heads. In each TDMA frame in each round the cluster head nodes will be changed. The selection of cluster heads will be done by the following equation: 𝑇 𝑛 = p 1 − p. rmod 1 p , n ∈ G Where P= percentage of cluster heads R=the current round G= set of nodes that haven’t been cluster heads in the last 1/P rounds. Here, T(n) is the threshold value of the selection of cluster heads in each round. Cluster heads are produced according to this equation the sensor node generate a random number between 0 and 1, if the number is smaller than the threshold T(n), then the node is selected as cluster head Fig-1: Flow chart for CH selection As shown in figure the node will become cluster head when its energy is higher than the energy of other nodes. The CH node will send the joining request message to all common nodes in its cluster. The common nodes will decide to join or not the CH. After getting acknowledgement from common nodes CH will assign TDMA scheme to all nodes. In this way the LEACH protocol will work using clustering scheme. Some features of LEACH protocol is as follows. 1. LEACH protocol randomly selects cluster heads in each round. So, to become CH using quickly some nodes will dissipate energy very fast to be selected as a cluster head more times. 2. In LEACH cluster heads directly communicate with sink. So, the energy consumption between CH and sink in greater than the energy consumption of communication between CH’s. 3. LEACH has great improvement in energy consumption great improvement in energy consumption of direct communication because it uses clustering hierarchy and also it is not a single tire communication as direct diffusion scheme or gossiping and flooding scheme. 4. Though LEACH has improved the energy consumption, further improvement is needed as the unbalanced energy load and large unnecessary energy dissipation. It is caused by the randomicity in electing cluster-head nodes. 5. There is an extra energy dissipation, because in each round nodes acting as CH will consume a lot of energy to transmit data to far distance base station.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 618 Fig-2: architecture of LEACH protocol 2.2 Pegasis The improvement of LEACH protocol is PEGASIS (power efficient gathering in sensor information system). It makes the chain of nodes instead of making clusters of it. The farther node will transmit the data via its neighbour node and in this way chain is created. The last node in the chain is called the leader node which will transmit all the data to sink (base station). LEADER NODE a0 a1 a2 a3 a4 a5 a6 BASE STATION Fig-3: PEGASIS protocol As shown in figure the nodes a0 to a6 are the chain partners for data transmission. Here a3 is the leader node which will transfer all the data to base station (sink). Features of PEGASIS 1. PEGASIS uses multihop routing by forming chains and use only one node to transmit to the Base station. 2. Compare to LEACH protocol PRGASIS has been shown performance of about 100-300% for different network topologies of WSN. 3. Compare to LEACH protocol the lifetime of a PEGASIS is long. 4. In PEGASIS there is only one node which does the data aggregation and data fusion. So, compared to LEACH where each cluster head is taking part in communication with base station. So, in turn the energy will also be dissipated by each cluster head, PEGASIS will dissipate less energy because only leader node in chain will actively take part in data aggregation and data fusion. 5. In PEGASIS each node should be aware of the remaining energy status of its neighbours. 6. Compare to LEACH, PEGASIS removes the energy dissipated by the reformation of cluster in each round. 7. In PEGASIS, if node death occurs, the chain must be rebuilt which increases the energy consumption. 8. Node far away from the leader node will forward the data many times by the chain which causes the long time delay. So, there is a problem of time delay in PEGASIS protocol which should be improved. 2.3 TEEN and APTEEN (Threshold sensitive energy efficient sensor network) These protocols are bit different from LEACH and PEGASIS protocols because it uses the sensored attributes such as temporary for communication. These protocols are very useful in time critical applications, where wireless network is reactive. In LEACH and PEGASIS the network is proactive where there is no event driven things occur where as in reactive network the things which are event driven which are sensitive to nodes sensitivity like temperature, weather or any other environmental conditions. TEEN uses hierarchical network architecture with data centric mechanism. The figure shows the mechanism of cluster forming in TEEN and APTEEN. As shown in figure clusters are formed and this process of formation of cluster is continued to the second level till the base station (sink) is reached. There are two types of thresholds: hard and soft. After formation of cluster head’s the cluster head will broadcast the threshold to the common nodes in its clusters. The first threshold sent to all nodes by cluster head is hard threshold which is the minimum value of sensory attributes to trigger node for switching on its transmitter. So, transmission occurs only when the node’s sensed attribute in turn lower the number of transmissions. Once, the node had sensed a value beyond hard threshold, it only transmits a data when value of sensed attribute changes by an amount equal or greater than the soft threshold. So, soft threshold will also decreases the number of transmissions. Fig-4:TEEN/APTEEN protocol architecture APTEENC Adaptive threshold sensitive energy efficient sensor network protocol is extension of TEEN. Features of TEEN and APTEEN 1. TEEN is not applicable where periodic reports are needed because it is based on thresholds.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 619 2. The APTEEN gives the facilities which TEEN does not gives as follows:  Analysing past data values  Taking snapshot view of the network.  To monitor an event for a period of time. 3. In APTEEN cluster head’s broadcast the attributes the threshold values and schedule of transmission of all nodes. 4. TEEN and APTEEN gives better performance than LEACH. Energy dissipation of APTEEN is in between of LEACH and TEEN. 5. Compared to LEACH, TEEN/APTEEN has overhead and complexity of cluster formation and problem of giving threshold based functions. 3. CONCLUSION AND FUTURE SCOPE From the analysis of the different routing protocols we have shown that there is further need of improvement in LEACH protocol as compared to PEGASIS and TEEN/APTEEN protocols. The table shown below gives the comparison of these four protocols. Table-1: Protols and their Parameters LEACH PEGASI S TEEN/APTEE N DATA DELIVERY MODEL CLUSTE R HEAD CHAIN BASED ACTIVE THRESHOLD DATA AGGREGATIO N YES NO YES POWER USAGE HIGH MAX HIGH SCALABILITY GOOD GOOD GOOD QUALITY OF SERVICE NO NO GOOD NETWORK LIFETIME GOOD VERY GOOD VERY GOOD RESOURCE AWARENESS YES YES YES From chart-1 shown below we can see that when first node dies the energy dissipation of LEACH is very much poor, so in terms of energy dissipation and network lifetime there is a lot more to do research work. Also researchers can futher make improvements in PEGASIA in terms of time delay. There are many open issues in WSN for improving the routing algorithms of LEACH, PEGASIS, TEEN/APTEEN. Chart-1:Dead nodes VS Lifetime of nodes REFERENCES [1] Kemal Akkaya, Mohamed Younis, “A survey on routing protocols for wireless sensor networks”, 26 November 2003. [2] Tintu Devasia, Gopika S, “Statistical Analysis of Energy Efficient Hierarchical Routing Protocols in WSN”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 2, Issue 5, May 2013. [3] Fan Xiangning, Song Yulin, “Improvement on LEACH Protocol of Wireless Sensor Network”, 2007 International Conference on Sensor Technologies and Applications, IEEE. [4] Mu Tong, Minghao Tang, “LEACH-B:An Improved LEACH Protocol for Wireless Sensor Network”, 978-1- 4244-3709, 2010 IEEE. [5]Jindal V, Verma AK And Bawa S, “How The Two Adhoc Networks Can Be Different: Manet & WSNs”, International Journal Of Computer Science & Technology, 2011, 2(4), 122-126. [6]Wang J, yang G and Chen S,“Secure Leach Routing Protocol Based On Low-Power Cluster-Head Selection Algorithm For Wireless Sensor Networks”, International Symposium On Intelligent Signal Processing And Communication Systems, 2007, 341-344. [7]Liu Y, Gao J, Jia Y and Zhu L, “A Cluster Maintenance Algorithm Based on LEACH-DCHS Protoclol”, International Conference on Networking, Architecture, and Storage, 2008, 165-166. [8]Junping h, Yuhui J and Liang D, “A Time-based Cluster- Head Selection Algorithm for LEACH”, In Computer and Communication, 2008. [9]Zhixiang D and Bensheng Q, “Three-layered routing protocol for WSN based on LEACH algorithm”, IEEE Xplore, 2007, 72-75. [10]Tong M and tang M, “LEACH-B: An Improved LEACH Protocol for Wireless Sensor Network”, 6th International Conference on Wireless Communications Networking and Mobile Computing, 2010. [11]Heinzelman WB, Chandraskan PA and Blakrisshnan H, "An Application-Specific Protocol Architecture for Wireless 0% 20% 40% 60% 80% 100% FND HNA LND 200 450 500 350 700 900 500 800 1200 500 1200 2100 TIME APTEEN TEEN PEGASIS LEACH PARAMETER
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 620 Microsensor Networks", IEEE Trans. on Wireless Communication, 2002, 1(4), 660-670. [12]Zhi-Jun L and La-Yuan L, “Based on Energy Balance LEACH-DC Protocol Design”, 6th IEEE Joint International Conference on Information Technology and Artificial Intelligence Conference (ITAIC), 2011. [13]Kumar N And Kaur J, “Improved LEACH Protocol for Wireless Sensor Networks”, 7th International Conference on Wireless Communications, Networking and Mobile omputing (WiCOM), 2011. [14]Tang L and Liu S, “Improvement on LEACH Routing Algorithm for Wireless Sensor Networks”, International Conference on Internet Computing and Information Services, 2011. [15] Sunita Rani, Tarun Gulati, “ An improved PEGASIS protocol to enhance energy utilization in wireless sensor network”, International Journal of Advanced Research in computer science and software engineering, volume:2, Issue 11. November,2012.