SlideShare a Scribd company logo
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. IV (Sep. – Oct. 2015), PP 101-109
www.iosrjournals.org
DOI: 10.9790/0661-1754101109 www.iosrjournals.org 101 | Page
Performance Evaluation and QoS Analysis of EEPB and PDCH
Routing Protocols in Wireless Sensor Networks
Sangeeta Vhatkar 1
, Jigish Rana 2
, Mohammad Atique 3
1
(Assistant Professor, TCET, Ph.D. Scholar P.I.E.T., Nagpur, India)
2
(M.E.I.T. (Pursuing), Thakur College of Engineering and Technology, University of Mumbai, India)
3
(Associate Professor, P.G. Department of Computer Science, S.G.B.A.U., Amravati, India)
Abstract : EEPB (Energy-Efficient PEGASIS-Based protocol) is a chain-based protocol. It has certain
deficiencies such as it ignores the nodes energy and distance between nodes to BS when selecting the leader. It
causes overhead, maximize the overall network delay and consumes more energy because of more number of
transmission and receives among all nodes. Aiming at these problems, PDCH (PEGASIS with Double Cluster
Head) is proposed in this paper. PDCH uses a double cluster head instead of single cluster head to distribute
energy load among all nodes to increase the network lifetime. Also PDCH uses a dynamic cluster formation to
eliminate overhead and reduce the distance of transmission by choosing appropriate node based on residual
energy and neighbor nodes. The simulation results show that PDCH has a better performance than EEPB on
the efficiency of energy consumption, minimizing network overhead, increasing the network lifetime and
balancing load of the network.
Keywords: Double Cluster Head, EEPB, Hierarchical Routing, PDCH, PEGASIS, Wireless Sensor Network
I. Introduction
Wireless Sensor Networks (WSNs) [1] have been identified as one of the most important technologies
of recent years. WSN consists a large number of dispersed and dedicated sensors in order to sense the physical
conditions of the environment like sound, temperature, humidity, pollution levels and pressure and so on. WSN
has empowered the advancement of low cost, low power, multi-functional smart sensor nodes. On the other
hand the nodes have limited amount of communication capacity and computing power. So how to optimize the
transmission distance and route, load balance, network lifetime and energy efficiency has become an important
issue of routing protocols.
Routing protocols in WSNs are broadly classified as, Hierarchical routing protocols (HRP) [2], Quality
of service based routing protocols, Location Based routing protocols and Flat based routing protocols. HRPs are
broadly used for their great energy efficiency and good expandability. Hierarchical routing is an efficient
method to less energy consumption within a cluster and by performing data collection and fusion in order to
limit the number of transmitting messages to the BS. LEACH [3] and PEGASIS [4] are the hierarchical based
routing protocols. PEGASIS is a chain based routing protocol, which is an enhancement of LEACH protocol. It
saves a huge amount of energy compared with the LEACH by upgrading the delivery method of information.
However, the PEGASIS also has so many issues requiring solutions.
II. The Current Situation Of WSN
For efficient use of power, researchers have proposed many routing algorithms. Among them,
PEGASIS is a typical chain based algorithm. Many other algorithms based on PEGASIS are EEPB [5], IEEPB
[6], PEG-Ant [7] and MH-PEGASIS [8] et al.
2.1. PEGASIS Algorithm
The concept of PEGASIS is for each node to receive from previous neighbor and transmit to next
closest neighbor on the chain. And alternately leader in each round takes turns transmitting to the BS in the
chain. This balances the energy among an overall network. The nodes randomly placed in the network area and
form a chain using a greedy algorithm. On the other hand, base station (BS) forms this chain and broadcasts it to
all the nodes in the network. Main advantage in PEGASIS is single node manages the data gathering and data
fusion and also leader will receive maximum two messages from the neighbors. On other hand probability of
long link chain is very high and increase the time delay using greedy approach.
For chain formation, we assume that all sensor nodes are aware of the network and the greedy
methodology. In this process, the chain formation done before the first round of communication. To form the
chain, we begin with the furthest node from the BS in order to make sure that sensor nodes far away from the
BS have near neighbor nodes. Distances of neighbors will increase moderately in greedy approach since nodes
already in the chain cannot be revisited.
Performance Evaluation and QoS Analysis of EEPB and PDCH Routing Protocols in Wireless…
DOI: 10.9790/0661-1754101109 www.iosrjournals.org 102 | Page
PEGASIS uses a greedy algorithm to construct a chain. When a node in chain looks for a downstream
node, a node chooses the closest node to itself as downstream node. In local area, the greedy algorithm can
guarantee the distance of a pair of nodes is shortest. Therefore, sensors can consume least energy in this
condition. But in the opinion of a global network, the greedy algorithm will result in a dangerous mechanism
"long chain". "Long chain", also known as Long Link (LL) means the distance between a pair of nodes is much
longer than other pairs. The occurrence of "LL" is not due to some nodes far away from the main body of the
network. An upstream node uses a greedy algorithm to find nearest node in all disjointed nodes as its
downstream node. But in some phase, an upstream node cannot find the nearest node in its neighbors. In this
case it has to choose a node from far away nodes as its downstream node. Therefore, "LL" is inevitable.
III. EEPB Algorithm
A new algorithm EEPB introduced a new method to avoid long chain between the nodes. It is an
enhancement of PEGASIS algorithm. That says the distance between sensor nodes is the first aspect. It first
calculates the distance between each node from the formed chain. After that “thresh” is calculated from the
average distance of the formed chain. The distance from the closest node to its upstream node is longer than the
distance “thresh”, the closest node is the “far node”. If the closest node combines the chain, it will result in the
emergence of LL. In this scenario the “far node” will search a nearer node on formed chain. Through this
approach LL is evaded efficiently. This not only balances the energy consumption of nodes, but also conserves
energy on sensors. EEPB overcomes several problems over PEGASIS but still has deficiencies as follows.
 While EEPB choose the leader node, it ignores the node energy and distance between the nodes to BS,
which improves the leader selection depending on different environment conditions.
 EEPB minimizes the LL between the neighbor nodes in chain by applying the distance threshold “α” which
is predefined by the user. This threshold makes a different impact on the chain formation. If the “α” is too
small, it is possible that the link distance between the nodes will be greater than the “α”, hence LL creation
is unavoidable. If the “α” is too large, then it won‟t be able to judge and restrain the link distance and LL
will be formed. And finally in extreme case, if “α” is infinite the chain formation of EEPB will be same as
PEGASIS. This analysis concludes that determining the value of “α” is very complex. Also EEPB considers
remaining energy of the node and its distance from the BS to select the leader. This method is inappropriate
for balancing the energy consumption according to different application requirements.
In EEPB, there are mainly 3 phases: (i) Node selection phase, (ii) Chain construction phase, (iii) Data
Transmission phase.
3.1. Node Selection Phase
 Initialize 100 nodes, energy and location of all nodes.
 A source node S announce a route request message to obtain the distance of each node from source node S.
For nodes s0, s1, s2….. s99. Compare d (s0), d (s1), d (s2)…. D (s99) from a source node (S). Where, d (s)
is the distance of a neighbor from the Source node.
 At the source node S, the neighbor with shortest path is selected for transmitting the data.
 The selected neighbors will act source for other nodes which have not joined the chain yet.
3.2. Chain Construction Phase
 Let us consider that an upstream node wants to search a new node for communication. If the distance from
the upstream node to the closest node is longer than the Dthreshold, it will possibly lead to the formation of
LL. Dthreshold is calculated from the average distance of the formed chain.
 Let N be the Number of nodes, such that Sk (k = 1, 2, 3 …N).
 The distance between two nodes is given as (Dij, h) where h is the hop number of the formed chain.
 The distance of every segment in the formed chain is given by Dp, where (p=1, 2, 3 …h).
 is the average distance in the formed chain that is calculated by,
 is the threshold distance that is calculated by,
 Where α is a user defined constant.
 Let us assume that node Sm chooses node Sn as its downstream node. Sm intimates Sn to join the chain and to
look for other nodes to participate in the chain.
 When Sn receives the data packet from Sm it starts computing .
Performance Evaluation and QoS Analysis of EEPB and PDCH Routing Protocols in Wireless…
DOI: 10.9790/0661-1754101109 www.iosrjournals.org 103 | Page
 On the basis of , it will calculate .
 Sn will then send the chaining request to all the other nodes that haven‟t yet joined the chain.
 Sn then select a node whose Di,j will be minimum.
 Let us assume that St is that node. Hence min (di, j) = dn,t. Then compare dn,t with .
 If dn,t < , it is clear that Sn is not far away from Sl. Hence, when St joins the chain, it will not lead to
formation of LL. Thus Sn will choose St as the downstream node and ask St to continue the chain formation.
 If dn,t > , it indicates that Sn is far away from St. In this case if St joins the chain it will lead to the
formation of LL.
 St will consume more energy for data transmission, therefore it will look for any other node who is nearer to
Sn than itself. If it finds such node than Sn will be the end node on that data chain and St will join the chain
through the nearer node and finish the chain formation process. But if St fails to find such node than LL is
unavoidable. Thus St will join the data chain directly through Sn and terminate the chain process.
3.3. Data Transmission Phase
 Once the chain is done, the end node starts the transmission of data.
 Each node collects the data from the downstream node with its own data and then sent to the upstream
node.
 Every node in the chain repeats the procedure until all nodes are traversed. At last the leader node sends the
data to BS.
IV. PDCH Algorithm
Based on the above analysis, this paper presents a new PEGASIS based routing protocol called PDCH.
PDCH uses double cluster head instead of single cluster head to distribute energy load among all nodes to
increase the network lifetime. Also PDCH uses a dynamic cluster formation to eliminate overhead and reduce
the distance of transmission by choosing appropriate node based on residual energy and neighbor nodes. PDCH
is an improved routing algorithm over EEPB. In PDCH, there are mainly 4 phases: (i) Cluster Formation phase,
(ii) Chain construction phase within a cluster, (iii) Cluster Heads Selection phase, (iv) Data Transmission phase.
4.1. Cluster Formation Phase
 In PDCH [10], network is created using random node deployment and BS is plotted at the given location.
After that the distance from BS to all other nodes in the network is found using the Euclidean distance
formula.
Fig. 1. Level formation
=
Where,
is the 𝑖𝑡ℎ node distance from BS
& are the coordinates of the BS
& are the coordinates of the 𝑖𝑡ℎ node
 Now distance of every node to the BS is decided the level which node belongs to.
 Every level has a unique ID. The first level 0 belongs to BS. The second level is 1, in which nodes are
closest to BS and so forth. For example, the nodes which are less than or equal to 250 meters comes under
Performance Evaluation and QoS Analysis of EEPB and PDCH Routing Protocols in Wireless…
DOI: 10.9790/0661-1754101109 www.iosrjournals.org 104 | Page
first cluster (level id = 1). 250 meters to 350 meters come under second cluster (level id = 2), 350 meters to
450 meters come under third cluster (level id=3) and 450 meters to 600 meters come under fourth cluster
(level id=4).
 Note that the cluster level formation always runs at the start, and once it is done, it will not be changed in
the whole process. So this can save energy compared to frequently level forms in every round. Figure 1
shows the level formation in PDCH.
4.2. Chain Construction Phase
 After cluster formation, we use the EEPB algorithm for chain construction in every cluster level.
 Nodes with same level id can only involve in same chain.
 Nodes with different level id cannot involve in one chain.
4.3. Cluster Head Selection Phase
In PDCH, we use the double cluster head method. One is the main cluster head (MCH) and another is
the secondary cluster head (SCH).
4.3.1. Selection of MCH
 Initially set up a parameter „n‟ on every node N(i), where i indicates number of nodes. If node N(i) haven't
join in the chains, then n=0, when node N(i) was selected by N(i-1) to join the chain, we set n=(n+1), every
time when a new node join in a chain, the parameter „n‟ of select node automatic increment by 1. When
chain construction is complete, we will analyze the parameter n, if n>2, we consider that N(i) has branch
chain.
 Node having a branch chain has a bigger chance to be selected as CH than other nodes in every chain.
 Node having the highest neighbor to be selected as MCH.
 If more than one node have the same number of neighbors, than from them, node with high energy to be
selected as MCH. Figure 2 shows chain formation and branch chain concept.
Fig. 2. Chain formation
The marked nodes show that the number of neighbors is more than 2. These nodes have one or more
than one branch chain, so they have greater opportunity to be selected as MCH in every level.
4.3.2. Selection of SCH
 If only MCH is responsible for gathering local level data and transmitting this data to upper level, then it
becomes a burden for main node. So we choose SCH in every level.
 If MCH has exactly 3 neighbors, then there is only single branch chain, we will select a node belong to the
branch chain as the SCH.
 If the neighbor of MCH more than 3, then there is more than one branch chain exist with main CH. In this
situation, we will select the node belong to the branch chain which is more closer to the BS or minimum
distance from BS as the secondary CH. Figure 3 shows the double cluster head method.
Performance Evaluation and QoS Analysis of EEPB and PDCH Routing Protocols in Wireless…
DOI: 10.9790/0661-1754101109 www.iosrjournals.org 105 | Page
Fig. 3. Double cluster head method
4.4. Data Transmission Phase
4.4.1. Function of MCH
 The main function of MCH is to collect the local level data from all the nodes in the cluster and aggregate
this data.
 After that, MCH transmits these aggregated data to the SCH in the same level. In figure 3, purple line
shows the transmission from MCH to SCH.
4.4.2. Function of SCH
 The function of SCH is to receive gathered data from MCH and transmitting this data to BS.
 For sending the data to BS, we should chain up all the SCHs, and transmit it to BS through this chain. In
figure 3, red line shows the chain of secondary CHs.
V. Simulation And Result Analysis
Simulation is performed to evaluate and compare the performance of EEPB and PDCH protocols. The
network model is described in section 5.1. The performance metrics and results are used to compare their
effectiveness are given in section 5.2.
5.1. Network Model
In this paper, WSN has the following properties:
 1000m × 1000m network area in which 100 nodes scenarios are densely deployed.
 The sensor nodes are static. Once sensor nodes have been deployed, they work in the environment without
movement.
 The sensor nodes are homogeneous in that they have equal capabilities (initial energy, data processing,
wireless communication).
 Sensor nodes have sensing range up to the 250 meters.
Table 1 shows the value assigned to different network parameters.
Table 1. Network Model
Parameters Value
Network Area 1000 × 1000 m2
Sensor Nodes 100
Node Sensing Range 250 meter
Data Rate 512 kbps
Initial Energy 100 J
Transmission Power 0.9 J
Receiving Power 0.8 J
Sensing Power 0.0175 J
Performance Evaluation and QoS Analysis of EEPB and PDCH Routing Protocols in Wireless…
DOI: 10.9790/0661-1754101109 www.iosrjournals.org 106 | Page
5.2. Simulation Results
This paper uses NS2 as a simulator to evaluate the performance of PDCH comparing with EEPB. The
simulation focuses on delay, energy consumption, dead nodes, network overhead, packet loss ratio and
throughput which are important indicators to measure end to end performance of different routing algorithms.
Fig. 4. Delay
Figure 4 shows the delay of EEPB and PDCH protocols in terms of completion of one round of communication.
The graph indicates PDCH has 57.77 % less delay compare to EEPB.
Fig. 5. Energy consumption
Figure 5 indicates energy consumption ratio of both the protocols. For the maximum number of packets
transferred, PDCH consumes 41.42 % less energy than EEPB. It shows that PDCH has better lifetime compare
to EEPB.
Performance Evaluation and QoS Analysis of EEPB and PDCH Routing Protocols in Wireless…
DOI: 10.9790/0661-1754101109 www.iosrjournals.org 107 | Page
Fig. 6. Dead nodes
In figure 6 the dead node of both protocols is shown. It is clearly seen that percentage of nodes dead in EEPB is
very high than PDCH. As per simulation result PDCH has 50 % less dead nodes than EEPB.
Fig. 7. Network overhead
Figure 7 shows the overall network overhead of both protocols. Overhead in terms of extra data to route packets
at the destination. The graph clearly indicates that PDCH has 69.12 % less overhead compare to EEPB.
Figure 8 shows throughput of both protocols. It shows that throughput of PDCH protocol is better than EEPB
protocol. Throughput is measured in terms of the number of data packets received with respect to time. The
graph shows that PDCH has 16.66 % higher throughput than EEPB protocol.
Performance Evaluation and QoS Analysis of EEPB and PDCH Routing Protocols in Wireless…
DOI: 10.9790/0661-1754101109 www.iosrjournals.org 108 | Page
Fig. 8. Throughput
Fig. 9. Packet loss ratio
Figure 9 shows the packet loss ratio of EEPB and PDCH protocols. The graph shows PDCH drops less packets
than EEPB protocol. As per result PDCH has 17.5 % less packet loss ratio than EEPB protocol.
VI. Conclusion and Future Work
This paper proposes the methodology of PDCH protocol in order to improve the deficiencies of EEPB
protocol. The novel protocol adopts a new distance based cluster selection method as well as double cluster head
method in every cluster to balance the overall network load. This technique improves the performance of the
overall network. Comparison between PDCH and EEPB protocol is performed and QoS is improvised.
Simulation results show that PDCH outperforms EEPB by 57.77 %, 41.42 %, 50 %, 69.12 %, 16.66 % and
17.50 % in terms of delay, energy consumption, dead nodes, network overhead, throughput and packet loss ratio
respectively. Thus, it is concluded that PDCH has the better end to end performance than EEPB protocol. In
future, PDCH protocol can be compared with other PEGASIS based protocols and QoS can be analyzed.
References
[1] Akyildiz et al., “A Survey on Sensor Networks,” IEEE Commun. Mag., vol. 40, no. 8, Aug. 2002, pp. 102–144.
[2] J. Al-Karaki, and A. Kamal, “Routing Techniques in Wireless Sensor Networks: A Survey,” IEEE Communications Magazine, vol
11, no. 6, pp. 6-28, Dec. 2004.
[3] W. Heinzelman, A. Chandrakasan and H. Balakarishnan, “Energy-Efficient Communication Protocols for Wireless Microsensor
Networks,” in Proceedings of the 33rd
Annual Hawaii International Conference on Systems Science, Jan. 2000.
[4] S. Lindsey and C. S. Raghavendra, “PEGASIS: Power-efficient gathering in sensor information systems,” in IEEE Aerospace
Conference Proceedings, vol. 3, pp. 1125-1130, March 2002.
Performance Evaluation and QoS Analysis of EEPB and PDCH Routing Protocols in Wireless…
DOI: 10.9790/0661-1754101109 www.iosrjournals.org 109 | Page
[5] YU Yong-chang, WEI Gang, “An Improved PEGASIS Algorithm in Wireless Sensor Network,” in the proceedings of Acta
Electronica Sinica, vol.36, pp.1309- 1313, July 2008.
[6] Feng Sen, Qi Bing and Tang Liangrui, “An Improved Energy-Efficient PEGASIS-Based Protocol in Wireless Sensor Networks,” in
Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), vol. 4, pp. 2230-2233, Shanghai, 2011.
[7] GUO. Wen-yu, ZHANG Wei and LU Gang, “PEGASIS protocol in wireless sensor network based on an improved ant colony
algorithm,” in the IEEE proceedings of Second International Workshop on Education Technology and Computer Science, pp. 64-
67, 2010.
[8] Z. Aliouat and M. Aliouat, “Efficient Management of Energy Budget for PEGASIS Routing Protocol,” in 6th International
Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), pp. 516-521, Sousse,
March 2012.
[9] Wang Linping, Cai Zhen, Bi Wu and Wang Zufeng, “Improved algorithm of PEGASIS protocol introducing double cluster heads in
wireless sensor network,” in International Conference on Computer, Mechatronics, Control and Electronic Engineering (CMCE),
vol. 1, pp. 148-151, Changchun, Aug. 2010.
[10] Jigish Rana, Sangeeta Vhatkar, Mohommad Atique, “Comparative Study of PEGASIS and PDCH Protocols in Wireless Sensor
Network,” in International Journal of Computer Applications (IJCA) Proceeding on International Conference and Workshop on
Emerging Trends in Technology ICWET, pp. 13-18, May 2015.
[11] S. Lindsey, C. Raghavendra and K. M. Sivalingam, “Data Gathering algorithms in sensor networks using the energy metric,” in
IEEE Transactions on Parallel and Distributed Systems, vol. 13, Issue 9, pp. 924-935, Sep. 2002.
[12] S. Vhatkar, M. Atique, “Design Issues, Characteristics and Challenges in Routing Protocols for Wireless Sensor Networks,”
International Journal of Computer Applications (0975 – 8887) International Conference and Workshop on Emerging Trends in
Technology, 2013.
[13] T. Shankar, Dr. S. Shanmugavel, “Hybrid Approach For Energy Optimization In Cluster Based WSN Using Energy Balancing
Clustering Protocol,” Journal of Theoretical and Applied Information Technology, vol. 49, pp. 906-921, March 2013.

More Related Content

What's hot

Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor network
eSAT Publishing House
 
Flow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networksFlow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networks
eSAT Publishing House
 
The Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localizationThe Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localization
IJERA Editor
 
Shortcut Path Tress for Zigbee based Wireless Network
Shortcut Path Tress for Zigbee based Wireless NetworkShortcut Path Tress for Zigbee based Wireless Network
Shortcut Path Tress for Zigbee based Wireless Network
IJERA Editor
 
On the routing overhead in infrastructureless multihop wireless networks
On the routing overhead in infrastructureless multihop wireless networksOn the routing overhead in infrastructureless multihop wireless networks
On the routing overhead in infrastructureless multihop wireless networks
Narendra Singh Yadav
 
tankala srinivas, palasa
tankala srinivas, palasatankala srinivas, palasa
tankala srinivas, palasa
shiva782
 
F04503057062
F04503057062F04503057062
F04503057062
ijceronline
 
1 p pranitha final_paper--1-5
1 p pranitha final_paper--1-51 p pranitha final_paper--1-5
1 p pranitha final_paper--1-5
Alexander Decker
 
Ag26204209
Ag26204209Ag26204209
Ag26204209
IJERA Editor
 
Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission using
eSAT Publishing House
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Ali Habeeb
 
Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...
eSAT Journals
 
A comparative study in wireless sensor networks
A comparative study in wireless sensor networksA comparative study in wireless sensor networks
A comparative study in wireless sensor networks
ijwmn
 
A2546035115
A2546035115A2546035115
A2546035115
Prafull Maktedar
 
32 marycherian 336-349
32 marycherian 336-34932 marycherian 336-349
32 marycherian 336-349
Alexander Decker
 
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Narendra Singh Yadav
 
A Fast Convergence and Quick Route Updates Based Energy Aware Tree-Based Rout...
A Fast Convergence and Quick Route Updates Based Energy Aware Tree-Based Rout...A Fast Convergence and Quick Route Updates Based Energy Aware Tree-Based Rout...
A Fast Convergence and Quick Route Updates Based Energy Aware Tree-Based Rout...
iosrjce
 
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
Sathish Silence
 
34 9141 it ns2-tentative route selection approach for edit septian
34 9141 it  ns2-tentative route selection approach for edit septian34 9141 it  ns2-tentative route selection approach for edit septian
34 9141 it ns2-tentative route selection approach for edit septian
IAESIJEECS
 
[IJET-V1I3P13] Authors :Aishwarya Manjunath, Shreenath K N, Dr. Srinivasa K G.
[IJET-V1I3P13] Authors :Aishwarya Manjunath, Shreenath K N, Dr. Srinivasa K G.[IJET-V1I3P13] Authors :Aishwarya Manjunath, Shreenath K N, Dr. Srinivasa K G.
[IJET-V1I3P13] Authors :Aishwarya Manjunath, Shreenath K N, Dr. Srinivasa K G.
IJET - International Journal of Engineering and Techniques
 

What's hot (20)

Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor network
 
Flow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networksFlow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networks
 
The Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localizationThe Expansion of 3D wireless sensor network Bumps localization
The Expansion of 3D wireless sensor network Bumps localization
 
Shortcut Path Tress for Zigbee based Wireless Network
Shortcut Path Tress for Zigbee based Wireless NetworkShortcut Path Tress for Zigbee based Wireless Network
Shortcut Path Tress for Zigbee based Wireless Network
 
On the routing overhead in infrastructureless multihop wireless networks
On the routing overhead in infrastructureless multihop wireless networksOn the routing overhead in infrastructureless multihop wireless networks
On the routing overhead in infrastructureless multihop wireless networks
 
tankala srinivas, palasa
tankala srinivas, palasatankala srinivas, palasa
tankala srinivas, palasa
 
F04503057062
F04503057062F04503057062
F04503057062
 
1 p pranitha final_paper--1-5
1 p pranitha final_paper--1-51 p pranitha final_paper--1-5
1 p pranitha final_paper--1-5
 
Ag26204209
Ag26204209Ag26204209
Ag26204209
 
Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission using
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
 
Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...Performance analysis on multihop transmission using arp routing protocol in i...
Performance analysis on multihop transmission using arp routing protocol in i...
 
A comparative study in wireless sensor networks
A comparative study in wireless sensor networksA comparative study in wireless sensor networks
A comparative study in wireless sensor networks
 
A2546035115
A2546035115A2546035115
A2546035115
 
32 marycherian 336-349
32 marycherian 336-34932 marycherian 336-349
32 marycherian 336-349
 
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing ProtocolsPerformance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
Performance Evaluation and Comparison of Ad-Hoc Source Routing Protocols
 
A Fast Convergence and Quick Route Updates Based Energy Aware Tree-Based Rout...
A Fast Convergence and Quick Route Updates Based Energy Aware Tree-Based Rout...A Fast Convergence and Quick Route Updates Based Energy Aware Tree-Based Rout...
A Fast Convergence and Quick Route Updates Based Energy Aware Tree-Based Rout...
 
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
A General Self Organized Tree Based Energy Balance Routing Protocol for WSN
 
34 9141 it ns2-tentative route selection approach for edit septian
34 9141 it  ns2-tentative route selection approach for edit septian34 9141 it  ns2-tentative route selection approach for edit septian
34 9141 it ns2-tentative route selection approach for edit septian
 
[IJET-V1I3P13] Authors :Aishwarya Manjunath, Shreenath K N, Dr. Srinivasa K G.
[IJET-V1I3P13] Authors :Aishwarya Manjunath, Shreenath K N, Dr. Srinivasa K G.[IJET-V1I3P13] Authors :Aishwarya Manjunath, Shreenath K N, Dr. Srinivasa K G.
[IJET-V1I3P13] Authors :Aishwarya Manjunath, Shreenath K N, Dr. Srinivasa K G.
 

Viewers also liked

Small ruminant research and development in Ethiopia
Small ruminant research and development in Ethiopia Small ruminant research and development in Ethiopia
Small ruminant research and development in Ethiopia
ILRI
 
Matric Certificate and Achievements
Matric Certificate and AchievementsMatric Certificate and Achievements
Matric Certificate and AchievementsWiko Steyn
 
DH-VIDB-16-1-web - PDF
DH-VIDB-16-1-web - PDFDH-VIDB-16-1-web - PDF
DH-VIDB-16-1-web - PDF
Leah Gullan
 
Final Dissertation Ready for Print
Final Dissertation Ready for PrintFinal Dissertation Ready for Print
Final Dissertation Ready for Print
Muhammad Achar Bozdar
 
LISP:Predicates in lisp
LISP:Predicates in lispLISP:Predicates in lisp
LISP:Predicates in lisp
DataminingTools Inc
 
From a drop to the river -- the evolution of some Scrummy Stuff!
From a drop to the river -- the evolution of some Scrummy Stuff!From a drop to the river -- the evolution of some Scrummy Stuff!
From a drop to the river -- the evolution of some Scrummy Stuff!
Nitin Khanna, Scrum Coach
 
Horro sheep and production system in Horro areas of Ethiopia
Horro sheep and production system in Horro areas of EthiopiaHorro sheep and production system in Horro areas of Ethiopia
Horro sheep and production system in Horro areas of Ethiopia
ILRI
 
LISP: Type specifiers in lisp
LISP: Type specifiers in lispLISP: Type specifiers in lisp
LISP: Type specifiers in lisp
DataminingTools Inc
 
Tema1
Tema1Tema1
Tema1
7304560
 
Introduction to the Python conda package manager
Introduction to the Python conda package managerIntroduction to the Python conda package manager
Introduction to the Python conda package manager
Damien Garaud
 
ATD15-Building Collaboration-Manoj Jain
ATD15-Building Collaboration-Manoj JainATD15-Building Collaboration-Manoj Jain
ATD15-Building Collaboration-Manoj Jain
Madhur Kathuria
 
Rumbo A La Universidad
Rumbo A La UniversidadRumbo A La Universidad
Rumbo A La Universidad
felibernardo
 
Music video – prelim – editing diary
Music video – prelim – editing diaryMusic video – prelim – editing diary
Music video – prelim – editing diary
diadelosmuertosproductions
 
El comportamiento agresivo 1
El comportamiento agresivo 1El comportamiento agresivo 1
El comportamiento agresivo 1
Zenayde Olmos Salvatierra
 
Trabajo Colaborativo
Trabajo ColaborativoTrabajo Colaborativo
Trabajo Colaborativo
Natalí Pizzotti
 
LISP: Input And Output
LISP: Input And OutputLISP: Input And Output
LISP: Input And Output
DataminingTools Inc
 
Color Coding-Related Techniques
Color Coding-Related TechniquesColor Coding-Related Techniques
Color Coding-Related Techniques
cseiitgn
 
Final betão leve de elevado desempenho high performance light weight concre...
Final betão leve de elevado desempenho   high performance light weight concre...Final betão leve de elevado desempenho   high performance light weight concre...
Final betão leve de elevado desempenho high performance light weight concre...
Ahmad Alshaghel
 

Viewers also liked (20)

04
0404
04
 
Small ruminant research and development in Ethiopia
Small ruminant research and development in Ethiopia Small ruminant research and development in Ethiopia
Small ruminant research and development in Ethiopia
 
Diet Supplement
Diet SupplementDiet Supplement
Diet Supplement
 
Matric Certificate and Achievements
Matric Certificate and AchievementsMatric Certificate and Achievements
Matric Certificate and Achievements
 
DH-VIDB-16-1-web - PDF
DH-VIDB-16-1-web - PDFDH-VIDB-16-1-web - PDF
DH-VIDB-16-1-web - PDF
 
Final Dissertation Ready for Print
Final Dissertation Ready for PrintFinal Dissertation Ready for Print
Final Dissertation Ready for Print
 
LISP:Predicates in lisp
LISP:Predicates in lispLISP:Predicates in lisp
LISP:Predicates in lisp
 
From a drop to the river -- the evolution of some Scrummy Stuff!
From a drop to the river -- the evolution of some Scrummy Stuff!From a drop to the river -- the evolution of some Scrummy Stuff!
From a drop to the river -- the evolution of some Scrummy Stuff!
 
Horro sheep and production system in Horro areas of Ethiopia
Horro sheep and production system in Horro areas of EthiopiaHorro sheep and production system in Horro areas of Ethiopia
Horro sheep and production system in Horro areas of Ethiopia
 
LISP: Type specifiers in lisp
LISP: Type specifiers in lispLISP: Type specifiers in lisp
LISP: Type specifiers in lisp
 
Tema1
Tema1Tema1
Tema1
 
Introduction to the Python conda package manager
Introduction to the Python conda package managerIntroduction to the Python conda package manager
Introduction to the Python conda package manager
 
ATD15-Building Collaboration-Manoj Jain
ATD15-Building Collaboration-Manoj JainATD15-Building Collaboration-Manoj Jain
ATD15-Building Collaboration-Manoj Jain
 
Rumbo A La Universidad
Rumbo A La UniversidadRumbo A La Universidad
Rumbo A La Universidad
 
Music video – prelim – editing diary
Music video – prelim – editing diaryMusic video – prelim – editing diary
Music video – prelim – editing diary
 
El comportamiento agresivo 1
El comportamiento agresivo 1El comportamiento agresivo 1
El comportamiento agresivo 1
 
Trabajo Colaborativo
Trabajo ColaborativoTrabajo Colaborativo
Trabajo Colaborativo
 
LISP: Input And Output
LISP: Input And OutputLISP: Input And Output
LISP: Input And Output
 
Color Coding-Related Techniques
Color Coding-Related TechniquesColor Coding-Related Techniques
Color Coding-Related Techniques
 
Final betão leve de elevado desempenho high performance light weight concre...
Final betão leve de elevado desempenho   high performance light weight concre...Final betão leve de elevado desempenho   high performance light weight concre...
Final betão leve de elevado desempenho high performance light weight concre...
 

Similar to O01754101109

MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR H...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT  HIERARCHICAL CLUSTERING SCHEME FOR  H...MULTI-HOP DISTRIBUTED ENERGY EFFICIENT  HIERARCHICAL CLUSTERING SCHEME FOR  H...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR H...
ijfcstjournal
 
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
IOSR Journals
 
E017332733
E017332733E017332733
E017332733
IOSR Journals
 
Enhanced Threshold Sensitive Stable Election Protocol
Enhanced Threshold Sensitive Stable Election ProtocolEnhanced Threshold Sensitive Stable Election Protocol
Enhanced Threshold Sensitive Stable Election Protocol
iosrjce
 
A Novel Routing Algorithm for Wireless Sensor Network Using Particle Swarm O...
A Novel Routing Algorithm for Wireless Sensor Network Using  Particle Swarm O...A Novel Routing Algorithm for Wireless Sensor Network Using  Particle Swarm O...
A Novel Routing Algorithm for Wireless Sensor Network Using Particle Swarm O...
IOSR Journals
 
Gateway based stable election
Gateway based stable electionGateway based stable election
Gateway based stable election
ijmnct
 
Abstract
AbstractAbstract
Abstract
Anand B
 
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
inventionjournals
 
M010226367
M010226367M010226367
M010226367
IOSR Journals
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
acijjournal
 
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
IJSRED
 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
IJTET Journal
 
Aa35152156
Aa35152156Aa35152156
Aa35152156
IJERA Editor
 
Aa35152156
Aa35152156Aa35152156
Aa35152156
IJERA Editor
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing Protocol
IOSR Journals
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing Protocol
IOSR Journals
 
G010633439
G010633439G010633439
G010633439
IOSR Journals
 
A Review of Atypical Hierarchical Routing Protocols for Wireless Sensor Networks
A Review of Atypical Hierarchical Routing Protocols for Wireless Sensor NetworksA Review of Atypical Hierarchical Routing Protocols for Wireless Sensor Networks
A Review of Atypical Hierarchical Routing Protocols for Wireless Sensor Networks
iosrjce
 
D0441722
D0441722D0441722
D0441722
IJERA Editor
 
Ed33777782
Ed33777782Ed33777782
Ed33777782
IJERA Editor
 

Similar to O01754101109 (20)

MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR H...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT  HIERARCHICAL CLUSTERING SCHEME FOR  H...MULTI-HOP DISTRIBUTED ENERGY EFFICIENT  HIERARCHICAL CLUSTERING SCHEME FOR  H...
MULTI-HOP DISTRIBUTED ENERGY EFFICIENT HIERARCHICAL CLUSTERING SCHEME FOR H...
 
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
Nearest Adjacent Node Discovery Scheme for Routing Protocol in Wireless Senso...
 
E017332733
E017332733E017332733
E017332733
 
Enhanced Threshold Sensitive Stable Election Protocol
Enhanced Threshold Sensitive Stable Election ProtocolEnhanced Threshold Sensitive Stable Election Protocol
Enhanced Threshold Sensitive Stable Election Protocol
 
A Novel Routing Algorithm for Wireless Sensor Network Using Particle Swarm O...
A Novel Routing Algorithm for Wireless Sensor Network Using  Particle Swarm O...A Novel Routing Algorithm for Wireless Sensor Network Using  Particle Swarm O...
A Novel Routing Algorithm for Wireless Sensor Network Using Particle Swarm O...
 
Gateway based stable election
Gateway based stable electionGateway based stable election
Gateway based stable election
 
Abstract
AbstractAbstract
Abstract
 
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
Link Prediction And Link Establishment Based On Network Nodes Life Time In Mo...
 
M010226367
M010226367M010226367
M010226367
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
 
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
 
Aa35152156
Aa35152156Aa35152156
Aa35152156
 
Aa35152156
Aa35152156Aa35152156
Aa35152156
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing Protocol
 
Congestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing ProtocolCongestion Control in Manets Using Hybrid Routing Protocol
Congestion Control in Manets Using Hybrid Routing Protocol
 
G010633439
G010633439G010633439
G010633439
 
A Review of Atypical Hierarchical Routing Protocols for Wireless Sensor Networks
A Review of Atypical Hierarchical Routing Protocols for Wireless Sensor NetworksA Review of Atypical Hierarchical Routing Protocols for Wireless Sensor Networks
A Review of Atypical Hierarchical Routing Protocols for Wireless Sensor Networks
 
D0441722
D0441722D0441722
D0441722
 
Ed33777782
Ed33777782Ed33777782
Ed33777782
 

More from IOSR Journals

A011140104
A011140104A011140104
A011140104
IOSR Journals
 
M0111397100
M0111397100M0111397100
M0111397100
IOSR Journals
 
L011138596
L011138596L011138596
L011138596
IOSR Journals
 
K011138084
K011138084K011138084
K011138084
IOSR Journals
 
J011137479
J011137479J011137479
J011137479
IOSR Journals
 
I011136673
I011136673I011136673
I011136673
IOSR Journals
 
G011134454
G011134454G011134454
G011134454
IOSR Journals
 
H011135565
H011135565H011135565
H011135565
IOSR Journals
 
F011134043
F011134043F011134043
F011134043
IOSR Journals
 
E011133639
E011133639E011133639
E011133639
IOSR Journals
 
D011132635
D011132635D011132635
D011132635
IOSR Journals
 
C011131925
C011131925C011131925
C011131925
IOSR Journals
 
B011130918
B011130918B011130918
B011130918
IOSR Journals
 
A011130108
A011130108A011130108
A011130108
IOSR Journals
 
I011125160
I011125160I011125160
I011125160
IOSR Journals
 
H011124050
H011124050H011124050
H011124050
IOSR Journals
 
G011123539
G011123539G011123539
G011123539
IOSR Journals
 
F011123134
F011123134F011123134
F011123134
IOSR Journals
 
E011122530
E011122530E011122530
E011122530
IOSR Journals
 
D011121524
D011121524D011121524
D011121524
IOSR Journals
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 

Recently uploaded (20)

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 

O01754101109

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. IV (Sep. – Oct. 2015), PP 101-109 www.iosrjournals.org DOI: 10.9790/0661-1754101109 www.iosrjournals.org 101 | Page Performance Evaluation and QoS Analysis of EEPB and PDCH Routing Protocols in Wireless Sensor Networks Sangeeta Vhatkar 1 , Jigish Rana 2 , Mohammad Atique 3 1 (Assistant Professor, TCET, Ph.D. Scholar P.I.E.T., Nagpur, India) 2 (M.E.I.T. (Pursuing), Thakur College of Engineering and Technology, University of Mumbai, India) 3 (Associate Professor, P.G. Department of Computer Science, S.G.B.A.U., Amravati, India) Abstract : EEPB (Energy-Efficient PEGASIS-Based protocol) is a chain-based protocol. It has certain deficiencies such as it ignores the nodes energy and distance between nodes to BS when selecting the leader. It causes overhead, maximize the overall network delay and consumes more energy because of more number of transmission and receives among all nodes. Aiming at these problems, PDCH (PEGASIS with Double Cluster Head) is proposed in this paper. PDCH uses a double cluster head instead of single cluster head to distribute energy load among all nodes to increase the network lifetime. Also PDCH uses a dynamic cluster formation to eliminate overhead and reduce the distance of transmission by choosing appropriate node based on residual energy and neighbor nodes. The simulation results show that PDCH has a better performance than EEPB on the efficiency of energy consumption, minimizing network overhead, increasing the network lifetime and balancing load of the network. Keywords: Double Cluster Head, EEPB, Hierarchical Routing, PDCH, PEGASIS, Wireless Sensor Network I. Introduction Wireless Sensor Networks (WSNs) [1] have been identified as one of the most important technologies of recent years. WSN consists a large number of dispersed and dedicated sensors in order to sense the physical conditions of the environment like sound, temperature, humidity, pollution levels and pressure and so on. WSN has empowered the advancement of low cost, low power, multi-functional smart sensor nodes. On the other hand the nodes have limited amount of communication capacity and computing power. So how to optimize the transmission distance and route, load balance, network lifetime and energy efficiency has become an important issue of routing protocols. Routing protocols in WSNs are broadly classified as, Hierarchical routing protocols (HRP) [2], Quality of service based routing protocols, Location Based routing protocols and Flat based routing protocols. HRPs are broadly used for their great energy efficiency and good expandability. Hierarchical routing is an efficient method to less energy consumption within a cluster and by performing data collection and fusion in order to limit the number of transmitting messages to the BS. LEACH [3] and PEGASIS [4] are the hierarchical based routing protocols. PEGASIS is a chain based routing protocol, which is an enhancement of LEACH protocol. It saves a huge amount of energy compared with the LEACH by upgrading the delivery method of information. However, the PEGASIS also has so many issues requiring solutions. II. The Current Situation Of WSN For efficient use of power, researchers have proposed many routing algorithms. Among them, PEGASIS is a typical chain based algorithm. Many other algorithms based on PEGASIS are EEPB [5], IEEPB [6], PEG-Ant [7] and MH-PEGASIS [8] et al. 2.1. PEGASIS Algorithm The concept of PEGASIS is for each node to receive from previous neighbor and transmit to next closest neighbor on the chain. And alternately leader in each round takes turns transmitting to the BS in the chain. This balances the energy among an overall network. The nodes randomly placed in the network area and form a chain using a greedy algorithm. On the other hand, base station (BS) forms this chain and broadcasts it to all the nodes in the network. Main advantage in PEGASIS is single node manages the data gathering and data fusion and also leader will receive maximum two messages from the neighbors. On other hand probability of long link chain is very high and increase the time delay using greedy approach. For chain formation, we assume that all sensor nodes are aware of the network and the greedy methodology. In this process, the chain formation done before the first round of communication. To form the chain, we begin with the furthest node from the BS in order to make sure that sensor nodes far away from the BS have near neighbor nodes. Distances of neighbors will increase moderately in greedy approach since nodes already in the chain cannot be revisited.
  • 2. Performance Evaluation and QoS Analysis of EEPB and PDCH Routing Protocols in Wireless… DOI: 10.9790/0661-1754101109 www.iosrjournals.org 102 | Page PEGASIS uses a greedy algorithm to construct a chain. When a node in chain looks for a downstream node, a node chooses the closest node to itself as downstream node. In local area, the greedy algorithm can guarantee the distance of a pair of nodes is shortest. Therefore, sensors can consume least energy in this condition. But in the opinion of a global network, the greedy algorithm will result in a dangerous mechanism "long chain". "Long chain", also known as Long Link (LL) means the distance between a pair of nodes is much longer than other pairs. The occurrence of "LL" is not due to some nodes far away from the main body of the network. An upstream node uses a greedy algorithm to find nearest node in all disjointed nodes as its downstream node. But in some phase, an upstream node cannot find the nearest node in its neighbors. In this case it has to choose a node from far away nodes as its downstream node. Therefore, "LL" is inevitable. III. EEPB Algorithm A new algorithm EEPB introduced a new method to avoid long chain between the nodes. It is an enhancement of PEGASIS algorithm. That says the distance between sensor nodes is the first aspect. It first calculates the distance between each node from the formed chain. After that “thresh” is calculated from the average distance of the formed chain. The distance from the closest node to its upstream node is longer than the distance “thresh”, the closest node is the “far node”. If the closest node combines the chain, it will result in the emergence of LL. In this scenario the “far node” will search a nearer node on formed chain. Through this approach LL is evaded efficiently. This not only balances the energy consumption of nodes, but also conserves energy on sensors. EEPB overcomes several problems over PEGASIS but still has deficiencies as follows.  While EEPB choose the leader node, it ignores the node energy and distance between the nodes to BS, which improves the leader selection depending on different environment conditions.  EEPB minimizes the LL between the neighbor nodes in chain by applying the distance threshold “α” which is predefined by the user. This threshold makes a different impact on the chain formation. If the “α” is too small, it is possible that the link distance between the nodes will be greater than the “α”, hence LL creation is unavoidable. If the “α” is too large, then it won‟t be able to judge and restrain the link distance and LL will be formed. And finally in extreme case, if “α” is infinite the chain formation of EEPB will be same as PEGASIS. This analysis concludes that determining the value of “α” is very complex. Also EEPB considers remaining energy of the node and its distance from the BS to select the leader. This method is inappropriate for balancing the energy consumption according to different application requirements. In EEPB, there are mainly 3 phases: (i) Node selection phase, (ii) Chain construction phase, (iii) Data Transmission phase. 3.1. Node Selection Phase  Initialize 100 nodes, energy and location of all nodes.  A source node S announce a route request message to obtain the distance of each node from source node S. For nodes s0, s1, s2….. s99. Compare d (s0), d (s1), d (s2)…. D (s99) from a source node (S). Where, d (s) is the distance of a neighbor from the Source node.  At the source node S, the neighbor with shortest path is selected for transmitting the data.  The selected neighbors will act source for other nodes which have not joined the chain yet. 3.2. Chain Construction Phase  Let us consider that an upstream node wants to search a new node for communication. If the distance from the upstream node to the closest node is longer than the Dthreshold, it will possibly lead to the formation of LL. Dthreshold is calculated from the average distance of the formed chain.  Let N be the Number of nodes, such that Sk (k = 1, 2, 3 …N).  The distance between two nodes is given as (Dij, h) where h is the hop number of the formed chain.  The distance of every segment in the formed chain is given by Dp, where (p=1, 2, 3 …h).  is the average distance in the formed chain that is calculated by,  is the threshold distance that is calculated by,  Where α is a user defined constant.  Let us assume that node Sm chooses node Sn as its downstream node. Sm intimates Sn to join the chain and to look for other nodes to participate in the chain.  When Sn receives the data packet from Sm it starts computing .
  • 3. Performance Evaluation and QoS Analysis of EEPB and PDCH Routing Protocols in Wireless… DOI: 10.9790/0661-1754101109 www.iosrjournals.org 103 | Page  On the basis of , it will calculate .  Sn will then send the chaining request to all the other nodes that haven‟t yet joined the chain.  Sn then select a node whose Di,j will be minimum.  Let us assume that St is that node. Hence min (di, j) = dn,t. Then compare dn,t with .  If dn,t < , it is clear that Sn is not far away from Sl. Hence, when St joins the chain, it will not lead to formation of LL. Thus Sn will choose St as the downstream node and ask St to continue the chain formation.  If dn,t > , it indicates that Sn is far away from St. In this case if St joins the chain it will lead to the formation of LL.  St will consume more energy for data transmission, therefore it will look for any other node who is nearer to Sn than itself. If it finds such node than Sn will be the end node on that data chain and St will join the chain through the nearer node and finish the chain formation process. But if St fails to find such node than LL is unavoidable. Thus St will join the data chain directly through Sn and terminate the chain process. 3.3. Data Transmission Phase  Once the chain is done, the end node starts the transmission of data.  Each node collects the data from the downstream node with its own data and then sent to the upstream node.  Every node in the chain repeats the procedure until all nodes are traversed. At last the leader node sends the data to BS. IV. PDCH Algorithm Based on the above analysis, this paper presents a new PEGASIS based routing protocol called PDCH. PDCH uses double cluster head instead of single cluster head to distribute energy load among all nodes to increase the network lifetime. Also PDCH uses a dynamic cluster formation to eliminate overhead and reduce the distance of transmission by choosing appropriate node based on residual energy and neighbor nodes. PDCH is an improved routing algorithm over EEPB. In PDCH, there are mainly 4 phases: (i) Cluster Formation phase, (ii) Chain construction phase within a cluster, (iii) Cluster Heads Selection phase, (iv) Data Transmission phase. 4.1. Cluster Formation Phase  In PDCH [10], network is created using random node deployment and BS is plotted at the given location. After that the distance from BS to all other nodes in the network is found using the Euclidean distance formula. Fig. 1. Level formation = Where, is the 𝑖𝑡ℎ node distance from BS & are the coordinates of the BS & are the coordinates of the 𝑖𝑡ℎ node  Now distance of every node to the BS is decided the level which node belongs to.  Every level has a unique ID. The first level 0 belongs to BS. The second level is 1, in which nodes are closest to BS and so forth. For example, the nodes which are less than or equal to 250 meters comes under
  • 4. Performance Evaluation and QoS Analysis of EEPB and PDCH Routing Protocols in Wireless… DOI: 10.9790/0661-1754101109 www.iosrjournals.org 104 | Page first cluster (level id = 1). 250 meters to 350 meters come under second cluster (level id = 2), 350 meters to 450 meters come under third cluster (level id=3) and 450 meters to 600 meters come under fourth cluster (level id=4).  Note that the cluster level formation always runs at the start, and once it is done, it will not be changed in the whole process. So this can save energy compared to frequently level forms in every round. Figure 1 shows the level formation in PDCH. 4.2. Chain Construction Phase  After cluster formation, we use the EEPB algorithm for chain construction in every cluster level.  Nodes with same level id can only involve in same chain.  Nodes with different level id cannot involve in one chain. 4.3. Cluster Head Selection Phase In PDCH, we use the double cluster head method. One is the main cluster head (MCH) and another is the secondary cluster head (SCH). 4.3.1. Selection of MCH  Initially set up a parameter „n‟ on every node N(i), where i indicates number of nodes. If node N(i) haven't join in the chains, then n=0, when node N(i) was selected by N(i-1) to join the chain, we set n=(n+1), every time when a new node join in a chain, the parameter „n‟ of select node automatic increment by 1. When chain construction is complete, we will analyze the parameter n, if n>2, we consider that N(i) has branch chain.  Node having a branch chain has a bigger chance to be selected as CH than other nodes in every chain.  Node having the highest neighbor to be selected as MCH.  If more than one node have the same number of neighbors, than from them, node with high energy to be selected as MCH. Figure 2 shows chain formation and branch chain concept. Fig. 2. Chain formation The marked nodes show that the number of neighbors is more than 2. These nodes have one or more than one branch chain, so they have greater opportunity to be selected as MCH in every level. 4.3.2. Selection of SCH  If only MCH is responsible for gathering local level data and transmitting this data to upper level, then it becomes a burden for main node. So we choose SCH in every level.  If MCH has exactly 3 neighbors, then there is only single branch chain, we will select a node belong to the branch chain as the SCH.  If the neighbor of MCH more than 3, then there is more than one branch chain exist with main CH. In this situation, we will select the node belong to the branch chain which is more closer to the BS or minimum distance from BS as the secondary CH. Figure 3 shows the double cluster head method.
  • 5. Performance Evaluation and QoS Analysis of EEPB and PDCH Routing Protocols in Wireless… DOI: 10.9790/0661-1754101109 www.iosrjournals.org 105 | Page Fig. 3. Double cluster head method 4.4. Data Transmission Phase 4.4.1. Function of MCH  The main function of MCH is to collect the local level data from all the nodes in the cluster and aggregate this data.  After that, MCH transmits these aggregated data to the SCH in the same level. In figure 3, purple line shows the transmission from MCH to SCH. 4.4.2. Function of SCH  The function of SCH is to receive gathered data from MCH and transmitting this data to BS.  For sending the data to BS, we should chain up all the SCHs, and transmit it to BS through this chain. In figure 3, red line shows the chain of secondary CHs. V. Simulation And Result Analysis Simulation is performed to evaluate and compare the performance of EEPB and PDCH protocols. The network model is described in section 5.1. The performance metrics and results are used to compare their effectiveness are given in section 5.2. 5.1. Network Model In this paper, WSN has the following properties:  1000m × 1000m network area in which 100 nodes scenarios are densely deployed.  The sensor nodes are static. Once sensor nodes have been deployed, they work in the environment without movement.  The sensor nodes are homogeneous in that they have equal capabilities (initial energy, data processing, wireless communication).  Sensor nodes have sensing range up to the 250 meters. Table 1 shows the value assigned to different network parameters. Table 1. Network Model Parameters Value Network Area 1000 × 1000 m2 Sensor Nodes 100 Node Sensing Range 250 meter Data Rate 512 kbps Initial Energy 100 J Transmission Power 0.9 J Receiving Power 0.8 J Sensing Power 0.0175 J
  • 6. Performance Evaluation and QoS Analysis of EEPB and PDCH Routing Protocols in Wireless… DOI: 10.9790/0661-1754101109 www.iosrjournals.org 106 | Page 5.2. Simulation Results This paper uses NS2 as a simulator to evaluate the performance of PDCH comparing with EEPB. The simulation focuses on delay, energy consumption, dead nodes, network overhead, packet loss ratio and throughput which are important indicators to measure end to end performance of different routing algorithms. Fig. 4. Delay Figure 4 shows the delay of EEPB and PDCH protocols in terms of completion of one round of communication. The graph indicates PDCH has 57.77 % less delay compare to EEPB. Fig. 5. Energy consumption Figure 5 indicates energy consumption ratio of both the protocols. For the maximum number of packets transferred, PDCH consumes 41.42 % less energy than EEPB. It shows that PDCH has better lifetime compare to EEPB.
  • 7. Performance Evaluation and QoS Analysis of EEPB and PDCH Routing Protocols in Wireless… DOI: 10.9790/0661-1754101109 www.iosrjournals.org 107 | Page Fig. 6. Dead nodes In figure 6 the dead node of both protocols is shown. It is clearly seen that percentage of nodes dead in EEPB is very high than PDCH. As per simulation result PDCH has 50 % less dead nodes than EEPB. Fig. 7. Network overhead Figure 7 shows the overall network overhead of both protocols. Overhead in terms of extra data to route packets at the destination. The graph clearly indicates that PDCH has 69.12 % less overhead compare to EEPB. Figure 8 shows throughput of both protocols. It shows that throughput of PDCH protocol is better than EEPB protocol. Throughput is measured in terms of the number of data packets received with respect to time. The graph shows that PDCH has 16.66 % higher throughput than EEPB protocol.
  • 8. Performance Evaluation and QoS Analysis of EEPB and PDCH Routing Protocols in Wireless… DOI: 10.9790/0661-1754101109 www.iosrjournals.org 108 | Page Fig. 8. Throughput Fig. 9. Packet loss ratio Figure 9 shows the packet loss ratio of EEPB and PDCH protocols. The graph shows PDCH drops less packets than EEPB protocol. As per result PDCH has 17.5 % less packet loss ratio than EEPB protocol. VI. Conclusion and Future Work This paper proposes the methodology of PDCH protocol in order to improve the deficiencies of EEPB protocol. The novel protocol adopts a new distance based cluster selection method as well as double cluster head method in every cluster to balance the overall network load. This technique improves the performance of the overall network. Comparison between PDCH and EEPB protocol is performed and QoS is improvised. Simulation results show that PDCH outperforms EEPB by 57.77 %, 41.42 %, 50 %, 69.12 %, 16.66 % and 17.50 % in terms of delay, energy consumption, dead nodes, network overhead, throughput and packet loss ratio respectively. Thus, it is concluded that PDCH has the better end to end performance than EEPB protocol. In future, PDCH protocol can be compared with other PEGASIS based protocols and QoS can be analyzed. References [1] Akyildiz et al., “A Survey on Sensor Networks,” IEEE Commun. Mag., vol. 40, no. 8, Aug. 2002, pp. 102–144. [2] J. Al-Karaki, and A. Kamal, “Routing Techniques in Wireless Sensor Networks: A Survey,” IEEE Communications Magazine, vol 11, no. 6, pp. 6-28, Dec. 2004. [3] W. Heinzelman, A. Chandrakasan and H. Balakarishnan, “Energy-Efficient Communication Protocols for Wireless Microsensor Networks,” in Proceedings of the 33rd Annual Hawaii International Conference on Systems Science, Jan. 2000. [4] S. Lindsey and C. S. Raghavendra, “PEGASIS: Power-efficient gathering in sensor information systems,” in IEEE Aerospace Conference Proceedings, vol. 3, pp. 1125-1130, March 2002.
  • 9. Performance Evaluation and QoS Analysis of EEPB and PDCH Routing Protocols in Wireless… DOI: 10.9790/0661-1754101109 www.iosrjournals.org 109 | Page [5] YU Yong-chang, WEI Gang, “An Improved PEGASIS Algorithm in Wireless Sensor Network,” in the proceedings of Acta Electronica Sinica, vol.36, pp.1309- 1313, July 2008. [6] Feng Sen, Qi Bing and Tang Liangrui, “An Improved Energy-Efficient PEGASIS-Based Protocol in Wireless Sensor Networks,” in Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), vol. 4, pp. 2230-2233, Shanghai, 2011. [7] GUO. Wen-yu, ZHANG Wei and LU Gang, “PEGASIS protocol in wireless sensor network based on an improved ant colony algorithm,” in the IEEE proceedings of Second International Workshop on Education Technology and Computer Science, pp. 64- 67, 2010. [8] Z. Aliouat and M. Aliouat, “Efficient Management of Energy Budget for PEGASIS Routing Protocol,” in 6th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), pp. 516-521, Sousse, March 2012. [9] Wang Linping, Cai Zhen, Bi Wu and Wang Zufeng, “Improved algorithm of PEGASIS protocol introducing double cluster heads in wireless sensor network,” in International Conference on Computer, Mechatronics, Control and Electronic Engineering (CMCE), vol. 1, pp. 148-151, Changchun, Aug. 2010. [10] Jigish Rana, Sangeeta Vhatkar, Mohommad Atique, “Comparative Study of PEGASIS and PDCH Protocols in Wireless Sensor Network,” in International Journal of Computer Applications (IJCA) Proceeding on International Conference and Workshop on Emerging Trends in Technology ICWET, pp. 13-18, May 2015. [11] S. Lindsey, C. Raghavendra and K. M. Sivalingam, “Data Gathering algorithms in sensor networks using the energy metric,” in IEEE Transactions on Parallel and Distributed Systems, vol. 13, Issue 9, pp. 924-935, Sep. 2002. [12] S. Vhatkar, M. Atique, “Design Issues, Characteristics and Challenges in Routing Protocols for Wireless Sensor Networks,” International Journal of Computer Applications (0975 – 8887) International Conference and Workshop on Emerging Trends in Technology, 2013. [13] T. Shankar, Dr. S. Shanmugavel, “Hybrid Approach For Energy Optimization In Cluster Based WSN Using Energy Balancing Clustering Protocol,” Journal of Theoretical and Applied Information Technology, vol. 49, pp. 906-921, March 2013.