SlideShare a Scribd company logo
1 of 6
Download to read offline
Load Stabilizing and Energy Conserving Routing
Protocol for Wireless Sensor Networks
Janakiraman V.
M.E(Computer Science and Engineering)
Sree Sowdambika College of Engineering
Aruppukottai, Tamilnadu, India.
Mr. G.Vadivel Murugan M.E.,
Assistant Professor
Dept of Computer Science and Engineering
Sree Sowdambika College of Engineering
Aruppukottai, Tamilnadu, India.
Mr. M.Senthil Kumar M.Tech.,
Assistant Professor
Dept of Computer Science and Engineering
Sree Sowdambika College of Engineering
Aruppukottai, Tamilnadu, India.
Abstract— Wireless sensor network (WSN) is a system consists
of a massive collection of low-cost micro-sensors. WSN is used to
gather and send various types of the messages to a base station
(BS). WSN consists of low-cost nodes with limited battery
capacity, and replacement of the battery is not easy for WSN
with thousands of physically connected nodes, which means
energy conserving routing protocol should be employed to offer a
long-life work time. To accomplish the aim, we need not only to
minimize total energy utilization but also to balance WSN load.
Research workers have recommended many protocols such as
LEACH, HEED, TBC, PEGASIS and PEDAP. In this paper, we
suggest a Load Stabilizing Tree Based Energy Conserving
Routing Protocol(LSTEC ) which constructs a routing tree using
a process where as each round BS assigns a root node and
transmits this selection to all sensor nodes. Eventually, each node
chooses its parent by contemplating only itself and its neighbors'
information, thus making LSTEC a dynamic protocol.
Simulation results show that LSTEC has a better performance
than other protocols in balancing energy utilization, thus
extending the lifetime of WSN.
Keywords—Energy utilization, Load balance, Network lifetime,
Routing protocol, Tree based, Wireless Sensor Network.
I. INTRODUCTION
Generally, wireless sensor nodes are located
arbitrarily and tightly coupled in a target area, especially
where the physical environment is too hard that the macro-
sensor counterparts cannot be deployed. After deployment, if
there is no sufficient battery power, the network cannot work
properly [1], [2], [3]. In general, WSN may generate quite a
large amount of data, so if data fusion could be used, the
throughput could be decreased [4]. Because sensor nodes are
deployed densely, WSN might produce redundant data from
multiple nodes, and the redundant data can be unified to
reduce communication. Many familiar protocols execute data
fusion, but almost all of them suppose that the length of the
message dispatched by each relay node should be constant,
i.e., each node sends the same amount of data no matter how
much data it sustains from its child nodes[10].
PEDAP [7] and PEGASIS [8] are conventional protocols
based on this supposition and perform far better than HEED
and LEACH in this case. However, there are quite a few
applications in which the length of the message transferred by
a parent node depends not only on the length of its own, but
also on the length of the messages received from its child
nodes [10].
Energy consumption of a node is due to either “useful” or
"wasteful" operations. The useful operations include
transmitting or receiving data messages, and processing
requests. On the other hand, the wasteful consumption is due
to the operation of routing tree construction, overhearing,
retransmitting because of rasping environment, and dealing
with redundant broadcast overhead messages.
In this paper, we propose Load Stabilizing Tree Based
Energy Conserving Routing Protocol (LSTEC).We
contemplates a situation in which the network collects data
periodically from a location where each node continuously
senses the environment and sends the data back to BS [9].
In General there are two definitions for network lifetime:
a) The starting time of the network operation to the
death of the first node in the network [8].
b) The starting time of the network operation to the
death of the last node in the network.
In this paper, we agree with the first definition. Moreover,
we consider two exceptional cases in data fusion:
Case (1) The data between any sensor nodes can be
fused totally. Each node sends the same volume of data that
does not matter how much data it receives from its child
nodes.
Case (2) The data cannot be fused. The length of
the message transmitted by each relay node is the sum of its
own sensed data and received data from its child nodes.
The rest of the paper is categorized as follows:
Section II related works. The radio models and network of
our proposal are discussed in Section III. Section IV describes
the detailed architecture of LSTEC. In Section V we show our
simulations varied to the simulations of other protocols.
Finally, Section VI conclusion.
II. RELATED WORKS
A major task of WSN is to collect information
periodically from the preferred area and transmit the
information to BS. A simple method to attain this task is that
each sensor node transmits data directly to BS. However,
when BS is sited a long away from the target area, the sensor
nodes will die rapidly due to more energy utilization. On the
other hand, since the gap between each node and BS are
different, direct transmission may lead to unbalanced energy
consumption. To solve these problems, many protocols have
been proposed such as LEACH, PEGASIS, HEED, PEDAP.
Proceedings of International Conference on Advancements in Engineering and Technology
ISBN NO : 978 - 1502893314
www.iaetsd.in
International Association of Engineering and Technology for Skill Development
41
In LEACH [4], [5], for the entire network, nodes are
selected according to a fraction p from all sensor nodes are
fixed to serve as cluster heads (CHs), where p is a design
parameter. The operations of LEACH are split into several
rounds. Each round includes a design phase and a static-state
phase. During the design phase, each node will decide whether
to be a CH or not according to a predefined specification.
After CHs are selected, each of other nodes will choose its
own CH and join the cluster according to the power of many
received messages. Each node will choose the nearest CH.
During the static-state phase, CHs fuse the data received from
their cluster nodes and send the fused data to BS by single-hop
connection. LEACH uses randomization to turn around CHs
for each round in order to consistently allocate the energy
consumption. So LEACH can minimize the amount of data
directly broadcasted to BS and balance WSN load, thus
attaining a factor of 8 times growth compared with direct
transmission.
In [6], the authors proposed a hybrid, energy-
efficient, distributed clustering algorithm (HEED). HEED is
an enhancement of LEACH on the method of CH choosing. In
each round, HEED selects CHs according to the remaining
energy of each node and a secondary parameter such as nodes
proximity to their neighbors or nodes degrees. By iterations
and competition, HEED ensures only one CH within a certain
range, so uniform CHs distribution is achieved across the
network. Compared with LEACH, HEED effectively prolongs
network lifetime and is suitable for situations such as where
each node has different initial energy.
For Case1, LEACH and HEED greatly reduce total
energy consumption. However, LEACH and HEED consume
energy heavily in the head nodes, which makes the head
nodes die quickly. S. Lindsey et al. proposed an algorithm
related to LEACH and it is called PEGASIS [7]. PEGASIS is
a nearly optimal power efficient protocol which uses
GREEDY algorithm to make all the sensor nodes in the
network form a chain. In PEGASIS, the (i mod N)th node is
chosen to be a leader and the leader is the only one which
needs to communicate with BS in round i. N is the total
amount of nodes. Data is collected by starting from both
endpoints of the chain, and transmitted along the chain, and
fused each time it transmits from one node to the next until it
reaches the leader. So PEGASIS sharply reduces the total
amount of data for long-distance transmission and achieves a
better performance than LEACH by 100% to 300% in
terms of network lifetime.
III. NETWORK AND RADIO MODEL
In our work, we assume that the system model
has the following properties:
 Sensor nodes are randomly distributed in the
square field and there is only one BS deployed
far away from the area.
 Sensor nodes are stationary and energy
constrained. Once deployed, they will keep
operating until their energy is exhausted.
 BS is stationary, but it is not energy constrained.
 All sensor nodes have power control capabilities;
each node can change the power level and
communicate with BS directly.
 Sensor nodes are location-aware. A sensor node
can get its location information through other
mechanisms such as GPS or position algorithms.
 Each node has its unique identifier (ID).
For both cases, the medium is assumed to be
symmetric so that the energy required for transmitting a
message from node A to node B or from node B to node A is
the same.
IV. LOAD STABILIZING TREE BASED ENERGY
CONSERVING PROTOCOL
The main aim of LSTEC is to achieve a longer
network lifetime for different applications. In each round, BS
assigns a root node and broadcasts its ID and its coordinates to
all sensor nodes. Then the network computes the path either
by transmitting the path information from BS to sensor nodes
or by having the same tree structure being dynamically and
individually built by each node. For both cases, LSTEC can
change the root and reconstruct the routing tree with short
delay and low energy consumption. Therefore a better
balanced load is achieved compared with the protocols
mentioned in Section II.
The operation of LSTEC is divided into Initial Phase,
Tree Construction Phase, Data Collection and Transmission
Phase, and Information Exchange Phase.
A. Initial Phase
In Initial Phase, the network parameters are
initialized. Initial Phase is divided into three steps.
Step 1: When Initial Phase begins, BS broadcasts a packet to
all the nodes to inform them of beginning time, the
length of time slot and the number of nodes N. When
all the nodes receive the packet, they will compute
their own energy-level (EL) using function:
EL is a parameter for load balance.
Step 2: Each node sends its packet in a circle with a certain
radius during its own time slot after Step 1. For
example, in the time slot, the node whose ID is I will
send out its packet. This packet contains a preamble
and the information such as coordinates and EL of
node i. All the other nodes during this time slot will
monitor the channel, and if some of them are the
neighbors of node i, they can receive this packet and
record the information of node i in memory. After all
nodes send their information, each node records a
table in their memory which contains the information
of all its neighbors.
Step 3: Each node sends a packet which contains all its
neighbors’ information during its own time slot when
Step 2 is over. Then its neighbors can receive this
packet and record the information in memory. The
length of time slots in Steps 2 and 3 is predefined,
Proceedings of International Conference on Advancements in Engineering and Technology
ISBN NO : 978 - 1502893314
www.iaetsd.in
International Association of Engineering and Technology for Skill Development
42
thus when time is up, each node has sent its
information before Initial Phase ended. After Initial
Phase, each node records two tables in memory
which contain the information of all its neighbors and
its neighbors’ neighbors. These two tables are
defined as Table I and Table II.
B. Tree Construction Phase
Within each round, LSTEC performs the following
steps to build a routing tree. Between Case1 and Case2 there
are some differences in the steps of routing tree constructing:
Step 1: BS assigns a node as root and broadcasts root
ID and root coordinates to all sensor nodes.
TABLE I
NETWORK LIFETIMES OF DIFFERENT SCHEMES
For Case1, because data fusion technique is
implemented, only one node which
communicates directly with BS can transmit
all the data with the same length as its own,
which results in much less energy
consumption. In order to balance the
network load for Case1, in each round, a
node with the largest residual energy is
chosen as root. The root collects the data of
all sensors and transmits the fused data to
BS over long distance.
For Case2, because data can’t be fused, it
will not save the energy for data transmitting
by making fewer nodes communicate
directly with BS. When one of the sensor
nodes collects all the data and sends it to BS,
it would deplete its energy quickly. In this
case BS always assigns itself as root.
Step 2: Each node tries to select a parent in
neighbors using EL and coordinates which
are recorded in Table I. The selection
criteria are:
1) For both Case1 and Case2, for a sensor
node, the distance between its parent node
and the root should be shorter than that
between itself and the root.
2) For Case1, each node chooses a neighbor
that satisfies criterion 1 and is the nearest to
itself as its parent. And if the node can’t find
a neighbor which satisfies criterion 1, it
selects the root as its parent.
3) For Case2, the process of Tree
Constructing Phase can be regarded as an
iterative algorithm. Besides criterion 1, for a
sensor node, only the nodes with the largest
EL of all its neighbors and itself can act as
relay nodes. If the sensor node itself has the
largest EL, it can also be considered to be an
imaginary relay node. Choosing the parent
node from all the relay nodes is based on
energy consumptions. Any of these
consumptions is the sum of consumption
from the sensor node to a relay node and
that from the relay node to BS. The relay
node which causes minimum consumption
will be chosen as the parent node. It is true
that this relay node should choose its parent
node in the same way. So a path with
minimum consumption is found by
iterations. And by using EL, LSTEC
chooses the nodes with more residual energy
to transmit data for long distance.
If the sensor node cannot find a suitable parent node,
it will transmit its data directly to BS.
Step 3: Because every node chooses the parent from its
neighbors and every node records its neighbors’
neighbors’ information in Table II, each node can
know all its neighbors’ parent nodes by computing,
and it can also know all its child nodes. If a node has
no child node, it defines itself as a leaf node, from
which the data transmitting begins.
As discussed above, for Case1, because each packet
sent to the parent nodes will be fused, the minimum energy
consumption can be achieved if each node chooses the node
nearest to it. But if all nodes choose their nearest neighbors,
the network may not be able to build a tree. Fig. 1 shows a
network of 100 nodes in this situation. We can find that some
Proceedings of International Conference on Advancements in Engineering and Technology
ISBN NO : 978 - 1502893314
www.iaetsd.in
International Association of Engineering and Technology for Skill Development
43
clusters are formed, but they cannot connect with others. Thus
in LSTEC, we use criterion 1 in Case1 to limit the search
direction. By this approach, a routing tree is constructed and
some nodes still have the possibility of connecting to their
nearest neighbors. For Case2, criterion 1 should also be
obeyed and this criterion helps to save the energy for data
transmitting to a certain extent.
To build a routing tree, for Case1, each node follows the
steps. But for Case2, we use BS to compute the topography.
C. Data Collection and Transmission Phase
After the routing tree is constructed, each sensor node
collects information to generate a DATA_PKT which needs to
be transmitted to BS. For Case1, TDMA and Frequency
Hopping Spread Spectrum (FHSS) are both applied. This
phase is divided into several TDMA time slots. In a time slot,
only the leaf nodes try to send their DATA_PKTs. After a
node receives all the data from its child nodes, this node itself
serves as a leaf node and tries to send the fused data in the
next time slot.
Each TDMA time slot is divided into three segments
as follows (see Fig. 2).
Segment1: The first segment is used to check if there
is communication interference for a parent node. In this
segment, each leaf node sends a beacon which contains its ID
to its parent node at the same time.
Three situations may occur and they divide all the
parent nodes into three kinds. For the first situation, if no leaf
node needs to transmit data to the parent node in this time slot,
it receives nothing. For the second situation, if more than one
leaf node needs to transmit data to the parent node, it receives
an incorrect beacon. For the third situation, if only one leaf
node needs to transmit data to the parent node, it receives a
correct beacon.
Proceedings of International Conference on Advancements in Engineering and Technology
ISBN NO : 978 - 1502893314
www.iaetsd.in
International Association of Engineering and Technology for Skill Development
44
Segment 2: During the second segment, the leaf
nodes which can transmit their data are confirmed. For the
first situation, the parent node turns to sleep mode until next
time slot starts. For the second situation, the parent node sends
a control packet to all its child nodes. This control packet
chooses one of its child nodes to transmit data in the next
segment. For the third situation, the parent node sends a
control packet to this leaf node. This control packet tells this
leaf node to transmit data in the next segment.
Segment 3: The permitted leaf nodes send their data
to their parent nodes, while other leaf nodes turn to sleep
mode. The process in one time slot is shown in Fig. 2.
For Case2, each node chooses its parent by
considering not the distance but the total energy consumption.
In our simulation results, we will show that there may be
many leaf nodes sharing one parent node in one time slot. If
all the leaf nodes try to transmit their data at the same time,
the data messages sent to the same parent node may interfere
with each other. By applying Frequency Division Multiple
Access (FDMA) or Code Division Multiple Access (CDMA),
the schedule generated under competition is able to avoid
collisions. However, the accompanying massive control
packets will cause a large amount of energy to be wasted.
Thus the process may be much simpler. At the beginning of
each round, the operation is also divided into several time
slots. In the ith time slot, the node whose ID is i turns on its
radio and receives the message from BS. BS uses the same
approach to construct the routing tree in each round, and then
BS tells sensor nodes when to send or receive the data.
D. Information Exchange Phase
For Case1, since each node needs to generate and
transmit a DATA_PKT in each round, it may exhaust its
energy and die. The dying of any sensor node can influence
the topography. So the nodes that are going to die need to
inform others. The process is also divided into time slots. In
each time slot, the nodes whose energy is going to be
exhausted will compute a random delay which makes only
one node broadcast in this time slot. When the delay is
ended, these nodes are trying to broadcast a packet to the
whole network. While all other nodes are monitoring the
channel, they will receive this packet and perform an ID
check. Then they modify their tables. If no such packet is
received in the time slot, the network will start the next
round.
For Case2, BS can collect the initial EL and
coordinates information of all the sensor nodes in Initial
Phase. For each round, BS builds the routing tree and the
schedule of the network by using the EL and coordinates
information. Once the routing tree is built, the energy
consumption of each sensor node in this round can be
calculated by BS, thus the information needed for
calculating the topology for the next round can be known in
advance. However, because WSN may be deployed in an
unfriendly environment, the actual EL of each sensor node
may be different from the EL calculated by BS. To cope
with this problem, each sensor node calculates its EL and
detects its actual residual energy in each round. We define
the calculated EL as EL1 and the actual EL as EL2. When
the two ELs of a sensor node are different, the sensor node
generates an error flag and packs the information of actual
residual energy into DATA_PKT, which needs to be sent to
BS. When this DATA_PKT is received, BS will get the
actual residual energy of this sensor node and use it to
calculate the topology in the next round.
V. COMPARATIVE ANALYSIS AND SIMULATION RESULTS
A MATLAB simulation of LSTEC is done for both
Case1 and Case2 to evaluate the performance.
For Case1, we first compare LSTEC with
PEGASIS and use the same network model as PEGASIS.
We generate a randomly distributed 100 to 400 nodes
network of square area 100 m × 100 m with BS located at
(50 m, 175 m) and use DATA_PKT length of 2000 bits and
Proceedings of International Conference on Advancements in Engineering and Technology
ISBN NO : 978 - 1502893314
www.iaetsd.in
International Association of Engineering and Technology for Skill Development
45
CTRL_PKT length of 100 bits. We let each node have 0.25
J initial energy. Fig. 3 and Fig. 4 show the routing tree
generated by LSTEC and PEGASIS for exactly the same
100 node topology.
In Fig. 3 the triangle is root node and in Fig. 4 the
triangle is head node and the rectangle is tail node. As seen,
the routing tree generated by LSTEC is better. Since
PEGASIS uses GREEDY algorithm to form a chain, long
links may exist between parent nodes and child nodes,
which will cause an unbalanced load. As for LSTEC, each
node tends to choose the nearest neighbor to avoid long
links. Fig. 5 shows that the time when the first node dies
changes within a range from 100 nodes to 400 nodes in the
network. We can find that LSTEC performs much better
than PEGASIS and prolongs network lifetime by about
100% to 300% in Fig. 5.
Fig. 5. For Case1, we compare the time when first node dies for
GSTEB and PEGASIS for the number of nodes from 100 to 400.
Fig. 6. For Case1, we compare the time when first node dies for
GSTEB and HEED for the number of nodes from 100 to 400.
In Fig. 6 shows that the time when the first node
dies changes within a range from 100 nodes to 400 nodes in
the network. Clearly, LSTEC performs better than HEED
and prolongs the network lifetime by more than 100%.
VI. CONCLUSIONS
In this work, we introduce LSTEC. Two definitions of
network lifetime and two extreme cases of data fusion are
proposed. The simulations show that when the data
collected by sensors is strongly correlative, LSTEC
outperforms LEACH, PEGASIS and HEED. Because
LSTEC consumes only a small amount of energy in each
round to change the topography for the purpose of balancing
the energy consumption. All the leaf nodes can transmit data
in the same TDMA time slot so that the transmitting delay is
short. When lifetime is defined as the time from the start of
the network operation to the death of the first node in the
network, LSTEC prolongs the lifetime by 100% to 300%
compared with PEGASIS. In some cases, we are more
interested in the lifetime of the last node in the network.
Some slight changes are made to make the performance of
LSTEC similar to that of PEDAP. So LSTEC is nearly the
optimal solution in Case1. When the data collected by
sensors cannot be fused, LSTEC offers another simple
approach to balancing the network load. In fact, it is
difficult to distribute the load evenly on all nodes in such a
case. Even though LSTEC needs BS to compute the
topography, which leads to an increase in energy waste and
a longer delay, this kind of energy waste and longer delay
are acceptable when compared with the energy consumption
and the time delay for data transmitting. Simulation results
show that when lifetime is defined as the time from the start
of the network operation to the death of the first node in the
network, LSTEC prolongs the lifetime of the network by
more than 100% compared with HEED.
REFERENCES
[1] K. Akkaya and M. Younis, “A survey of routing protocols in wireless
sensor networks,” Elsevier Ad Hoc Network J., vol. 3/3, pp. 325–349, 2005.
[2] I. F. Akyildiz et al., “Wireless sensor networks: A survey,” Computer
Netw., vol. 38, pp. 393–422, Mar. 2002.
[3] K. T. Kim and H. Y. Youn, “Tree-Based Clustering(TBC) for energy
efficient wireless sensor networks,” in Proc. AINA 2010, 2010, pp.
680–685.
[4] M. Liu, J. Cao, G. Chen, and X.Wang, “An energy-aware routing
protocol in wireless sensor networks,” Sensors, vol. 9, pp. 445–462, 2009.
[5] W. Liang and Y. Liu, “Online data gathering for maximizing network
lifetime in sensor networks,” IEEE Trans Mobile Computing, vol. 6,
no. 1, pp. 2–11, 2007.
[6] O. Younis and S. Fahmy, “HEED: A hybrid, energy-efficient,
distributed clustering approach for ad hoc sensor networks,” IEEE Trans.
Mobile Computing, vol. 3, no. 4, pp. 660–669, 2004.
[7] S. Lindsey and C. Raghavendra, “Pegasis: Power-efficient gathering in
sensor information systems,” in Proc. IEEE Aerospace Conf., 2002, vol. 3,
pp. 1125–1130.
[8] H. O. Tan and I. Korpeoglu, “Power efficient data gathering and
Aggregation in wireless sensor networks,” SIGMOD Rec., vol. 32, no. 4,
pp. 66–71, 2003.
[9] G. Mankar and S. T. Bodkhe, “Traffic aware energy efficient routing
protocol,” in Proc. 3rd ICECT, 2011, vol. 6, pp. 316–320, .
[10] R. Szewczyk, J. Polastre, A.Mainwaring, and D. Culler, “Lessons
from sensor network expedition,” in Proc. 1st European Workshop on
Wireless Sensor Networks EWSN ‘04, Germany, Jan. 19-21, 2004.
Proceedings of International Conference on Advancements in Engineering and Technology
ISBN NO : 978 - 1502893314
www.iaetsd.in
International Association of Engineering and Technology for Skill Development
46

More Related Content

What's hot

Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)IJCNCJournal
 
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKSIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKijngnjournal
 
The comparison between routing protocols based on lifetime of wireless sensor...
The comparison between routing protocols based on lifetime of wireless sensor...The comparison between routing protocols based on lifetime of wireless sensor...
The comparison between routing protocols based on lifetime of wireless sensor...inventionjournals
 
G-DEEC: GATEWAY BASED MULTI-HOP DISTRIBUTED ENERGY EFFICIENT CLUSTERING PROTO...
G-DEEC: GATEWAY BASED MULTI-HOP DISTRIBUTED ENERGY EFFICIENT CLUSTERING PROTO...G-DEEC: GATEWAY BASED MULTI-HOP DISTRIBUTED ENERGY EFFICIENT CLUSTERING PROTO...
G-DEEC: GATEWAY BASED MULTI-HOP DISTRIBUTED ENERGY EFFICIENT CLUSTERING PROTO...IJCI JOURNAL
 
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...ijasuc
 
34 9141 it ns2-tentative route selection approach for edit septian
34 9141 it  ns2-tentative route selection approach for edit septian34 9141 it  ns2-tentative route selection approach for edit septian
34 9141 it ns2-tentative route selection approach for edit septianIAESIJEECS
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNIJCNCJournal
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECYogesh Fulara
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocolijceronline
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...CSCJournals
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Editor IJCATR
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...graphhoc
 
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Alexander Decker
 

What's hot (16)

Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)
 
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKSIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
 
The comparison between routing protocols based on lifetime of wireless sensor...
The comparison between routing protocols based on lifetime of wireless sensor...The comparison between routing protocols based on lifetime of wireless sensor...
The comparison between routing protocols based on lifetime of wireless sensor...
 
G-DEEC: GATEWAY BASED MULTI-HOP DISTRIBUTED ENERGY EFFICIENT CLUSTERING PROTO...
G-DEEC: GATEWAY BASED MULTI-HOP DISTRIBUTED ENERGY EFFICIENT CLUSTERING PROTO...G-DEEC: GATEWAY BASED MULTI-HOP DISTRIBUTED ENERGY EFFICIENT CLUSTERING PROTO...
G-DEEC: GATEWAY BASED MULTI-HOP DISTRIBUTED ENERGY EFFICIENT CLUSTERING PROTO...
 
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
ENERGY EFFICIENT AGGREGATION WITH DIVERGENT SINK PLACEMENT FOR WIRELESS SENSO...
 
34 9141 it ns2-tentative route selection approach for edit septian
34 9141 it  ns2-tentative route selection approach for edit septian34 9141 it  ns2-tentative route selection approach for edit septian
34 9141 it ns2-tentative route selection approach for edit septian
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEEC
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocol
 
Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & Pegasis
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
H0421043049
H0421043049H0421043049
H0421043049
 
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Eff...
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
 
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...
 

Viewers also liked

Iaetsd purification of water by natural adsorption process
Iaetsd purification of water by natural adsorption processIaetsd purification of water by natural adsorption process
Iaetsd purification of water by natural adsorption processIaetsd Iaetsd
 
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd Iaetsd
 
Linux dan turunanya
Linux dan turunanyaLinux dan turunanya
Linux dan turunanyaArly Hidayat
 
Between  information  retrieval  services  and bibliometrics  research. New  ...
Between  information  retrieval  services  and bibliometrics  research. New  ...Between  information  retrieval  services  and bibliometrics  research. New  ...
Between  information  retrieval  services  and bibliometrics  research. New  ...Andrea Scharnhorst
 
15-minute lesson why borrowing is good
15-minute lesson why borrowing is good15-minute lesson why borrowing is good
15-minute lesson why borrowing is goodFuturum2
 
Iaetsd a survey on detecting denial-of-service attacks
Iaetsd a survey on detecting denial-of-service attacksIaetsd a survey on detecting denial-of-service attacks
Iaetsd a survey on detecting denial-of-service attacksIaetsd Iaetsd
 
Iaetsd enhancing vehicle to vehicle safety message
Iaetsd enhancing vehicle to vehicle safety messageIaetsd enhancing vehicle to vehicle safety message
Iaetsd enhancing vehicle to vehicle safety messageIaetsd Iaetsd
 
Removal of a model textile dye from effluent using fenugreek powder as an ads...
Removal of a model textile dye from effluent using fenugreek powder as an ads...Removal of a model textile dye from effluent using fenugreek powder as an ads...
Removal of a model textile dye from effluent using fenugreek powder as an ads...Iaetsd Iaetsd
 
The Avandia Lawsuit - A Diabetic\'s Legal Heart Attack
The Avandia Lawsuit - A Diabetic\'s Legal Heart AttackThe Avandia Lawsuit - A Diabetic\'s Legal Heart Attack
The Avandia Lawsuit - A Diabetic\'s Legal Heart Attackjuvenilexanadu120
 
Iaetsd artifact facet ranking and
Iaetsd artifact facet ranking andIaetsd artifact facet ranking and
Iaetsd artifact facet ranking andIaetsd Iaetsd
 
Adenike Aiyedun's Cape Argus Article
Adenike Aiyedun's Cape Argus ArticleAdenike Aiyedun's Cape Argus Article
Adenike Aiyedun's Cape Argus ArticleAdenike Aiyedun
 
Actividades de salud y realidad aumentada TIC
Actividades de salud y realidad aumentada TICActividades de salud y realidad aumentada TIC
Actividades de salud y realidad aumentada TICnoegtic
 
ZSSS FBO Ground Handling Agent Shanghai Hongqiao International Airport, China
ZSSS FBO Ground Handling Agent Shanghai Hongqiao International Airport, ChinaZSSS FBO Ground Handling Agent Shanghai Hongqiao International Airport, China
ZSSS FBO Ground Handling Agent Shanghai Hongqiao International Airport, ChinaUniversal Weather and Aviation, Inc.
 
Iaetsd the world’s smallest computer for programmers and app developers
Iaetsd the world’s smallest computer for programmers and app developersIaetsd the world’s smallest computer for programmers and app developers
Iaetsd the world’s smallest computer for programmers and app developersIaetsd Iaetsd
 

Viewers also liked (17)

Iaetsd purification of water by natural adsorption process
Iaetsd purification of water by natural adsorption processIaetsd purification of water by natural adsorption process
Iaetsd purification of water by natural adsorption process
 
Iaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloudIaetsd secure data sharing of multi-owner groups in cloud
Iaetsd secure data sharing of multi-owner groups in cloud
 
Linux dan turunanya
Linux dan turunanyaLinux dan turunanya
Linux dan turunanya
 
Between  information  retrieval  services  and bibliometrics  research. New  ...
Between  information  retrieval  services  and bibliometrics  research. New  ...Between  information  retrieval  services  and bibliometrics  research. New  ...
Between  information  retrieval  services  and bibliometrics  research. New  ...
 
15-minute lesson why borrowing is good
15-minute lesson why borrowing is good15-minute lesson why borrowing is good
15-minute lesson why borrowing is good
 
Iaetsd a survey on detecting denial-of-service attacks
Iaetsd a survey on detecting denial-of-service attacksIaetsd a survey on detecting denial-of-service attacks
Iaetsd a survey on detecting denial-of-service attacks
 
Iaetsd enhancing vehicle to vehicle safety message
Iaetsd enhancing vehicle to vehicle safety messageIaetsd enhancing vehicle to vehicle safety message
Iaetsd enhancing vehicle to vehicle safety message
 
Eamp
EampEamp
Eamp
 
Presentation_NEW.PPTX
Presentation_NEW.PPTXPresentation_NEW.PPTX
Presentation_NEW.PPTX
 
Removal of a model textile dye from effluent using fenugreek powder as an ads...
Removal of a model textile dye from effluent using fenugreek powder as an ads...Removal of a model textile dye from effluent using fenugreek powder as an ads...
Removal of a model textile dye from effluent using fenugreek powder as an ads...
 
The Avandia Lawsuit - A Diabetic\'s Legal Heart Attack
The Avandia Lawsuit - A Diabetic\'s Legal Heart AttackThe Avandia Lawsuit - A Diabetic\'s Legal Heart Attack
The Avandia Lawsuit - A Diabetic\'s Legal Heart Attack
 
Iaetsd artifact facet ranking and
Iaetsd artifact facet ranking andIaetsd artifact facet ranking and
Iaetsd artifact facet ranking and
 
Adenike Aiyedun's Cape Argus Article
Adenike Aiyedun's Cape Argus ArticleAdenike Aiyedun's Cape Argus Article
Adenike Aiyedun's Cape Argus Article
 
Actividades de salud y realidad aumentada TIC
Actividades de salud y realidad aumentada TICActividades de salud y realidad aumentada TIC
Actividades de salud y realidad aumentada TIC
 
Np premis actuacio civica 2015.artur quintana
Np premis actuacio civica 2015.artur quintanaNp premis actuacio civica 2015.artur quintana
Np premis actuacio civica 2015.artur quintana
 
ZSSS FBO Ground Handling Agent Shanghai Hongqiao International Airport, China
ZSSS FBO Ground Handling Agent Shanghai Hongqiao International Airport, ChinaZSSS FBO Ground Handling Agent Shanghai Hongqiao International Airport, China
ZSSS FBO Ground Handling Agent Shanghai Hongqiao International Airport, China
 
Iaetsd the world’s smallest computer for programmers and app developers
Iaetsd the world’s smallest computer for programmers and app developersIaetsd the world’s smallest computer for programmers and app developers
Iaetsd the world’s smallest computer for programmers and app developers
 

Similar to Iaetsd load stabilizing and energy conserving routing

Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolIJTET Journal
 
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR H...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT  HIERARCHICAL CLUSTERING SCHEME FOR  H...MULTI-HOP DISTRIBUTED ENERGY EFFICIENT  HIERARCHICAL CLUSTERING SCHEME FOR  H...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR H...ijfcstjournal
 
A NOVEL ENERGY EFFICIENCY PROTOCOL FOR WSN BASED ON OPTIMAL CHAIN ROUTING
A NOVEL ENERGY EFFICIENCY PROTOCOL FOR WSN BASED ON OPTIMAL CHAIN ROUTINGA NOVEL ENERGY EFFICIENCY PROTOCOL FOR WSN BASED ON OPTIMAL CHAIN ROUTING
A NOVEL ENERGY EFFICIENCY PROTOCOL FOR WSN BASED ON OPTIMAL CHAIN ROUTINGKhushbooGupta145
 
Gateway based stable election
Gateway based stable electionGateway based stable election
Gateway based stable electionijmnct
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Surveyijsrd.com
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
K dag based lifetime aware data collection in wireless sensor networks
K dag based lifetime aware data collection in wireless sensor networksK dag based lifetime aware data collection in wireless sensor networks
K dag based lifetime aware data collection in wireless sensor networksijwmn
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH ProtocolUniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH Protocolidescitation
 
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor NetworksEnergy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor NetworksIRJET Journal
 
Review of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor NetworkReview of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor Networkijsrd.com
 
tankala srinivas, palasa
tankala srinivas, palasatankala srinivas, palasa
tankala srinivas, palasashiva782
 
Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...
Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...
Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...IOSR Journals
 

Similar to Iaetsd load stabilizing and energy conserving routing (20)

Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
 
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR H...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT  HIERARCHICAL CLUSTERING SCHEME FOR  H...MULTI-HOP DISTRIBUTED ENERGY EFFICIENT  HIERARCHICAL CLUSTERING SCHEME FOR  H...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR H...
 
Ed33777782
Ed33777782Ed33777782
Ed33777782
 
A NOVEL ENERGY EFFICIENCY PROTOCOL FOR WSN BASED ON OPTIMAL CHAIN ROUTING
A NOVEL ENERGY EFFICIENCY PROTOCOL FOR WSN BASED ON OPTIMAL CHAIN ROUTINGA NOVEL ENERGY EFFICIENCY PROTOCOL FOR WSN BASED ON OPTIMAL CHAIN ROUTING
A NOVEL ENERGY EFFICIENCY PROTOCOL FOR WSN BASED ON OPTIMAL CHAIN ROUTING
 
Gateway based stable election
Gateway based stable electionGateway based stable election
Gateway based stable election
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
 
Kanchan ppt
Kanchan pptKanchan ppt
Kanchan ppt
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
K dag based lifetime aware data collection in wireless sensor networks
K dag based lifetime aware data collection in wireless sensor networksK dag based lifetime aware data collection in wireless sensor networks
K dag based lifetime aware data collection in wireless sensor networks
 
Jm2416491652
Jm2416491652Jm2416491652
Jm2416491652
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH ProtocolUniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
 
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor NetworksEnergy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
 
Review of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor NetworkReview of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor Network
 
tankala srinivas, palasa
tankala srinivas, palasatankala srinivas, palasa
tankala srinivas, palasa
 
Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...
Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...
Energy Efficient Stable Election Protocol for Clustered Heterogeneous Wireles...
 
ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...
ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...
ENERGY EFFICIENT UNEQUAL CLUSTERING ALGORITHM FOR CLUSTERED WIRELESS SENSOR N...
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
 

More from Iaetsd Iaetsd

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissionIaetsd Iaetsd
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdlIaetsd Iaetsd
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmIaetsd Iaetsd
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...Iaetsd Iaetsd
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatIaetsd Iaetsd
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationIaetsd Iaetsd
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSIaetsd Iaetsd
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...Iaetsd Iaetsd
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bikeIaetsd Iaetsd
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technologyIaetsd Iaetsd
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...Iaetsd Iaetsd
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdIaetsd Iaetsd
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid GrowthIaetsd Iaetsd
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT AlgorithmIaetsd Iaetsd
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...Iaetsd Iaetsd
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...Iaetsd Iaetsd
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesIaetsd Iaetsd
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesIaetsd Iaetsd
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolicIaetsd Iaetsd
 

More from Iaetsd Iaetsd (20)

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdl
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarm
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seat
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan application
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bike
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technology
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic bird
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolic
 

Recently uploaded

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

Iaetsd load stabilizing and energy conserving routing

  • 1. Load Stabilizing and Energy Conserving Routing Protocol for Wireless Sensor Networks Janakiraman V. M.E(Computer Science and Engineering) Sree Sowdambika College of Engineering Aruppukottai, Tamilnadu, India. Mr. G.Vadivel Murugan M.E., Assistant Professor Dept of Computer Science and Engineering Sree Sowdambika College of Engineering Aruppukottai, Tamilnadu, India. Mr. M.Senthil Kumar M.Tech., Assistant Professor Dept of Computer Science and Engineering Sree Sowdambika College of Engineering Aruppukottai, Tamilnadu, India. Abstract— Wireless sensor network (WSN) is a system consists of a massive collection of low-cost micro-sensors. WSN is used to gather and send various types of the messages to a base station (BS). WSN consists of low-cost nodes with limited battery capacity, and replacement of the battery is not easy for WSN with thousands of physically connected nodes, which means energy conserving routing protocol should be employed to offer a long-life work time. To accomplish the aim, we need not only to minimize total energy utilization but also to balance WSN load. Research workers have recommended many protocols such as LEACH, HEED, TBC, PEGASIS and PEDAP. In this paper, we suggest a Load Stabilizing Tree Based Energy Conserving Routing Protocol(LSTEC ) which constructs a routing tree using a process where as each round BS assigns a root node and transmits this selection to all sensor nodes. Eventually, each node chooses its parent by contemplating only itself and its neighbors' information, thus making LSTEC a dynamic protocol. Simulation results show that LSTEC has a better performance than other protocols in balancing energy utilization, thus extending the lifetime of WSN. Keywords—Energy utilization, Load balance, Network lifetime, Routing protocol, Tree based, Wireless Sensor Network. I. INTRODUCTION Generally, wireless sensor nodes are located arbitrarily and tightly coupled in a target area, especially where the physical environment is too hard that the macro- sensor counterparts cannot be deployed. After deployment, if there is no sufficient battery power, the network cannot work properly [1], [2], [3]. In general, WSN may generate quite a large amount of data, so if data fusion could be used, the throughput could be decreased [4]. Because sensor nodes are deployed densely, WSN might produce redundant data from multiple nodes, and the redundant data can be unified to reduce communication. Many familiar protocols execute data fusion, but almost all of them suppose that the length of the message dispatched by each relay node should be constant, i.e., each node sends the same amount of data no matter how much data it sustains from its child nodes[10]. PEDAP [7] and PEGASIS [8] are conventional protocols based on this supposition and perform far better than HEED and LEACH in this case. However, there are quite a few applications in which the length of the message transferred by a parent node depends not only on the length of its own, but also on the length of the messages received from its child nodes [10]. Energy consumption of a node is due to either “useful” or "wasteful" operations. The useful operations include transmitting or receiving data messages, and processing requests. On the other hand, the wasteful consumption is due to the operation of routing tree construction, overhearing, retransmitting because of rasping environment, and dealing with redundant broadcast overhead messages. In this paper, we propose Load Stabilizing Tree Based Energy Conserving Routing Protocol (LSTEC).We contemplates a situation in which the network collects data periodically from a location where each node continuously senses the environment and sends the data back to BS [9]. In General there are two definitions for network lifetime: a) The starting time of the network operation to the death of the first node in the network [8]. b) The starting time of the network operation to the death of the last node in the network. In this paper, we agree with the first definition. Moreover, we consider two exceptional cases in data fusion: Case (1) The data between any sensor nodes can be fused totally. Each node sends the same volume of data that does not matter how much data it receives from its child nodes. Case (2) The data cannot be fused. The length of the message transmitted by each relay node is the sum of its own sensed data and received data from its child nodes. The rest of the paper is categorized as follows: Section II related works. The radio models and network of our proposal are discussed in Section III. Section IV describes the detailed architecture of LSTEC. In Section V we show our simulations varied to the simulations of other protocols. Finally, Section VI conclusion. II. RELATED WORKS A major task of WSN is to collect information periodically from the preferred area and transmit the information to BS. A simple method to attain this task is that each sensor node transmits data directly to BS. However, when BS is sited a long away from the target area, the sensor nodes will die rapidly due to more energy utilization. On the other hand, since the gap between each node and BS are different, direct transmission may lead to unbalanced energy consumption. To solve these problems, many protocols have been proposed such as LEACH, PEGASIS, HEED, PEDAP. Proceedings of International Conference on Advancements in Engineering and Technology ISBN NO : 978 - 1502893314 www.iaetsd.in International Association of Engineering and Technology for Skill Development 41
  • 2. In LEACH [4], [5], for the entire network, nodes are selected according to a fraction p from all sensor nodes are fixed to serve as cluster heads (CHs), where p is a design parameter. The operations of LEACH are split into several rounds. Each round includes a design phase and a static-state phase. During the design phase, each node will decide whether to be a CH or not according to a predefined specification. After CHs are selected, each of other nodes will choose its own CH and join the cluster according to the power of many received messages. Each node will choose the nearest CH. During the static-state phase, CHs fuse the data received from their cluster nodes and send the fused data to BS by single-hop connection. LEACH uses randomization to turn around CHs for each round in order to consistently allocate the energy consumption. So LEACH can minimize the amount of data directly broadcasted to BS and balance WSN load, thus attaining a factor of 8 times growth compared with direct transmission. In [6], the authors proposed a hybrid, energy- efficient, distributed clustering algorithm (HEED). HEED is an enhancement of LEACH on the method of CH choosing. In each round, HEED selects CHs according to the remaining energy of each node and a secondary parameter such as nodes proximity to their neighbors or nodes degrees. By iterations and competition, HEED ensures only one CH within a certain range, so uniform CHs distribution is achieved across the network. Compared with LEACH, HEED effectively prolongs network lifetime and is suitable for situations such as where each node has different initial energy. For Case1, LEACH and HEED greatly reduce total energy consumption. However, LEACH and HEED consume energy heavily in the head nodes, which makes the head nodes die quickly. S. Lindsey et al. proposed an algorithm related to LEACH and it is called PEGASIS [7]. PEGASIS is a nearly optimal power efficient protocol which uses GREEDY algorithm to make all the sensor nodes in the network form a chain. In PEGASIS, the (i mod N)th node is chosen to be a leader and the leader is the only one which needs to communicate with BS in round i. N is the total amount of nodes. Data is collected by starting from both endpoints of the chain, and transmitted along the chain, and fused each time it transmits from one node to the next until it reaches the leader. So PEGASIS sharply reduces the total amount of data for long-distance transmission and achieves a better performance than LEACH by 100% to 300% in terms of network lifetime. III. NETWORK AND RADIO MODEL In our work, we assume that the system model has the following properties:  Sensor nodes are randomly distributed in the square field and there is only one BS deployed far away from the area.  Sensor nodes are stationary and energy constrained. Once deployed, they will keep operating until their energy is exhausted.  BS is stationary, but it is not energy constrained.  All sensor nodes have power control capabilities; each node can change the power level and communicate with BS directly.  Sensor nodes are location-aware. A sensor node can get its location information through other mechanisms such as GPS or position algorithms.  Each node has its unique identifier (ID). For both cases, the medium is assumed to be symmetric so that the energy required for transmitting a message from node A to node B or from node B to node A is the same. IV. LOAD STABILIZING TREE BASED ENERGY CONSERVING PROTOCOL The main aim of LSTEC is to achieve a longer network lifetime for different applications. In each round, BS assigns a root node and broadcasts its ID and its coordinates to all sensor nodes. Then the network computes the path either by transmitting the path information from BS to sensor nodes or by having the same tree structure being dynamically and individually built by each node. For both cases, LSTEC can change the root and reconstruct the routing tree with short delay and low energy consumption. Therefore a better balanced load is achieved compared with the protocols mentioned in Section II. The operation of LSTEC is divided into Initial Phase, Tree Construction Phase, Data Collection and Transmission Phase, and Information Exchange Phase. A. Initial Phase In Initial Phase, the network parameters are initialized. Initial Phase is divided into three steps. Step 1: When Initial Phase begins, BS broadcasts a packet to all the nodes to inform them of beginning time, the length of time slot and the number of nodes N. When all the nodes receive the packet, they will compute their own energy-level (EL) using function: EL is a parameter for load balance. Step 2: Each node sends its packet in a circle with a certain radius during its own time slot after Step 1. For example, in the time slot, the node whose ID is I will send out its packet. This packet contains a preamble and the information such as coordinates and EL of node i. All the other nodes during this time slot will monitor the channel, and if some of them are the neighbors of node i, they can receive this packet and record the information of node i in memory. After all nodes send their information, each node records a table in their memory which contains the information of all its neighbors. Step 3: Each node sends a packet which contains all its neighbors’ information during its own time slot when Step 2 is over. Then its neighbors can receive this packet and record the information in memory. The length of time slots in Steps 2 and 3 is predefined, Proceedings of International Conference on Advancements in Engineering and Technology ISBN NO : 978 - 1502893314 www.iaetsd.in International Association of Engineering and Technology for Skill Development 42
  • 3. thus when time is up, each node has sent its information before Initial Phase ended. After Initial Phase, each node records two tables in memory which contain the information of all its neighbors and its neighbors’ neighbors. These two tables are defined as Table I and Table II. B. Tree Construction Phase Within each round, LSTEC performs the following steps to build a routing tree. Between Case1 and Case2 there are some differences in the steps of routing tree constructing: Step 1: BS assigns a node as root and broadcasts root ID and root coordinates to all sensor nodes. TABLE I NETWORK LIFETIMES OF DIFFERENT SCHEMES For Case1, because data fusion technique is implemented, only one node which communicates directly with BS can transmit all the data with the same length as its own, which results in much less energy consumption. In order to balance the network load for Case1, in each round, a node with the largest residual energy is chosen as root. The root collects the data of all sensors and transmits the fused data to BS over long distance. For Case2, because data can’t be fused, it will not save the energy for data transmitting by making fewer nodes communicate directly with BS. When one of the sensor nodes collects all the data and sends it to BS, it would deplete its energy quickly. In this case BS always assigns itself as root. Step 2: Each node tries to select a parent in neighbors using EL and coordinates which are recorded in Table I. The selection criteria are: 1) For both Case1 and Case2, for a sensor node, the distance between its parent node and the root should be shorter than that between itself and the root. 2) For Case1, each node chooses a neighbor that satisfies criterion 1 and is the nearest to itself as its parent. And if the node can’t find a neighbor which satisfies criterion 1, it selects the root as its parent. 3) For Case2, the process of Tree Constructing Phase can be regarded as an iterative algorithm. Besides criterion 1, for a sensor node, only the nodes with the largest EL of all its neighbors and itself can act as relay nodes. If the sensor node itself has the largest EL, it can also be considered to be an imaginary relay node. Choosing the parent node from all the relay nodes is based on energy consumptions. Any of these consumptions is the sum of consumption from the sensor node to a relay node and that from the relay node to BS. The relay node which causes minimum consumption will be chosen as the parent node. It is true that this relay node should choose its parent node in the same way. So a path with minimum consumption is found by iterations. And by using EL, LSTEC chooses the nodes with more residual energy to transmit data for long distance. If the sensor node cannot find a suitable parent node, it will transmit its data directly to BS. Step 3: Because every node chooses the parent from its neighbors and every node records its neighbors’ neighbors’ information in Table II, each node can know all its neighbors’ parent nodes by computing, and it can also know all its child nodes. If a node has no child node, it defines itself as a leaf node, from which the data transmitting begins. As discussed above, for Case1, because each packet sent to the parent nodes will be fused, the minimum energy consumption can be achieved if each node chooses the node nearest to it. But if all nodes choose their nearest neighbors, the network may not be able to build a tree. Fig. 1 shows a network of 100 nodes in this situation. We can find that some Proceedings of International Conference on Advancements in Engineering and Technology ISBN NO : 978 - 1502893314 www.iaetsd.in International Association of Engineering and Technology for Skill Development 43
  • 4. clusters are formed, but they cannot connect with others. Thus in LSTEC, we use criterion 1 in Case1 to limit the search direction. By this approach, a routing tree is constructed and some nodes still have the possibility of connecting to their nearest neighbors. For Case2, criterion 1 should also be obeyed and this criterion helps to save the energy for data transmitting to a certain extent. To build a routing tree, for Case1, each node follows the steps. But for Case2, we use BS to compute the topography. C. Data Collection and Transmission Phase After the routing tree is constructed, each sensor node collects information to generate a DATA_PKT which needs to be transmitted to BS. For Case1, TDMA and Frequency Hopping Spread Spectrum (FHSS) are both applied. This phase is divided into several TDMA time slots. In a time slot, only the leaf nodes try to send their DATA_PKTs. After a node receives all the data from its child nodes, this node itself serves as a leaf node and tries to send the fused data in the next time slot. Each TDMA time slot is divided into three segments as follows (see Fig. 2). Segment1: The first segment is used to check if there is communication interference for a parent node. In this segment, each leaf node sends a beacon which contains its ID to its parent node at the same time. Three situations may occur and they divide all the parent nodes into three kinds. For the first situation, if no leaf node needs to transmit data to the parent node in this time slot, it receives nothing. For the second situation, if more than one leaf node needs to transmit data to the parent node, it receives an incorrect beacon. For the third situation, if only one leaf node needs to transmit data to the parent node, it receives a correct beacon. Proceedings of International Conference on Advancements in Engineering and Technology ISBN NO : 978 - 1502893314 www.iaetsd.in International Association of Engineering and Technology for Skill Development 44
  • 5. Segment 2: During the second segment, the leaf nodes which can transmit their data are confirmed. For the first situation, the parent node turns to sleep mode until next time slot starts. For the second situation, the parent node sends a control packet to all its child nodes. This control packet chooses one of its child nodes to transmit data in the next segment. For the third situation, the parent node sends a control packet to this leaf node. This control packet tells this leaf node to transmit data in the next segment. Segment 3: The permitted leaf nodes send their data to their parent nodes, while other leaf nodes turn to sleep mode. The process in one time slot is shown in Fig. 2. For Case2, each node chooses its parent by considering not the distance but the total energy consumption. In our simulation results, we will show that there may be many leaf nodes sharing one parent node in one time slot. If all the leaf nodes try to transmit their data at the same time, the data messages sent to the same parent node may interfere with each other. By applying Frequency Division Multiple Access (FDMA) or Code Division Multiple Access (CDMA), the schedule generated under competition is able to avoid collisions. However, the accompanying massive control packets will cause a large amount of energy to be wasted. Thus the process may be much simpler. At the beginning of each round, the operation is also divided into several time slots. In the ith time slot, the node whose ID is i turns on its radio and receives the message from BS. BS uses the same approach to construct the routing tree in each round, and then BS tells sensor nodes when to send or receive the data. D. Information Exchange Phase For Case1, since each node needs to generate and transmit a DATA_PKT in each round, it may exhaust its energy and die. The dying of any sensor node can influence the topography. So the nodes that are going to die need to inform others. The process is also divided into time slots. In each time slot, the nodes whose energy is going to be exhausted will compute a random delay which makes only one node broadcast in this time slot. When the delay is ended, these nodes are trying to broadcast a packet to the whole network. While all other nodes are monitoring the channel, they will receive this packet and perform an ID check. Then they modify their tables. If no such packet is received in the time slot, the network will start the next round. For Case2, BS can collect the initial EL and coordinates information of all the sensor nodes in Initial Phase. For each round, BS builds the routing tree and the schedule of the network by using the EL and coordinates information. Once the routing tree is built, the energy consumption of each sensor node in this round can be calculated by BS, thus the information needed for calculating the topology for the next round can be known in advance. However, because WSN may be deployed in an unfriendly environment, the actual EL of each sensor node may be different from the EL calculated by BS. To cope with this problem, each sensor node calculates its EL and detects its actual residual energy in each round. We define the calculated EL as EL1 and the actual EL as EL2. When the two ELs of a sensor node are different, the sensor node generates an error flag and packs the information of actual residual energy into DATA_PKT, which needs to be sent to BS. When this DATA_PKT is received, BS will get the actual residual energy of this sensor node and use it to calculate the topology in the next round. V. COMPARATIVE ANALYSIS AND SIMULATION RESULTS A MATLAB simulation of LSTEC is done for both Case1 and Case2 to evaluate the performance. For Case1, we first compare LSTEC with PEGASIS and use the same network model as PEGASIS. We generate a randomly distributed 100 to 400 nodes network of square area 100 m × 100 m with BS located at (50 m, 175 m) and use DATA_PKT length of 2000 bits and Proceedings of International Conference on Advancements in Engineering and Technology ISBN NO : 978 - 1502893314 www.iaetsd.in International Association of Engineering and Technology for Skill Development 45
  • 6. CTRL_PKT length of 100 bits. We let each node have 0.25 J initial energy. Fig. 3 and Fig. 4 show the routing tree generated by LSTEC and PEGASIS for exactly the same 100 node topology. In Fig. 3 the triangle is root node and in Fig. 4 the triangle is head node and the rectangle is tail node. As seen, the routing tree generated by LSTEC is better. Since PEGASIS uses GREEDY algorithm to form a chain, long links may exist between parent nodes and child nodes, which will cause an unbalanced load. As for LSTEC, each node tends to choose the nearest neighbor to avoid long links. Fig. 5 shows that the time when the first node dies changes within a range from 100 nodes to 400 nodes in the network. We can find that LSTEC performs much better than PEGASIS and prolongs network lifetime by about 100% to 300% in Fig. 5. Fig. 5. For Case1, we compare the time when first node dies for GSTEB and PEGASIS for the number of nodes from 100 to 400. Fig. 6. For Case1, we compare the time when first node dies for GSTEB and HEED for the number of nodes from 100 to 400. In Fig. 6 shows that the time when the first node dies changes within a range from 100 nodes to 400 nodes in the network. Clearly, LSTEC performs better than HEED and prolongs the network lifetime by more than 100%. VI. CONCLUSIONS In this work, we introduce LSTEC. Two definitions of network lifetime and two extreme cases of data fusion are proposed. The simulations show that when the data collected by sensors is strongly correlative, LSTEC outperforms LEACH, PEGASIS and HEED. Because LSTEC consumes only a small amount of energy in each round to change the topography for the purpose of balancing the energy consumption. All the leaf nodes can transmit data in the same TDMA time slot so that the transmitting delay is short. When lifetime is defined as the time from the start of the network operation to the death of the first node in the network, LSTEC prolongs the lifetime by 100% to 300% compared with PEGASIS. In some cases, we are more interested in the lifetime of the last node in the network. Some slight changes are made to make the performance of LSTEC similar to that of PEDAP. So LSTEC is nearly the optimal solution in Case1. When the data collected by sensors cannot be fused, LSTEC offers another simple approach to balancing the network load. In fact, it is difficult to distribute the load evenly on all nodes in such a case. Even though LSTEC needs BS to compute the topography, which leads to an increase in energy waste and a longer delay, this kind of energy waste and longer delay are acceptable when compared with the energy consumption and the time delay for data transmitting. Simulation results show that when lifetime is defined as the time from the start of the network operation to the death of the first node in the network, LSTEC prolongs the lifetime of the network by more than 100% compared with HEED. REFERENCES [1] K. Akkaya and M. Younis, “A survey of routing protocols in wireless sensor networks,” Elsevier Ad Hoc Network J., vol. 3/3, pp. 325–349, 2005. [2] I. F. Akyildiz et al., “Wireless sensor networks: A survey,” Computer Netw., vol. 38, pp. 393–422, Mar. 2002. [3] K. T. Kim and H. Y. Youn, “Tree-Based Clustering(TBC) for energy efficient wireless sensor networks,” in Proc. AINA 2010, 2010, pp. 680–685. [4] M. Liu, J. Cao, G. Chen, and X.Wang, “An energy-aware routing protocol in wireless sensor networks,” Sensors, vol. 9, pp. 445–462, 2009. [5] W. Liang and Y. Liu, “Online data gathering for maximizing network lifetime in sensor networks,” IEEE Trans Mobile Computing, vol. 6, no. 1, pp. 2–11, 2007. [6] O. Younis and S. Fahmy, “HEED: A hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks,” IEEE Trans. Mobile Computing, vol. 3, no. 4, pp. 660–669, 2004. [7] S. Lindsey and C. Raghavendra, “Pegasis: Power-efficient gathering in sensor information systems,” in Proc. IEEE Aerospace Conf., 2002, vol. 3, pp. 1125–1130. [8] H. O. Tan and I. Korpeoglu, “Power efficient data gathering and Aggregation in wireless sensor networks,” SIGMOD Rec., vol. 32, no. 4, pp. 66–71, 2003. [9] G. Mankar and S. T. Bodkhe, “Traffic aware energy efficient routing protocol,” in Proc. 3rd ICECT, 2011, vol. 6, pp. 316–320, . [10] R. Szewczyk, J. Polastre, A.Mainwaring, and D. Culler, “Lessons from sensor network expedition,” in Proc. 1st European Workshop on Wireless Sensor Networks EWSN ‘04, Germany, Jan. 19-21, 2004. Proceedings of International Conference on Advancements in Engineering and Technology ISBN NO : 978 - 1502893314 www.iaetsd.in International Association of Engineering and Technology for Skill Development 46