SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 822
Comparative Study of LEACH, SEP, TEEN, DEEC, AND PEGASIS IN
WIRELESS SENSOR NETWORK
POOJA GIRI1, DR. ANJALI POTNIS2 , PRIYANKA TRIPATHI3
1,3MTECH, NITTTR, Bhopa , India
2Assistant Professor, NITTTR, Bhopal, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract: In recent period of time in history Wireless Sensor
Network(WSNs) have interestedasanewpowerfultechnology
such as surveillance system, military operation, intelligent
transport systems(ITS)etc. The basic operation of these type
network is divided into two parts, first is data gathering
network and second one is data distributing network. These
networks consists of sensor nodes which is totally depends on
electrical storage device, due to limitation of energy, energy
efficiency is an important point which should be taken care at
time of designing of energy efficiency routing protocols is the
fact that the SNs are worked on the battery which is
discharges quickly after each operation. In this paper we
reviewed different types of energy protocols such as LEACH,
SEP, TEEN, DEEC, and PEGASIS. And conclude in last section,
all these routing protocol withthehelpofdifferentparameters
such as energy efficiency, network life time, data aggregation,
scalability and etc.
Key Words: wireless sensor networks, sensor nodes, routing
protocol, energy efficiency etc.
1. INTRODUCTION
As we all know that wireless sensor network is the network
which is operated on tiny, low battery powered sensor node
with limited storage, on-board processing and radio
capabilities. The sensor networks are positioned indoor and
outdoor sides and are anticipated to work unattended,
monitoring the region and informing to the base station. The
network must acquire self-configuration capabilities as the
position of distinctive sensor node is not pre-calculated. The
designing protocols used for sensor networks has to be
energy aware in order to prolong the life time of network
because once sensor network have been installed,
replacement of the embedded battery is very difficultandfor
proper monitoring the WSNs should utilize their network
energy in an efficient way. A sensor nodeismainlyconsistsof
four components namely- sensing element, processing unit,
transceiver unit, and power unit. WSNs may also have
additionalapplication-dependentcomponentssuchaspower
generator, location finding system and mobilizer. In this
paper we reviews energy efficient existing routing protocols
such as LEACH, SEP, PEGASIS, DEEC, and TEEN.
I. LEACH
Leach stands for Low Energy Adaptive Clustering
Hierarchical protocol. Leach protocol is a distinctive
representative of hierarchical routing protocols. Leach
protocol also defined as self-adaptive and self-organized
protocol. With the help of Leach protocol energy is reduced
significantly. The whole operation of the leach protocol is
defined as two phases name as-set up phase and steady
phase.
 Set up phase: In this phase clusters are formed and
cluster head are elected.
 Steady phase: In this phase the data transmission
between cluster head and base station is taken
place.
Algorithm for LEACH protocol is as follows:
As we know that the basic operation of LEACH protocol is
divided into rounds and each round is divided into two
phases first to set up phase and then steady state phase. The
systematic representation of LEACH protocol is shown in
figure below.
Figure.1 LEACH Protocol Architecture[1].
The first phase that means set up phase having three
fundamental steps, namely—
i. Cluster Head Advertisement
ii. Cluster Setup
iii. Creation of Transmission Schedule
During the first step cluster head (CHs) sends the
advertisement packet to the cluster nodes to informs that
they have becomea cluster head on the basis of the following
formula given below. Let x be any randomnumberbetween0
and 1.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 823
T(n)= ……(1)
where n is the given node, p is the probability, r is the
current, G is the set of nodes that were not cluster heads in
the previous round, T(n) is the threshold.[11]Theprocessof
cluster head selection is such that the node becomes cluster
head for the current round if the number is less than
threshold T(n)[1].
In the second steps the cluster head send advertisement to
the non-cluster head nodes,and then send join requesttothe
cluster head update that they are the members of the cluster
under that cluster head [6]. With the help of second step
these non-cluster head nodessaves a lot of energybyturning
off their transmitter all the time and when they have
something to transmit to theclusterheadthenonlyitturnON
its transmitter.
In the third step, using TDMA scheduling each of the chosen
cluster head create a transmission schedule for the member
nodes of their cluster.
The second phase of LEACH is the Steady state phase as
mention above in this phase transmission of data is going on
between cluster heads to the base station.
Figure 2. Flow Chart Of LEACH Protocol
II.Stable election protocol (SEP)
SEP is also known as heterogeneous aware protocols; here
the meaning of heterogeneous is that not all the nodes in the
field have the same initial energy. With respect to prolong
the stable region, SEP attempts to preserve the constraint of
sufficiently balanced energy consumption[8]. Instinctively,
advanced node have to become cluster heads more often
than the normal nodes, which is correspondence to a
fairness restriction on energy use . Sep[7] is a two-level
heterogeneous proactive network protocol (in proactive
network NODES in network keep on sensing and provide a
continuous report of data to the BS). It assumes that each
node in the network has different energy level. Therefore in
SEP there are two types of nodes are present; normal nodes
and advanced nodes. Usually the advanced nodes are nodes
which are having more energyascomparedtonormal nodes.
Let us discuss about the system energy of both nodes
(normal and advanced) – suppose that is the initial
energy of each normal sensor node. The energy of each
advanced node will be .
The total energy of the new heterogeneous setting is shown
in given equation-
…(2)
As we see from the above equation, the total energy of the
system is increased by 1+ α . m times. Here, n is the no. Of
sensor node in the network and m be the fraction of
advanced nodes, which are occupied with α time more
energy than the normal nodes
E0 is the initial energy of the each normal nodes and
E0(1+α) is the energy of advanced nodes. Based on its initial
energy, SEP assign a weighted probability to each node. By
decreasing the CH epoch interval of advanced nodes it
ameliorates the cluster formation i.e., advanced nodes get
more chance to become a CH (cluster head). Givenbelowthe
weighted probabilities for normal nodes and advanced
nodes respectively, are:
In SEP, for cluster formation one important parameter into
consideration is the threshold value and it is depends on the
probability of node. Usingthresholdvaluesclusterformation
is taking place, each node generates a random number and
that random number is comparedwiththresholdvalue,ifthe
generated value is less than threshold then that node will
becomes CH. The threshold calculation equationforboththe
nodes equations is shown in equation (5). Threshold
calculation for normal nodes is shown in equation(6):
T(s) = …(5)
Threshold calculation for advanced nodes is shown in
equation (6):
T(s) = ……(6)
Where, r is the current round, G’ is the set of normal nodes
and G” is the set of advanced nodes that are not become
cluster heads within last and rounds,
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 824
respectively. The algorithm flow chart of SEP protocol in
shown in below-
Figure.3- Flow chart of SEP protocol
III. Threshold sensitive energy efficient sensor
network (TEEN) PROTOCOL
In this section we discuss another hierarchical based
clustering protocol name as TEEN protocol. Teen protocol
also defines in terms of reactive networks. The functionality
operation of TEEN protocol is that at every cluster change
time, in addition to the characteristic, the cluster-head
broadcasts to its cluster member by the following:
 Hard threshold: The hard threshold is refers as a
threshold value for the sensed attribute. It is the
complete value for the attributes besideswhich,the
node sensing this value in the same time sensor
nodes must switch ON its transmitter and report to
its cluster head.
 Soft threshold: The soft threshold is refers as a
small change in the value of the sensed attribute
which provokes the node to switch on its
transmitter and transmit.
The schematic representation of TEEN protocol is shown
below-
Figure.4- TEEN protocol achitecture
Figure.5- Operation flow chart of TEEN
The nodes continuously sense their environment. The
node switches ON its transmitter and sends the sensed data,
when the first time a parameter from the attribute set
commands its hard threshold value. An internal variable in
the node is used for stored the sensed value (SV) which is
sensed by the sensor nodes. When the both the given below
conditions are true, then only the nodes will next transmit
data in the current cluster period
i. When the current value of the sensed attribute is
greater than the hard threshold.
ii. The sensed attributes of the current value is differ
from the SV by an amount equal to or greater
than the soft threshold.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 825
The main drawback of this protocol is that whenever
the threshold is not reached, the nodes will never get
communicate because of this the user will not get any data
from the network.
Figure.-6 Time Line Representation Of TEEN Protocol
IV. Distributed energy-efficient clustering (DEEC)
protocol
In DEEC, formation of cluster heads is done using the initial
and residual energy level of all nodes. DEEC measure the
ideal value of network lifetime to estimate the reference
energy that each node should spend during each round. In a
two-level heterogeneousnetwork,wherewehavetwonodes
namely one is normal node m, with initial energy
and advanced nodes N, with their initial energy
(1-m).N
The value of total energy is given as
… (7)
The average energy of rth round is-
…… (8)
R, denotes the total rounds of the network life time and is
defined as-
……. (9)
power-efficient gathering in sensor information
systeM (PEGASIS) protocol
PEGASIS is the remotest preferred chain based hierarchical
protocol. In this protocol, the nodes are organized in the
form of a chain for the transition and gathering of the data
establishment of chain can be centralized based on the
application. PEGASIS is based on the opinion that global
knowledge of network is accommodate to all the nodes. The
PEGASIS protocol representation is shown below in fig-
Figure.-7 PEGASIS Protocol Architecture
The formation of chain starts from the endmost node
from sink and its immediate neighbor are elected as next
node in chain and so on. The node before sink acts as a
leader of the node and the last node must be the sink. The
operation like data-processing and data aggregation are
adopted by leader node, due to time varying topology (or)
dynamic behavior of network, PEGASIS is not so relevant
routing protocol.
The algorithm of PEGASIS protocol-
The algorithm of PEGASIS is just subjected on the LEACH
protocol. The main idea in PEGASIS is to compose a chain
between all the sensor nodes. So that energy node can
assembly from and transfer to the nearest neighbor. The
aggregated data moves from node to node, it get combined,
and thereafter a cluster head transmits these aggregatedata
to the BS (base station) .
CONCLUSION
On studying the entire algorithms a conclusion table can be
made on the basis of various parameters which is stated
below in table (1).
Parameter LEACH SEP PEGASIS DEEC TEEN
Data
Delivery
Model
Cluster
ed
Head
Clust
ered
Head
Chain
Based
Clust-
ered
Head
Active
Thres
hold
Data
Aggregat-
ion
Yes Yes No Yes Yes
Energy
Efficiency
Good Good
Very
Good
Good Good
Scalability Low - Low - Good
Network
Lifetime
Good Good
Very
Good
Good Good
Mobility
Of Nodes
Nodes
Are
Station
ary
Node
s Are
Statio
nary
Nodes
Are
Stationar
y
Nodes
Are
Station
ary
Nodes
Are
Statio
nary
Network
Type
Homog
eneous
Heter
ogen
eous
Homogen
eous
Hetero
geneo
us
Homo
geneo
us
TABLE.-1
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 826
REFERENCES
1. K. Dasgupta et al. An efficient clustering-
based heuristic for data gathering and
aggregation in sensor networks. in: Proceedings of
the IEEE Wireless Communications and
Networking Conference (WCNC’03), New Orleans,
LA, March 2003.
2. S Lindsey, CS Raghavendra. PEGASIS: Power-
efficient gathering in sensor information
systems[C]. IEEE Aerospace and Electronic Systems
Society, Proc of the IEEE Aerospace Conf,
Montana, 2002:1125-1130.
3. W. Heinzelman, A. Chandrakasan, H. Balakrishnan,
“Energy- efficient communication protocol for
wireless sensor networks”, in: Proceeding of the
Hawaii International Conference System Sciences,
Hawaii, January 2000.
4. S. Lindsey, C.S. Raghavendra, “PEGASIS: power
efficient gathering in sensor information systems”,
in: Proceedings of the IEEE Aerospace Conference,
Big Sky, Montana, March 2002.
5. Rajesh Patel, Sunil Pariyani, Vijay Ukani,” Energy
and throughput Analysis of Hierarchical Routing
Protocol(LEACH) for Wireless Sensor Networks”,
International Journal of Computer Applications
Volume 20- No. 4 (April 2011).
6. Yuh Ren Tsai, “Coverage Preserving Routing
ProtocolsforRandomlyDistributedWirelessSensor
Networks”, IEEE Transactions on Wireless
Communications, Volume 6- No. 4 (April 2007).
7. Amrinder Kaur, Sunil Saini,” Simulation of Low
Energy Adaptive Clustering Hierarchy Protocol for
Wireless Sensor Network,” International Journal of
Advanced Research in Computer Science and
Software Engineering, Volume 3, Issue7, July 2013.
8. W. B. Heinzelman. “Application-Specific Protocol
Architectures for Wireless Networks”. PhD thesis,
Massachusetts Institute of Technology, June 2000.
9. S. Bandyopadhyay and E. J. Coyle. An energy
efficient hierarchical clustering algorithm for
wireless sensor networks. In Proceedings of the
22nd Annual Joint ConferenceoftheIEEEComputer
and Communications Societies (Infocom 2003),
April 2003.
10. I.Akyildiz, W. Su, Y. Sankarasubramaniam, and E.
Cayirci. A survey on sensor networks. IEEE
Communications Magazine, 40(8):102–114,
August 2002.

More Related Content

What's hot

Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor NetworkEnhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
IJERD Editor
 
69 122-128
69 122-12869 122-128
69 122-128
idescitation
 
Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...
Aayush Gupta
 
74 136-143
74 136-14374 136-143
74 136-143
idescitation
 
Power saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling techniquePower saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling technique
eSAT Publishing House
 
eeca
eecaeeca
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Alexander Decker
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
ijwmn
 
Ca mwsn clustering algorithm for mobile wireless senor network [
Ca mwsn clustering algorithm for mobile wireless senor network  [Ca mwsn clustering algorithm for mobile wireless senor network  [
Ca mwsn clustering algorithm for mobile wireless senor network [
graphhoc
 
A Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
A Fault Tolerant Approach To Enhances WSN Lifetime In Star TopologyA Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
A Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
IRJET Journal
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
acijjournal
 
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star TopologyA Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
IRJET Journal
 
M045077578
M045077578M045077578
M045077578
IJERA Editor
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
IJERA Editor
 
Ho2413421346
Ho2413421346Ho2413421346
Ho2413421346
IJERA Editor
 
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...
IJERA Editor
 
Ijcnc050207
Ijcnc050207Ijcnc050207
Ijcnc050207
IJCNCJournal
 
D031202018023
D031202018023D031202018023
D031202018023
ijceronline
 
Dead node detection in teen protocol survey
Dead node detection in teen protocol surveyDead node detection in teen protocol survey
Dead node detection in teen protocol survey
eSAT Publishing House
 
Dead node detection in teen protocol
Dead node detection in teen protocolDead node detection in teen protocol
Dead node detection in teen protocol
eSAT Journals
 

What's hot (20)

Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor NetworkEnhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
Enhancing the Energy Parameter of Leach Protocol For Wireless Sensor Network
 
69 122-128
69 122-12869 122-128
69 122-128
 
Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...
 
74 136-143
74 136-14374 136-143
74 136-143
 
Power saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling techniquePower saving mechanism for hybrid routing protocol using scheduling technique
Power saving mechanism for hybrid routing protocol using scheduling technique
 
eeca
eecaeeca
eeca
 
Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...Energy efficient protocol with static clustering (eepsc) comparing with low e...
Energy efficient protocol with static clustering (eepsc) comparing with low e...
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
Ca mwsn clustering algorithm for mobile wireless senor network [
Ca mwsn clustering algorithm for mobile wireless senor network  [Ca mwsn clustering algorithm for mobile wireless senor network  [
Ca mwsn clustering algorithm for mobile wireless senor network [
 
A Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
A Fault Tolerant Approach To Enhances WSN Lifetime In Star TopologyA Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
A Fault Tolerant Approach To Enhances WSN Lifetime In Star Topology
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
 
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star TopologyA Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
A Fault Tolerant Approach to Enhances Wsn Lifetime in Star Topology
 
M045077578
M045077578M045077578
M045077578
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
 
Ho2413421346
Ho2413421346Ho2413421346
Ho2413421346
 
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...
 
Ijcnc050207
Ijcnc050207Ijcnc050207
Ijcnc050207
 
D031202018023
D031202018023D031202018023
D031202018023
 
Dead node detection in teen protocol survey
Dead node detection in teen protocol surveyDead node detection in teen protocol survey
Dead node detection in teen protocol survey
 
Dead node detection in teen protocol
Dead node detection in teen protocolDead node detection in teen protocol
Dead node detection in teen protocol
 

Similar to IRJET-Comparative Study of Leach, Sep,Teen,Deec, and Pegasis in Wireless Sensor Network

IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...
IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...
IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...
IRJET Journal
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
ijsrd.com
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Editor IJCATR
 
IRJET- Enhancing Data Transmission and Protection in Wireless Sensor Node
IRJET- Enhancing Data Transmission and Protection in Wireless Sensor NodeIRJET- Enhancing Data Transmission and Protection in Wireless Sensor Node
IRJET- Enhancing Data Transmission and Protection in Wireless Sensor Node
IRJET Journal
 
G018214246
G018214246G018214246
G018214246
IOSR Journals
 
Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)
IJCNCJournal
 
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
ijassn
 
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
ijassn
 
Comparison of Energy Efficient WSN in Coverage and Connectivity
Comparison of Energy Efficient WSN in Coverage and ConnectivityComparison of Energy Efficient WSN in Coverage and Connectivity
Comparison of Energy Efficient WSN in Coverage and Connectivity
IRJET Journal
 
tankala srinivas, palasa
tankala srinivas, palasatankala srinivas, palasa
tankala srinivas, palasa
shiva782
 
An Energy Efficient Protocol To Increase Network Life In WSN
An Energy Efficient Protocol To Increase Network Life In WSNAn Energy Efficient Protocol To Increase Network Life In WSN
An Energy Efficient Protocol To Increase Network Life In WSN
IOSR Journals
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
ijsrd.com
 
IRJET- Analysis of Energy Efficiency and Network Lifetime of Various Clus...
IRJET-  	  Analysis of Energy Efficiency and Network Lifetime of Various Clus...IRJET-  	  Analysis of Energy Efficiency and Network Lifetime of Various Clus...
IRJET- Analysis of Energy Efficiency and Network Lifetime of Various Clus...
IRJET Journal
 
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
IJERD Editor
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
ijsrd.com
 
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
IRJET Journal
 
The comparison between routing protocols based on lifetime of wireless sensor...
The comparison between routing protocols based on lifetime of wireless sensor...The comparison between routing protocols based on lifetime of wireless sensor...
The comparison between routing protocols based on lifetime of wireless sensor...
inventionjournals
 
A Deterministic Heterogeneous Clustering Algorithm
A Deterministic Heterogeneous Clustering AlgorithmA Deterministic Heterogeneous Clustering Algorithm
A Deterministic Heterogeneous Clustering Algorithm
iosrjce
 
B017340511
B017340511B017340511
B017340511
IOSR Journals
 
Energy Efficient Cluster Routing Protocols in Wireless Sensor Network – A Sur...
Energy Efficient Cluster Routing Protocols in Wireless Sensor Network – A Sur...Energy Efficient Cluster Routing Protocols in Wireless Sensor Network – A Sur...
Energy Efficient Cluster Routing Protocols in Wireless Sensor Network – A Sur...
IJEEE
 

Similar to IRJET-Comparative Study of Leach, Sep,Teen,Deec, and Pegasis in Wireless Sensor Network (20)

IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...
IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...
IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
 
IRJET- Enhancing Data Transmission and Protection in Wireless Sensor Node
IRJET- Enhancing Data Transmission and Protection in Wireless Sensor NodeIRJET- Enhancing Data Transmission and Protection in Wireless Sensor Node
IRJET- Enhancing Data Transmission and Protection in Wireless Sensor Node
 
G018214246
G018214246G018214246
G018214246
 
Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)Energy aware clustering protocol (eacp)
Energy aware clustering protocol (eacp)
 
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
 
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
 
Comparison of Energy Efficient WSN in Coverage and Connectivity
Comparison of Energy Efficient WSN in Coverage and ConnectivityComparison of Energy Efficient WSN in Coverage and Connectivity
Comparison of Energy Efficient WSN in Coverage and Connectivity
 
tankala srinivas, palasa
tankala srinivas, palasatankala srinivas, palasa
tankala srinivas, palasa
 
An Energy Efficient Protocol To Increase Network Life In WSN
An Energy Efficient Protocol To Increase Network Life In WSNAn Energy Efficient Protocol To Increase Network Life In WSN
An Energy Efficient Protocol To Increase Network Life In WSN
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
IRJET- Analysis of Energy Efficiency and Network Lifetime of Various Clus...
IRJET-  	  Analysis of Energy Efficiency and Network Lifetime of Various Clus...IRJET-  	  Analysis of Energy Efficiency and Network Lifetime of Various Clus...
IRJET- Analysis of Energy Efficiency and Network Lifetime of Various Clus...
 
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
An Analysis of Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol for ...
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
 
The comparison between routing protocols based on lifetime of wireless sensor...
The comparison between routing protocols based on lifetime of wireless sensor...The comparison between routing protocols based on lifetime of wireless sensor...
The comparison between routing protocols based on lifetime of wireless sensor...
 
A Deterministic Heterogeneous Clustering Algorithm
A Deterministic Heterogeneous Clustering AlgorithmA Deterministic Heterogeneous Clustering Algorithm
A Deterministic Heterogeneous Clustering Algorithm
 
B017340511
B017340511B017340511
B017340511
 
Energy Efficient Cluster Routing Protocols in Wireless Sensor Network – A Sur...
Energy Efficient Cluster Routing Protocols in Wireless Sensor Network – A Sur...Energy Efficient Cluster Routing Protocols in Wireless Sensor Network – A Sur...
Energy Efficient Cluster Routing Protocols in Wireless Sensor Network – A Sur...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
HODECEDSIET
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 

Recently uploaded (20)

22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 

IRJET-Comparative Study of Leach, Sep,Teen,Deec, and Pegasis in Wireless Sensor Network

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 822 Comparative Study of LEACH, SEP, TEEN, DEEC, AND PEGASIS IN WIRELESS SENSOR NETWORK POOJA GIRI1, DR. ANJALI POTNIS2 , PRIYANKA TRIPATHI3 1,3MTECH, NITTTR, Bhopa , India 2Assistant Professor, NITTTR, Bhopal, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract: In recent period of time in history Wireless Sensor Network(WSNs) have interestedasanewpowerfultechnology such as surveillance system, military operation, intelligent transport systems(ITS)etc. The basic operation of these type network is divided into two parts, first is data gathering network and second one is data distributing network. These networks consists of sensor nodes which is totally depends on electrical storage device, due to limitation of energy, energy efficiency is an important point which should be taken care at time of designing of energy efficiency routing protocols is the fact that the SNs are worked on the battery which is discharges quickly after each operation. In this paper we reviewed different types of energy protocols such as LEACH, SEP, TEEN, DEEC, and PEGASIS. And conclude in last section, all these routing protocol withthehelpofdifferentparameters such as energy efficiency, network life time, data aggregation, scalability and etc. Key Words: wireless sensor networks, sensor nodes, routing protocol, energy efficiency etc. 1. INTRODUCTION As we all know that wireless sensor network is the network which is operated on tiny, low battery powered sensor node with limited storage, on-board processing and radio capabilities. The sensor networks are positioned indoor and outdoor sides and are anticipated to work unattended, monitoring the region and informing to the base station. The network must acquire self-configuration capabilities as the position of distinctive sensor node is not pre-calculated. The designing protocols used for sensor networks has to be energy aware in order to prolong the life time of network because once sensor network have been installed, replacement of the embedded battery is very difficultandfor proper monitoring the WSNs should utilize their network energy in an efficient way. A sensor nodeismainlyconsistsof four components namely- sensing element, processing unit, transceiver unit, and power unit. WSNs may also have additionalapplication-dependentcomponentssuchaspower generator, location finding system and mobilizer. In this paper we reviews energy efficient existing routing protocols such as LEACH, SEP, PEGASIS, DEEC, and TEEN. I. LEACH Leach stands for Low Energy Adaptive Clustering Hierarchical protocol. Leach protocol is a distinctive representative of hierarchical routing protocols. Leach protocol also defined as self-adaptive and self-organized protocol. With the help of Leach protocol energy is reduced significantly. The whole operation of the leach protocol is defined as two phases name as-set up phase and steady phase.  Set up phase: In this phase clusters are formed and cluster head are elected.  Steady phase: In this phase the data transmission between cluster head and base station is taken place. Algorithm for LEACH protocol is as follows: As we know that the basic operation of LEACH protocol is divided into rounds and each round is divided into two phases first to set up phase and then steady state phase. The systematic representation of LEACH protocol is shown in figure below. Figure.1 LEACH Protocol Architecture[1]. The first phase that means set up phase having three fundamental steps, namely— i. Cluster Head Advertisement ii. Cluster Setup iii. Creation of Transmission Schedule During the first step cluster head (CHs) sends the advertisement packet to the cluster nodes to informs that they have becomea cluster head on the basis of the following formula given below. Let x be any randomnumberbetween0 and 1.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 823 T(n)= ……(1) where n is the given node, p is the probability, r is the current, G is the set of nodes that were not cluster heads in the previous round, T(n) is the threshold.[11]Theprocessof cluster head selection is such that the node becomes cluster head for the current round if the number is less than threshold T(n)[1]. In the second steps the cluster head send advertisement to the non-cluster head nodes,and then send join requesttothe cluster head update that they are the members of the cluster under that cluster head [6]. With the help of second step these non-cluster head nodessaves a lot of energybyturning off their transmitter all the time and when they have something to transmit to theclusterheadthenonlyitturnON its transmitter. In the third step, using TDMA scheduling each of the chosen cluster head create a transmission schedule for the member nodes of their cluster. The second phase of LEACH is the Steady state phase as mention above in this phase transmission of data is going on between cluster heads to the base station. Figure 2. Flow Chart Of LEACH Protocol II.Stable election protocol (SEP) SEP is also known as heterogeneous aware protocols; here the meaning of heterogeneous is that not all the nodes in the field have the same initial energy. With respect to prolong the stable region, SEP attempts to preserve the constraint of sufficiently balanced energy consumption[8]. Instinctively, advanced node have to become cluster heads more often than the normal nodes, which is correspondence to a fairness restriction on energy use . Sep[7] is a two-level heterogeneous proactive network protocol (in proactive network NODES in network keep on sensing and provide a continuous report of data to the BS). It assumes that each node in the network has different energy level. Therefore in SEP there are two types of nodes are present; normal nodes and advanced nodes. Usually the advanced nodes are nodes which are having more energyascomparedtonormal nodes. Let us discuss about the system energy of both nodes (normal and advanced) – suppose that is the initial energy of each normal sensor node. The energy of each advanced node will be . The total energy of the new heterogeneous setting is shown in given equation- …(2) As we see from the above equation, the total energy of the system is increased by 1+ α . m times. Here, n is the no. Of sensor node in the network and m be the fraction of advanced nodes, which are occupied with α time more energy than the normal nodes E0 is the initial energy of the each normal nodes and E0(1+α) is the energy of advanced nodes. Based on its initial energy, SEP assign a weighted probability to each node. By decreasing the CH epoch interval of advanced nodes it ameliorates the cluster formation i.e., advanced nodes get more chance to become a CH (cluster head). Givenbelowthe weighted probabilities for normal nodes and advanced nodes respectively, are: In SEP, for cluster formation one important parameter into consideration is the threshold value and it is depends on the probability of node. Usingthresholdvaluesclusterformation is taking place, each node generates a random number and that random number is comparedwiththresholdvalue,ifthe generated value is less than threshold then that node will becomes CH. The threshold calculation equationforboththe nodes equations is shown in equation (5). Threshold calculation for normal nodes is shown in equation(6): T(s) = …(5) Threshold calculation for advanced nodes is shown in equation (6): T(s) = ……(6) Where, r is the current round, G’ is the set of normal nodes and G” is the set of advanced nodes that are not become cluster heads within last and rounds,
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 824 respectively. The algorithm flow chart of SEP protocol in shown in below- Figure.3- Flow chart of SEP protocol III. Threshold sensitive energy efficient sensor network (TEEN) PROTOCOL In this section we discuss another hierarchical based clustering protocol name as TEEN protocol. Teen protocol also defines in terms of reactive networks. The functionality operation of TEEN protocol is that at every cluster change time, in addition to the characteristic, the cluster-head broadcasts to its cluster member by the following:  Hard threshold: The hard threshold is refers as a threshold value for the sensed attribute. It is the complete value for the attributes besideswhich,the node sensing this value in the same time sensor nodes must switch ON its transmitter and report to its cluster head.  Soft threshold: The soft threshold is refers as a small change in the value of the sensed attribute which provokes the node to switch on its transmitter and transmit. The schematic representation of TEEN protocol is shown below- Figure.4- TEEN protocol achitecture Figure.5- Operation flow chart of TEEN The nodes continuously sense their environment. The node switches ON its transmitter and sends the sensed data, when the first time a parameter from the attribute set commands its hard threshold value. An internal variable in the node is used for stored the sensed value (SV) which is sensed by the sensor nodes. When the both the given below conditions are true, then only the nodes will next transmit data in the current cluster period i. When the current value of the sensed attribute is greater than the hard threshold. ii. The sensed attributes of the current value is differ from the SV by an amount equal to or greater than the soft threshold.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 825 The main drawback of this protocol is that whenever the threshold is not reached, the nodes will never get communicate because of this the user will not get any data from the network. Figure.-6 Time Line Representation Of TEEN Protocol IV. Distributed energy-efficient clustering (DEEC) protocol In DEEC, formation of cluster heads is done using the initial and residual energy level of all nodes. DEEC measure the ideal value of network lifetime to estimate the reference energy that each node should spend during each round. In a two-level heterogeneousnetwork,wherewehavetwonodes namely one is normal node m, with initial energy and advanced nodes N, with their initial energy (1-m).N The value of total energy is given as … (7) The average energy of rth round is- …… (8) R, denotes the total rounds of the network life time and is defined as- ……. (9) power-efficient gathering in sensor information systeM (PEGASIS) protocol PEGASIS is the remotest preferred chain based hierarchical protocol. In this protocol, the nodes are organized in the form of a chain for the transition and gathering of the data establishment of chain can be centralized based on the application. PEGASIS is based on the opinion that global knowledge of network is accommodate to all the nodes. The PEGASIS protocol representation is shown below in fig- Figure.-7 PEGASIS Protocol Architecture The formation of chain starts from the endmost node from sink and its immediate neighbor are elected as next node in chain and so on. The node before sink acts as a leader of the node and the last node must be the sink. The operation like data-processing and data aggregation are adopted by leader node, due to time varying topology (or) dynamic behavior of network, PEGASIS is not so relevant routing protocol. The algorithm of PEGASIS protocol- The algorithm of PEGASIS is just subjected on the LEACH protocol. The main idea in PEGASIS is to compose a chain between all the sensor nodes. So that energy node can assembly from and transfer to the nearest neighbor. The aggregated data moves from node to node, it get combined, and thereafter a cluster head transmits these aggregatedata to the BS (base station) . CONCLUSION On studying the entire algorithms a conclusion table can be made on the basis of various parameters which is stated below in table (1). Parameter LEACH SEP PEGASIS DEEC TEEN Data Delivery Model Cluster ed Head Clust ered Head Chain Based Clust- ered Head Active Thres hold Data Aggregat- ion Yes Yes No Yes Yes Energy Efficiency Good Good Very Good Good Good Scalability Low - Low - Good Network Lifetime Good Good Very Good Good Good Mobility Of Nodes Nodes Are Station ary Node s Are Statio nary Nodes Are Stationar y Nodes Are Station ary Nodes Are Statio nary Network Type Homog eneous Heter ogen eous Homogen eous Hetero geneo us Homo geneo us TABLE.-1
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 826 REFERENCES 1. K. Dasgupta et al. An efficient clustering- based heuristic for data gathering and aggregation in sensor networks. in: Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC’03), New Orleans, LA, March 2003. 2. S Lindsey, CS Raghavendra. PEGASIS: Power- efficient gathering in sensor information systems[C]. IEEE Aerospace and Electronic Systems Society, Proc of the IEEE Aerospace Conf, Montana, 2002:1125-1130. 3. W. Heinzelman, A. Chandrakasan, H. Balakrishnan, “Energy- efficient communication protocol for wireless sensor networks”, in: Proceeding of the Hawaii International Conference System Sciences, Hawaii, January 2000. 4. S. Lindsey, C.S. Raghavendra, “PEGASIS: power efficient gathering in sensor information systems”, in: Proceedings of the IEEE Aerospace Conference, Big Sky, Montana, March 2002. 5. Rajesh Patel, Sunil Pariyani, Vijay Ukani,” Energy and throughput Analysis of Hierarchical Routing Protocol(LEACH) for Wireless Sensor Networks”, International Journal of Computer Applications Volume 20- No. 4 (April 2011). 6. Yuh Ren Tsai, “Coverage Preserving Routing ProtocolsforRandomlyDistributedWirelessSensor Networks”, IEEE Transactions on Wireless Communications, Volume 6- No. 4 (April 2007). 7. Amrinder Kaur, Sunil Saini,” Simulation of Low Energy Adaptive Clustering Hierarchy Protocol for Wireless Sensor Network,” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue7, July 2013. 8. W. B. Heinzelman. “Application-Specific Protocol Architectures for Wireless Networks”. PhD thesis, Massachusetts Institute of Technology, June 2000. 9. S. Bandyopadhyay and E. J. Coyle. An energy efficient hierarchical clustering algorithm for wireless sensor networks. In Proceedings of the 22nd Annual Joint ConferenceoftheIEEEComputer and Communications Societies (Infocom 2003), April 2003. 10. I.Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. A survey on sensor networks. IEEE Communications Magazine, 40(8):102–114, August 2002.