D010332935

IOSR Journals
IOSR JournalsInternational Organization of Scientific Research (IOSR)

Volume 10, Issue 3 Ver. III (May – Jun. 2015)

IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE)
e-ISSN: 2278-1676,p-ISSN: 2320-3331, Volume 10, Issue 3 Ver. III (May – Jun. 2015), PP 29-35
www.iosrjournals.org
DOI: 10.9790/1676-10332935 www.iosrjournals.org 29 | Page
Energy-Efficient Routing Cluster Protocols for Wireless Sensor
Network
Kritika, Ashok Kumar
1,1 Electronic and Communication Engineering Department & Applied Science, Ambala, Harayana, India
Abstract: Wireless Sensor Networks (WSNs) consist of small nodes with sensing, calculation and wireless
communications capability. Many routing, capacity management, and data circulation protocols have been specifically
designed for WSNs where energy alertness is an needed method issue. The final development in the wireless network is the
main condition for us to choose this topic. The focus has been given to the routing protocols which might differ depending
on the application and network architecture. In this paper, we present a analyses of the state-of-the-method routing
techniques in WSNs. We first diagram the design challenges for routing protocols in WSNs followed by an exhaustive of
some of the routing techniques. Overall, the routing techniques are classified into three categories based on the underlying
network structure: flat, hierarchical, and location-based routing .These protocols can be divided into lifetime -based, and
Qos-based, depending on the protocol operation. We review the design trade-offs between energy and communication
upward savings in some of these routing paradigm. We also mention the advantages and achievement issues of each routing
technique.
Keywords: Sensor Networks; Clustering Routing; LEACH; C LEACH;TL-LEACH, PEGASIS.
I. Introduction
Wireless Sensor Networks (WSNs) consists of tiny sensors nodes or environmental conditions such as
temperature, sound, fluctuation, pressure,gesture at different locations. The evolution of wireless sensor
networks was originally inspire by military applications for battlefield neglect. In these situations, it is difficult
to replace the dead nodes caused by energy’s depletion with new ones to supply energy for the system.,sensor
nodes working as deep as possible is the main method to maximize the life cycle of the system. The energy’s
consumption of sensor node mainly emerge from the long distance transmission of data along the routing path,
an efficient routing path formed by the routing protocol will have a great contact on the energy’s consumption
[3]. So how to design an energy-efficient routing protocol becomes the main goal for the wireless sensor
network.Therefore, wireless sensor networks are used in many civilian applications including environmental and
home monitoring, health-care applications etc. This network enclose a large number of nodes which sense data
from an desperately inaccessible area and send their data toward a processing center which is called “sink”.
Since sensor nodes are power constrained devices, frequent and long-distance transmissions should be kept to
minimum in order to prolong the network lifetime [1] Thus, communication between the sensor nodes and the
base station is expensive, and there are no “high-energy” nodes through which communication can proceed.
WSN are a widely applicable, major metalise technology. They bring a whole host of novel research challenges
refer to energy efficiency, robustness, scalability, self-configuration, etc. These challenges must be take up at
multiple levels through different protocols and mechanisms. Present partial solutions offer much hope for the
future, but much work remains to be done. The use of clusters for transmitting data to the base station the
advantages of small transmit distances for most nodes,compelling only a few nodes to transmit far distances to
the base station. However, LEACH show better clustering algorithms by using adaptive clusters and rotating
cluster-heads, among all the sensors. In addition, we show LEACH is able to perform local computation in each
cluster to reduce the amount of data that must be transmitted to the base station. Clustering routing algorithms
are now an active part of routing technology in WSNs due to various advantages, such as more scalable, less
load, less energy consumption and more robustness [1][4]. The rest of the paper is organized as follows: Section
II provides an overview of the LEACH,LEACH-C, ER-LEACH, PEGASIS, LEACH -SM TL LEACH AND V -
LEACH Protocols.In section III, we simulate and compare the protocols. Finally, Section IV concludes this
paper.
II. Literature Survey
The report on a Energy Efficient Clustering Protocols for Wireless Sensor Network by analysing the
advantages and disadvantages of conventional routing protocols using our model of sensor networks, then
developed LEACH (Low-Energy Adaptive Clustering Hierarchy), a clustering-based protocol that minimizes
energy dissipation in sensor network.
Different LEACH parameters are studied. Firstly, Allen et al. [17] presented that sensor networks with
the ability to have small devices physically distributed near the objects being sensed brings new opportunities to
observe and act on the world, for example with micro-habitat monitoring, structural monitoring, and wide-area
Energy-Efficient Routing Cluster Protocols for Wireless Sensor Network
DOI: 10.9790/1676-10332935 www.iosrjournals.org 30 | Page
environmental systems. After that Effen et .al [16] presented that wireless sensor networks with thousands of
tiny sensor nodes and expected to find wide applicability and increasing deployment in coming years as they
enabled reliable monitoring and analysis of the environment. This paper proposed a modification to a well-
known protocol for sensor called Low Energy Adaptive Clustering Hierarchy ). Akyildiz et .al [13], further
analyzed that energy conservation have a main priority in all technology and engineering field. Most current
applications that consume energy could be customized or optimized in a process resulting less energy
consumption. Heinemann et al. [11] presented in underwater sensor networks and highlighted potential
applications to off-shore oilseeds for constant monitoring, equipment monitoring, and underwater robotics.
Then, Heinemann et al. [10] analyzed networking of hundreds or thousands of cheap micro sensor nodes and
allowed users to accurately monitor a remote environment by intelligently combining the data from the
individual nodes. Heinzelman et al. [9] proposed that the Hybrid Energy Efficient Distributed protocol for the
heterogeneous wireless sensor network W. Heinzelman et al.[8] presented wireless sensor networks with
thousands of tiny sensor nodes that expected to find wide applicability and increasing deployment in coming
years, as they enable reliable monitoring and analysis of the environment.Balakrishna et al. [7] presented a
growing interest in wireless sensor networks. The hot point in these algorithms was the cluster head selection.
Rabiner et al. presented [6] that the energy conservation had a main order in all technology and engineering
field. Handy et al. [5] presented wireless distributed micro sensor systems which invest the reliable monitoring
of a variety of environments for both civil and military applications. V.Mhatre et al. [4] focused on reducing the
power consumption of wireless micro sensor networks.Manjeshwar et al. [3] presented a formal classification of
sensor networks, based on their mode of functioning, as proactive and reactive networks. Reactive networks, as
opposed to passive data collecting proactive networks. Hssane et al. [2] presented wireless sensor network
(WSN) which was a power constrained system, since nodes run on limited power batteries which shorten its
lifespan. Kumar et al. [1] presented hybrid energy efficient distributed protocol for the homogeneous wireless
sensor network. The main requirements of wireless sensor network were to prolong the network lifetime and
energy efficiency.
III. Leach Protocols
A. Brief Description
LEACH, an application-specific protocol develop. The application that normal micro sensor networks
mean the monitoring of a remote environment. Since living nodes’ data are related in a sensor network, the end
user does not require all the redundant data; rather, the end user needs a high-level purpose of the data that show
the events appearing in the environment. Because the correlation is capable between data signals from nodes
located close to each other, we chose to use a clustering infrastructure as the basis for LEACH. This confess all
data from nodes within the cluster to be processe locally, reducing the data set that needs to be transmitted to the
end user. In particular, data aggregation methods can be used to combine several related data signals into a
smaller set of information that maintains the compelling data (i.e., the information content) of the original
signals. Therefore, much less actual data needs to be transmitted from the cluster to the base station (BS).
LEACH may be better when these assumptions do not hold. In LEACH, the nodes classify themselves
into local clusters, with one node acting as the cluster head. All non-cluster head nodes transmit their data to the
cluster head, while the cluster head node receives data from all the cluster members, performs signal processing
part on the data (e.g., data aggregation), and transmits data to the remote BS. LEACH Low-Energy Adaptive
Clustering Hierarchy (LEACH) was proposed by Heinzelman [5] and is one of the first clustering routing
algorithms proposed for WSNs. LEACH was originally for wireless micro-sensor networks. LEACH is based on
a clustering infrastructures, as all the data is handled in the cluster locally and only limited data is sent to the end
user
B. LEACH-C
LEACH-Centralized [6] is an advancement of LEACH, it uses the variable steady state protocol as of
LEACH but, uses a consolidate clustering algorithm for cluster formation. During the set up phase all the nodes
transmits its area and energy level to the BS and then the BS decides which nodes should be CH and which
nodes should combine to which CH. After this the BS broadcasts a message containing the CH ID for each
node, if it accept its own ID it knows it is the CH. LEACH-C and LEACH have the same steady state phase.
C. TL-LEACH
The cluster formation protocol is a local process that recognise, a two-level hierarchy .In this way each
node can decide to result in a good cluster. The use of two-levels of clusters for transmitting data to the base
stations leverages the advantages of small transmit distances for more nodes more than in the beginning
LEACH. In this way less nodes are required to transmit far distances to the base station and it is especially true
in networks where the density of nodes is high. The use of clusters for transmitting data to the base station
Energy-Efficient Routing Cluster Protocols for Wireless Sensor Network
DOI: 10.9790/1676-10332935 www.iosrjournals.org 31 | Page
advantages of small transmit distances for most nodes, involving only a few nodes to transmit far distances to
the base station.
Fig 2 Token Passing Scheme
D. V-Leach
V-LEACH protocol, the cluster contains; CH (responsible only for sending data that is received from
the cluster members to the BS), vice-CH (the node that will become a CH of the cluster in case of CH dies),
cluster nodes (gathering data from environment and send it to the CH .In the newest LEACH, the CH is always
on receiving data from cluster members, combined these data and then send it to the BS that might be located
far away from it. The CH will die previous than the other nodes in the cluster because of its operation of
receiving, sending and overhearing. When the CH die, the cluster will become worthless because the data
gathered by cluster nodes will never reach the base station. In V-LEACH protocol,likewise having a CH in the
cluster, there is a vice-CH that takes the role of the CH when the CH dies because the reasons we show above by
doing this, cluster nodes data will always reach the BS; no need to elect a new CH each time the CH dies.me.
Fig.3 V -LEACH PROTOCOL
The main issue with LEACH protocol lies in the random selection of cluster heads. There exists a
probability that the cluster heads formed are unbalanced and may remain in one part of the network making
some part of the network unreachable. This problem is resolved by using the concept of V-Leach. V Leach uses
the concept of alternate Cluster Head called Vice Cluster Head and finally the network dies completely.
E. PEGASIS
Power-Efficient Gathering in Sensor Information Systems (PEGASIS) [7] is an improved version of
LEACH. The goal of PEGASIS is that the node discourse to the other nodes in its organise and the nodes take
turns to become a CH. It only selects one node as a CH to send data to the BS in each round. Each node
compare with its close next door neighbors and takes turns to correspond with the BS.
• Phase 1: Chain Construction: Starting from the node furthest from the BS the chain is constructed using a
greedy algorithm, the chain formation can be adept by the sink or the nodes itself.
• Phase 2: Data gathering and Transmission to BS: One node is selected as the CH randomly that communicates
with the BS. When a node dies in the network a new chain is formed by passing the dead node. The CH receives
all the fused data from the Sensor Node (SN) and sends it to the Base Station (BS). Data transmission in
PEGASIS.
Energy-Efficient Routing Cluster Protocols for Wireless Sensor Network
DOI: 10.9790/1676-10332935 www.iosrjournals.org 32 | Page
FIG. 4 LEACH NETWORK
F. Efficient-Routing Leach (ER-LEACH)
Efficient Routing LEACH (ER-LEACH) [3] which is a modified version of the well-known LEACH
protocol.There are three contributions in this protocol which are upgrading the selection of the cluster head
during setup phase by taking into account the residual energy of any sensor node which intends to become a CH
to prolong the network lifetime. The second contribution is trying to reduce the overhead of dynamic clusters
generation by using alternative CH which is expected to take the role of the CH in case that the underlying CH
died which will prolong the lifetime of each cluster, and finally for the sake of load balancing the zone routing
protocol is used which attempts to balance the load over CHs evenly by permitting the CH to discover the
optimal route to the BS with less cost messages update and then sends the fused data to the BS through many
other CHs instead of direct sending to the BS. ER-LEACH is normal to perform well especially when the
mobility is very high and will prolong the overall network lifetime through load balancing
G. Leach – Spare Management (LEACH-SM)
LEACH-SM protocol [5] modifies LEACH by enhancing it with an efficient management of spares. It
is also designed for static sensor nodes and static targets. LEACH-SM contract with both energy-consumption in
efficiencies of LEACH. LEACH-SM adds a phase, called the spare selection phase.
IV. Comparison Of Leach,Leach-C, Er-Leach, Pegasis, Leach -Sm Tl Leach
And V - Leach
There are many techniques available for data evaluation such as real-life measurements, analytic
modeling and software simulations. For real-life measurements we will require hardware to set up a wireless
sensor network. This is not a feasible method for data evaluation as we usually want to acquire data for
hundreds of nodes and to setup such a large network can be a time and money consuming task. The second
method which involves formulating mathematical equations for the network. This also is a very heavy task as it
will involve a lot of time consuming and clear calculations. So we will use simulation using Network
Simulator-2 (NS-2) [8] to imitate the behavior of a WSN.
A.Throughput
To represent the throughput of each protocol we use data received at the BS with respect to time and
energy dissipation. LEACH-C performs 20% better than LEACH due to the built up computation by the BS to
find better clusters. LEACH-C successfully delivers more data to the BS than LEACH with respect to both time
and energy. Hence proving that LEACH-C has a higher throughput than LEACH..PEGASIS performs better
than both LEACH and LEACH-C. PEGASIS performs 260% better than LEACH and 200% better than
LEACH-C.TL LEACH performs better than LEACH, LEACH-C and PEGASIS..In TL LEACH throughput
(data signals received at the BS) .
B.Network Lifetime
To represent network lifetime we will compare the nodes alive of each protocol to time and data
received at BS. PEGASIS sends multifold data to the BS in comparison to LEACH or LEACH-C.PEGASIS
Energy-Efficient Routing Cluster Protocols for Wireless Sensor Network
DOI: 10.9790/1676-10332935 www.iosrjournals.org 33 | Page
deliver the most data per unit energy followed by LEACH-C and then than LEACH, hence PEGASIS achieves
both energy efficiency and latency efficiency but TL LEACH achieve density of nodes is high .
LEACH is not as efficient as LEACH-C or PEGASIS (LEACH-C delivers about 20% and PEGASIS
delivers more than 250% data per unit energy than LEACH respectively). The reason for this is that in LEACH-
C the BS has global information of the position and energy of the other nodes, due to it can create enhanced
clusters that need lesser energy for transmission. PEGASIS outperforms LEACH and LEACH-C as it removes
the overhead of dynamic cluster information, PEGASIS also minimizes the sum of distances and restrict the
number of transmissions, but TL LEACH require less nodes to transmit far distances to the base station
,network lifetime of TL LEACH (number of nodes alive over time).
C.Energy Consumption
As LEACH-C is able to send more data packets per unit energy consumed which confirm that LEACH-
C performs better than LEACH in terms of energy consumption. PEGASIS consumes the least energy to per
data packet sent to the BS and behave the best and hence is the most energy efficient. In TL LEACH we do
not assume any constant energy dissipating nor do we remove energy during carrier-sense operations.
D. CH Selection
In clustering head selection of LEACH and V -LEACH is arbitrary,C - LEACH CH Selection done by
BS based on energy.T-L LEACH is also based on energy.In ER-LEACH CH Selection based on Energy
decided with in the cluster and at last LEACH -SM , during the cluster setup phase ,each node decided in lateral
whether should become in active primary node or passive spare node.In PEGASIS data gathering and
Transmission done by BS on each node correspond with its close next door neighbors and takes turns to
correspond with the BS.
E. Data Transmission
In LEACH and C LEACH both are all CH sends directly to BS.In V - LEACH Vice CH takes over CH
in case CH dies,ER-LEACH if the base station is not within range of CH ,it routed the CH in case of deadhead
and LEACH SM the passive spare nodes goes to asleep where the data is transmitted through the primary active
node.
F. Mobility
The mobility of LEACH ,C LEACH and V LEACH is stationary but ER-LEACH refers to mobile and
SM-LEACH designed for static sensor nodes and static targets.
V. Routing Challenges And Design Issue In Wsns
The design of routing protocols in WSNs is formed by many demanding factors. These factors must be
efficient communication can be achieved in WSNs.
A. Node deployment
Node deployment in WSNs is application debased and modify the performance of the routing protocol.
The performance can be either deterministic or randomized. In deterministic deployment, the sensors are
annually placed and data is routed through pre-determined paths. However, in odd node deployment, the sensor
nodes are dispersed randomly creating an infrastructure in an ad hoc manners. Therefore, it is most likely that a
route will consist of multiple wireless hop.
B. Energy consumption without losing accuracy
Sensor nodes can use up their limited supply of energy operating computations and transmitting
information in a wireless environment. As such, energy sustain forms of communication. In a multihop WSN,
each node show a dual role as data sender and data router.
C. Data Reporting Model
Data sensing and reporting in WSNs is a based on the application and the time essential of the data
reporting. Data reporting can be classified as either time-driven ,event-driven, query-driven, and hybrid.The
time-driven require periodic data monitoring. Sensor nodes will periodically switch on their sensors and
transmitters, sense the environment and transmit the data of relevance at steady periodic time intervals.
D. Fault Tolerance
Some sensor nodes may fail or be blocked due to lack of power or environmental interference etc. The
deficit of sensor nodes should not affect the overall task of the sensor network. If various nodes fail, MAC and
Energy-Efficient Routing Cluster Protocols for Wireless Sensor Network
DOI: 10.9790/1676-10332935 www.iosrjournals.org 34 | Page
routing protocols must involve formation of new links and routes to the data collection base stations and require
adjusting transmit powers and signaling rates on the existing links to reduce energy consumption. Therefore,
various levels of redundancy may be needed in a fault-tolerant sensor network.
E. Scalability
The number of sensor nodes deployed in the sensing area may be in order of hundreds or thousands or
many Any routing scheme must be able to work with this large number of sensor nodes. In addition, sensor
network routing protocols should be expansible to respond to events in the environment. Until most of the
sensors can remain in the sleep state with data from the few remaining sensors providing a quality.
F. Network Dynamics
Most of the network architectures assume that sensor nodes are static. However, mobility of both BS’s
or sensor nodes is sometimes need in many applications.Routing messages from or to moving nodes is more
impose. Since route stability becomes a important to energy, bandwidth etc.
VI. Conclusions
In this paper,Wireless sensor networks consists of thousands of tiny, low cost, low power and
multifunctional sensor nodes where each sensor node has very low battery life. Various energy efficient
algorithms have been designed for this. LEACH uses distributed cluster formation & randomized rotation of the
cluster head to minimize the network energy consumption. This paper proposes a new version of LEACH
protocol called V LEACH protocol,there is less number of dead nodes,Number of alive nodes is enhanced,
Based on our MATLAB simulations described above, we are confident that LEACH will outperform
conventional communication protocols, in terms of energy dissipation, ease of configuration, and system
lifetime / quality of the network.The proposed work improvement over the V-Leach; in this proposed work we
are trying to improve the network life., initially when the cluster heads are selected based on the energy and the
distance parameters; we also select the Vice Cluster Head. LEACH show better clustering algorithms by using
adaptive clusters and rotating cluster-heads, among all the sensors. In addition, we show LEACH is able to
perform local computation in each cluster to reduce the amount of data that must be transmitted to the base
station.,routing technology show in WSNs due to various advantages, such as more scalable, less load, less
energy consumption and more robustness
References
[1]. SasikumarM,Dr.R.Anitha,February2014.“Performance Evaluation of Heterogeneous HEED Protocol for Wireless Sensor Networks”,
International Journal of Advanced Research in Computer and Communication Engineering Volume 3, Issue 2.
[2]. Abderrahim BENI HSSANE , Mosley Lahcen HASNAOUI ,2010. “Improved and Balanced LEACH for heterogeneous s wireless
sensor networks”, Ben Alla Said et al. / (IJCSE) International Journal on Computer Science and Engineering Volume. 02, Number
08.
[3]. V.Mhatre and C. Rosenberg, “Homogeneous vs. heterogeneous clustered sensor networks: A comparative study,” in
Proceedingsof 2004IEEE International Conference on Communications (ICC 2004) June 2000.
[4]. Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan, January 2000.”Energy-Efficient CommunicatioProtocol
for Wireless Microsensor Networks”Copyright 2000 IEEE. Published in the Proceedings of the Hawaii International Conference on
System Sciences, January 4-7, 2000, Maui, Hawa
[5]. W. Heinzelman, A. Chandrakasan, and H. Balakrishnan. “uAMPS ns Code Extensions”.
http://wwwmtl.mit.edu/research/icsystems/uamps/ leach.
[6]. W. R. Heinzelman, “Application-Specific Protocol Architectures for Wireless Networks,” Ph.D. thesis, Massachusetts Institute of
Technology, 2000.
[7]. Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari “Energy-Efficient Communication Protocol for Wireless Microsensor
Networks” Copyright 2005 IEEE. Published in the Proceedings of the Hawaii International Conference on System Sciences, January 4-
7, 2000, Maui, Hawaii.
[8]. Wendi B. Heinzelman February “An Application-Specific Protocol Architecture for Wireless Microsensor Networks” IEEE
TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 1,NO. 4, february 2000
[9]. M. Bani Yassein, A. Al-zou'bi, Y. Khamayseh, W. Mardini “ Improvement on LEACH Protocol of Wireless Sensor Network
(VLEACH)”
[10]. Bluetooth Project. http://www.bluetooth.com, 2011.
[11]. I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E.Cayirci, “A Survey on Sensor Networks”, IEEE Communications Magazine 40 (8)
(2002)104-112,pp. 234
[12]. G. Simon, M. Maroti, A. Ledeczi, G. Balogh, B. Kusy, A. Nadas, G. Pap, J. Sallai, K. Frampton, , 2004. “Sensor Network-Based
Counters Niper System”, In Proceedings of the Second International Conference on Embedded Networked Sensor Systems (Sensys),
Baltimore, MD,pp. 984
[13]. J. Yick, B. Mukherjee, D. Ghosal, 2002“Analysis of a Prediction-Base Mobility Adaptive Tracking Algorithm”, the IEEE Second
International Conference on Broadband Networks,pp. 541-545
[14]. M. Castillo-Effen, D.H. Quintela, R. Jordan, W. Westhoff, W. Moreno, 2004 "Wireless Sensor Networks for Flash-Flood Alerting”, in
Proceedings of the Fifth IEEE International Caracas Conference on Devices, Circuits and Systems, Dominican Republic,pp. 231
[15]. G. Wener-Allen, K. Lorincz, M. Ruiz, O. Marcillo, J. Johnson, J. Lees, M. Walsh, 2006. “A Wireless Sensor Network on an Active
Volcano, Data-Driven Applications in Sensor Networks”,IEEE Internet Computing, March/April. Volume 2, Issue Number 5, pp. 765
Energy-Efficient Routing Cluster Protocols for Wireless Sensor Network
DOI: 10.9790/1676-10332935 www.iosrjournals.org 35 | Page
[16]. V. Raghunathan, A. Kansai, J. Hse, J. Friedman, M. Srivastava, 2005,"Design Considerations for Solar Energy Harvesting Wireless
Embedded Systems", in Proceedings of the IPSN ,Volume 1, Issue Number 5,pp. 897
[17]. P. Zhang, C.M. Sadler, S.A. Lyon, M. Martonosi, 2004, "Hardware Design Experiences in Zebranet", Proceedings of the SenSys’04,
Baltimore, MD, Volume 2, Issue Number 5,pp.765
[18]. S. Roundy, J.M. Rabaey, P.K. Wright, 2004,"Energy Scavenging for Wireless Sensor Networks" ,Volume 41, Issue Number 5,pp. 762.
[19]. M. Rahimi, H. Shah, G.S. Sukhatme, J. Heideman, D. Estrin, 2003, "Studying the Feasibility of Energy Harvesting in Mobile Sensor
Network " the IEEE ICRA, Volume 41, Issue Number 5, pp. 19–24.
[20]. Akyildiz, I.F.; Su, W.; Sankarasubramaniam, Y.; Cayirci, E. Wireless sensor networks. 2002, 38, 393–422.

Recomendados

CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI... von
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
16 views19 Folien
A review of Hierarchical energy Protocols in Wireless Sensor Network von
A review of Hierarchical energy Protocols in Wireless Sensor NetworkA review of Hierarchical energy Protocols in Wireless Sensor Network
A review of Hierarchical energy Protocols in Wireless Sensor Networkiosrjce
125 views6 Folien
B05630814 von
B05630814B05630814
B05630814IOSR-JEN
259 views7 Folien
An energy saving algorithm to prolong von
An energy saving algorithm to prolongAn energy saving algorithm to prolong
An energy saving algorithm to prolongijwmn
113 views12 Folien
Optimized Projected Strategy for Enhancement of WSN Using Genetic Algorithms von
Optimized Projected Strategy for Enhancement of WSN Using  Genetic AlgorithmsOptimized Projected Strategy for Enhancement of WSN Using  Genetic Algorithms
Optimized Projected Strategy for Enhancement of WSN Using Genetic AlgorithmsIJMER
408 views9 Folien
F04623943 von
F04623943F04623943
F04623943IOSR-JEN
240 views5 Folien

Más contenido relacionado

Was ist angesagt?

3. journal paper nov 10, 2017 ( dhyan) von
3. journal paper nov 10, 2017 ( dhyan)3. journal paper nov 10, 2017 ( dhyan)
3. journal paper nov 10, 2017 ( dhyan)IAESIJEECS
8 views6 Folien
FUNDAMENTALS OF WSN von
FUNDAMENTALS OF WSNFUNDAMENTALS OF WSN
FUNDAMENTALS OF WSNSubramanyam Arige
294 views26 Folien
Paper id 28201419 von
Paper id 28201419Paper id 28201419
Paper id 28201419IJRAT
196 views3 Folien
IRJET- Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi... von
IRJET-  	  Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...IRJET-  	  Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
IRJET- Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...IRJET Journal
8 views4 Folien
026 icsca2012-s065 von
026 icsca2012-s065026 icsca2012-s065
026 icsca2012-s065auwalaumar
252 views5 Folien
Corona based energy efficient clustering in wsn 2 von
Corona based energy efficient clustering in wsn 2Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2IAEME Publication
284 views10 Folien

Was ist angesagt?(18)

3. journal paper nov 10, 2017 ( dhyan) von IAESIJEECS
3. journal paper nov 10, 2017 ( dhyan)3. journal paper nov 10, 2017 ( dhyan)
3. journal paper nov 10, 2017 ( dhyan)
IAESIJEECS8 views
Paper id 28201419 von IJRAT
Paper id 28201419Paper id 28201419
Paper id 28201419
IJRAT196 views
IRJET- Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi... von IRJET Journal
IRJET-  	  Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...IRJET-  	  Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
IRJET- Study on Hierarchical Cluster-Based Energy-Efficient Routing in Wi...
IRJET Journal8 views
026 icsca2012-s065 von auwalaumar
026 icsca2012-s065026 icsca2012-s065
026 icsca2012-s065
auwalaumar252 views
Corona based energy efficient clustering in wsn 2 von IAEME Publication
Corona based energy efficient clustering in wsn 2Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2
IAEME Publication284 views
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN... von cscpconf
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
DESIGN OF ENERGY EFFICIENT ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK (WSN...
cscpconf73 views
A Survey of Routing Protocols for Structural Health Monitoring von IJEEE
A Survey of Routing Protocols for Structural Health MonitoringA Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health Monitoring
IJEEE 317 views
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se... von ijcncs
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
ijcncs521 views
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission von IOSR Journals
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
IOSR Journals560 views
IRJET- LEACH Protocol for Wireless Sensor Network von IRJET Journal
IRJET-  	  LEACH Protocol for Wireless Sensor NetworkIRJET-  	  LEACH Protocol for Wireless Sensor Network
IRJET- LEACH Protocol for Wireless Sensor Network
IRJET Journal27 views
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN von IJCNCJournal
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
IJCNCJournal58 views
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks von CSCJournals
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor NetworksHierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks
Hierarchical Coordination for Data Gathering (HCDG) in Wireless Sensor Networks
CSCJournals290 views
Review of Various Enhancements of Modified LEACH for Wireless Sensor Network von ijsrd.com
Review of Various Enhancements of Modified LEACH for Wireless Sensor NetworkReview of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor Network
ijsrd.com183 views
Issues in optimizing the performance of wireless sensor networks von eSAT Publishing House
Issues in optimizing the performance of wireless sensor networksIssues in optimizing the performance of wireless sensor networks
Issues in optimizing the performance of wireless sensor networks
Survey: energy efficient protocols using radio scheduling in wireless sensor ... von IJECEIAES
Survey: energy efficient protocols using radio scheduling in wireless sensor ...Survey: energy efficient protocols using radio scheduling in wireless sensor ...
Survey: energy efficient protocols using radio scheduling in wireless sensor ...
IJECEIAES10 views

Destacado

Extended Study on the Performance Evaluation of ISP MBG based Route Optimiza... von
Extended Study on the Performance Evaluation of ISP MBG  based Route Optimiza...Extended Study on the Performance Evaluation of ISP MBG  based Route Optimiza...
Extended Study on the Performance Evaluation of ISP MBG based Route Optimiza...IOSR Journals
258 views16 Folien
Data Security Model Enhancement In Cloud Environment von
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud EnvironmentIOSR Journals
735 views6 Folien
Needs Assessment Approach To Product Bundling In Banking Enterprise von
Needs Assessment Approach To Product Bundling In Banking  EnterpriseNeeds Assessment Approach To Product Bundling In Banking  Enterprise
Needs Assessment Approach To Product Bundling In Banking EnterpriseIOSR Journals
337 views6 Folien
Investigating a Simulated Model of 2.5 GHz 64 Channel 140 kmDWDM System Using... von
Investigating a Simulated Model of 2.5 GHz 64 Channel 140 kmDWDM System Using...Investigating a Simulated Model of 2.5 GHz 64 Channel 140 kmDWDM System Using...
Investigating a Simulated Model of 2.5 GHz 64 Channel 140 kmDWDM System Using...IOSR Journals
131 views5 Folien
Effect of substrate temperature on the morphological and optical properties o... von
Effect of substrate temperature on the morphological and optical properties o...Effect of substrate temperature on the morphological and optical properties o...
Effect of substrate temperature on the morphological and optical properties o...IOSR Journals
233 views5 Folien
Simulation of a linear oscillating tubular motor von
Simulation of a linear oscillating tubular motorSimulation of a linear oscillating tubular motor
Simulation of a linear oscillating tubular motorIOSR Journals
143 views6 Folien

Destacado(20)

Extended Study on the Performance Evaluation of ISP MBG based Route Optimiza... von IOSR Journals
Extended Study on the Performance Evaluation of ISP MBG  based Route Optimiza...Extended Study on the Performance Evaluation of ISP MBG  based Route Optimiza...
Extended Study on the Performance Evaluation of ISP MBG based Route Optimiza...
IOSR Journals258 views
Data Security Model Enhancement In Cloud Environment von IOSR Journals
Data Security Model Enhancement In Cloud EnvironmentData Security Model Enhancement In Cloud Environment
Data Security Model Enhancement In Cloud Environment
IOSR Journals735 views
Needs Assessment Approach To Product Bundling In Banking Enterprise von IOSR Journals
Needs Assessment Approach To Product Bundling In Banking  EnterpriseNeeds Assessment Approach To Product Bundling In Banking  Enterprise
Needs Assessment Approach To Product Bundling In Banking Enterprise
IOSR Journals337 views
Investigating a Simulated Model of 2.5 GHz 64 Channel 140 kmDWDM System Using... von IOSR Journals
Investigating a Simulated Model of 2.5 GHz 64 Channel 140 kmDWDM System Using...Investigating a Simulated Model of 2.5 GHz 64 Channel 140 kmDWDM System Using...
Investigating a Simulated Model of 2.5 GHz 64 Channel 140 kmDWDM System Using...
IOSR Journals131 views
Effect of substrate temperature on the morphological and optical properties o... von IOSR Journals
Effect of substrate temperature on the morphological and optical properties o...Effect of substrate temperature on the morphological and optical properties o...
Effect of substrate temperature on the morphological and optical properties o...
IOSR Journals233 views
Simulation of a linear oscillating tubular motor von IOSR Journals
Simulation of a linear oscillating tubular motorSimulation of a linear oscillating tubular motor
Simulation of a linear oscillating tubular motor
IOSR Journals143 views
Orientation of Radar Antenna von IOSR Journals
Orientation of Radar AntennaOrientation of Radar Antenna
Orientation of Radar Antenna
IOSR Journals124 views
Mouth dissolving tablets- A unique dosage form curtailed for special purpose:... von IOSR Journals
Mouth dissolving tablets- A unique dosage form curtailed for special purpose:...Mouth dissolving tablets- A unique dosage form curtailed for special purpose:...
Mouth dissolving tablets- A unique dosage form curtailed for special purpose:...
IOSR Journals724 views
Increase In Electrical And Thermal Conductivities Of Doped Polymers Dependent... von IOSR Journals
Increase In Electrical And Thermal Conductivities Of Doped Polymers Dependent...Increase In Electrical And Thermal Conductivities Of Doped Polymers Dependent...
Increase In Electrical And Thermal Conductivities Of Doped Polymers Dependent...
IOSR Journals857 views
Integrated E-Health Approach For Early Detection of Human Body Disorders in R... von IOSR Journals
Integrated E-Health Approach For Early Detection of Human Body Disorders in R...Integrated E-Health Approach For Early Detection of Human Body Disorders in R...
Integrated E-Health Approach For Early Detection of Human Body Disorders in R...
IOSR Journals269 views
Application of Data Mining Technique in Invasion Recognition von IOSR Journals
Application of Data Mining Technique in Invasion RecognitionApplication of Data Mining Technique in Invasion Recognition
Application of Data Mining Technique in Invasion Recognition
IOSR Journals519 views
Simulation of Route Optimization with load balancing Using AntNet System von IOSR Journals
Simulation of Route Optimization with load balancing Using AntNet SystemSimulation of Route Optimization with load balancing Using AntNet System
Simulation of Route Optimization with load balancing Using AntNet System
IOSR Journals500 views
New and Unconventional Techniques in Pictorial Steganography and Steganalysis von IOSR Journals
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
IOSR Journals446 views
Electronic Load Controller for Self Exited Induction Generator Using Fuzzy Lo... von IOSR Journals
Electronic Load Controller for Self Exited Induction Generator Using Fuzzy Lo...Electronic Load Controller for Self Exited Induction Generator Using Fuzzy Lo...
Electronic Load Controller for Self Exited Induction Generator Using Fuzzy Lo...
IOSR Journals472 views
Performance Analysis of Rician Fading Channels using Nonlinear Modulation Met... von IOSR Journals
Performance Analysis of Rician Fading Channels using Nonlinear Modulation Met...Performance Analysis of Rician Fading Channels using Nonlinear Modulation Met...
Performance Analysis of Rician Fading Channels using Nonlinear Modulation Met...
IOSR Journals664 views
Causes of Delay in Construction of Bridge Girders von IOSR Journals
Causes of Delay in Construction of Bridge GirdersCauses of Delay in Construction of Bridge Girders
Causes of Delay in Construction of Bridge Girders
IOSR Journals149 views
Game Theory Approach for Identity Crime Detection von IOSR Journals
Game Theory Approach for Identity Crime DetectionGame Theory Approach for Identity Crime Detection
Game Theory Approach for Identity Crime Detection
IOSR Journals381 views
A comparative study of various diagnostic techniques for Cryptosporidiosis von IOSR Journals
A comparative study of various diagnostic techniques for CryptosporidiosisA comparative study of various diagnostic techniques for Cryptosporidiosis
A comparative study of various diagnostic techniques for Cryptosporidiosis
IOSR Journals401 views
Design and Implementation of New Encryption algorithm to Enhance Performance... von IOSR Journals
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
IOSR Journals531 views

Similar a D010332935

Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ... von
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...ijsrd.com
246 views4 Folien
G017344246 von
G017344246G017344246
G017344246IOSR Journals
139 views6 Folien
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks von
Energy Optimization in Heterogeneous Clustered Wireless Sensor NetworksEnergy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor NetworksIRJET Journal
77 views7 Folien
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI... von
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
5 views19 Folien
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I... von
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...IOSRJECE
230 views11 Folien
Iisrt divya nagaraj (networks) von
Iisrt divya nagaraj (networks)Iisrt divya nagaraj (networks)
Iisrt divya nagaraj (networks)IISRT
395 views5 Folien

Similar a D010332935(20)

Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ... von ijsrd.com
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
ijsrd.com246 views
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks von IRJET Journal
Energy Optimization in Heterogeneous Clustered Wireless Sensor NetworksEnergy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
IRJET Journal77 views
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI... von ijwmn
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
ijwmn5 views
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I... von IOSRJECE
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
Comparative Simulation Study Of LEACH-Like And HEED-Like Protocols Deployed I...
IOSRJECE230 views
Iisrt divya nagaraj (networks) von IISRT
Iisrt divya nagaraj (networks)Iisrt divya nagaraj (networks)
Iisrt divya nagaraj (networks)
IISRT395 views
Corona based energy efficient clustering in wsn 2 von IAEME Publication
Corona based energy efficient clustering in wsn 2Corona based energy efficient clustering in wsn 2
Corona based energy efficient clustering in wsn 2
IAEME Publication361 views
Data Centric Approach Based Protocol using Evolutionary Approach in WSN von ijsrd.com
Data Centric Approach Based Protocol using Evolutionary Approach in WSNData Centric Approach Based Protocol using Evolutionary Approach in WSN
Data Centric Approach Based Protocol using Evolutionary Approach in WSN
ijsrd.com279 views
Energy Proficient and Security Protocol for WSN: A Review von theijes
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
theijes345 views
A multi-hop routing protocol for an energy-efficient in wireless sensor network von IJECEIAES
A multi-hop routing protocol for an energy-efficient in wireless sensor networkA multi-hop routing protocol for an energy-efficient in wireless sensor network
A multi-hop routing protocol for an energy-efficient in wireless sensor network
IJECEIAES5 views
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin... von IJERD Editor
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
IJERD Editor544 views
Study of Leach Protocol- A Review von Editor IJMTER
Study of Leach Protocol- A ReviewStudy of Leach Protocol- A Review
Study of Leach Protocol- A Review
Editor IJMTER3.6K views
QUAD TREE BASED STATIC MULTI HOP LEACH ENERGY EFFICIENT ROUTING PROTOCOL: A N... von IJCNCJournal
QUAD TREE BASED STATIC MULTI HOP LEACH ENERGY EFFICIENT ROUTING PROTOCOL: A N...QUAD TREE BASED STATIC MULTI HOP LEACH ENERGY EFFICIENT ROUTING PROTOCOL: A N...
QUAD TREE BASED STATIC MULTI HOP LEACH ENERGY EFFICIENT ROUTING PROTOCOL: A N...
IJCNCJournal76 views
Energy Efficient Data Mining in Multi-Feature Sensor Networks Using Improved... von IOSR Journals
Energy Efficient Data Mining in Multi-Feature Sensor Networks  Using Improved...Energy Efficient Data Mining in Multi-Feature Sensor Networks  Using Improved...
Energy Efficient Data Mining in Multi-Feature Sensor Networks Using Improved...
IOSR Journals399 views
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net... von IJCNCJournal
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
IJCNCJournal42 views
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET... von IJCNCJournal
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
IJCNCJournal19 views
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca... von IRJET Journal
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
IRJET Journal12 views
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio... von IJSRED
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
IJSRED7 views
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey von ijsrd.com
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
ijsrd.com659 views

Más de IOSR Journals

A011140104 von
A011140104A011140104
A011140104IOSR Journals
1.2K views4 Folien
M0111397100 von
M0111397100M0111397100
M0111397100IOSR Journals
747 views4 Folien
L011138596 von
L011138596L011138596
L011138596IOSR Journals
732 views12 Folien
K011138084 von
K011138084K011138084
K011138084IOSR Journals
602 views5 Folien
J011137479 von
J011137479J011137479
J011137479IOSR Journals
603 views6 Folien
I011136673 von
I011136673I011136673
I011136673IOSR Journals
511 views8 Folien

Último

Cencora Executive Symposium von
Cencora Executive SymposiumCencora Executive Symposium
Cencora Executive Symposiummarketingcommunicati21
139 views14 Folien
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue von
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueShapeBlue
163 views54 Folien
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue von
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueShapeBlue
222 views23 Folien
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ... von
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...ShapeBlue
146 views15 Folien
Business Analyst Series 2023 - Week 4 Session 7 von
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7DianaGray10
126 views31 Folien
Uni Systems for Power Platform.pptx von
Uni Systems for Power Platform.pptxUni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptxUni Systems S.M.S.A.
61 views21 Folien

Último(20)

VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue von ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
ShapeBlue163 views
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue von ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
ShapeBlue222 views
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ... von ShapeBlue
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
ShapeBlue146 views
Business Analyst Series 2023 - Week 4 Session 7 von DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray10126 views
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... von ShapeBlue
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
ShapeBlue123 views
DRBD Deep Dive - Philipp Reisner - LINBIT von ShapeBlue
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBIT
ShapeBlue140 views
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O... von ShapeBlue
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
ShapeBlue88 views
Why and How CloudStack at weSystems - Stephan Bienek - weSystems von ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue197 views
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online von ShapeBlue
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online
ShapeBlue181 views
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive von Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit... von ShapeBlue
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
ShapeBlue117 views
The Power of Heat Decarbonisation Plans in the Built Environment von IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE69 views
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... von TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc160 views
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue von ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
ShapeBlue179 views
State of the Union - Rohit Yadav - Apache CloudStack von ShapeBlue
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStack
ShapeBlue253 views
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT von ShapeBlue
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBITUpdates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
Updates on the LINSTOR Driver for CloudStack - Rene Peinthor - LINBIT
ShapeBlue166 views
Future of AR - Facebook Presentation von Rob McCarty
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
Rob McCarty62 views
Digital Personal Data Protection (DPDP) Practical Approach For CISOs von Priyanka Aash
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash153 views

D010332935

  • 1. IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-ISSN: 2278-1676,p-ISSN: 2320-3331, Volume 10, Issue 3 Ver. III (May – Jun. 2015), PP 29-35 www.iosrjournals.org DOI: 10.9790/1676-10332935 www.iosrjournals.org 29 | Page Energy-Efficient Routing Cluster Protocols for Wireless Sensor Network Kritika, Ashok Kumar 1,1 Electronic and Communication Engineering Department & Applied Science, Ambala, Harayana, India Abstract: Wireless Sensor Networks (WSNs) consist of small nodes with sensing, calculation and wireless communications capability. Many routing, capacity management, and data circulation protocols have been specifically designed for WSNs where energy alertness is an needed method issue. The final development in the wireless network is the main condition for us to choose this topic. The focus has been given to the routing protocols which might differ depending on the application and network architecture. In this paper, we present a analyses of the state-of-the-method routing techniques in WSNs. We first diagram the design challenges for routing protocols in WSNs followed by an exhaustive of some of the routing techniques. Overall, the routing techniques are classified into three categories based on the underlying network structure: flat, hierarchical, and location-based routing .These protocols can be divided into lifetime -based, and Qos-based, depending on the protocol operation. We review the design trade-offs between energy and communication upward savings in some of these routing paradigm. We also mention the advantages and achievement issues of each routing technique. Keywords: Sensor Networks; Clustering Routing; LEACH; C LEACH;TL-LEACH, PEGASIS. I. Introduction Wireless Sensor Networks (WSNs) consists of tiny sensors nodes or environmental conditions such as temperature, sound, fluctuation, pressure,gesture at different locations. The evolution of wireless sensor networks was originally inspire by military applications for battlefield neglect. In these situations, it is difficult to replace the dead nodes caused by energy’s depletion with new ones to supply energy for the system.,sensor nodes working as deep as possible is the main method to maximize the life cycle of the system. The energy’s consumption of sensor node mainly emerge from the long distance transmission of data along the routing path, an efficient routing path formed by the routing protocol will have a great contact on the energy’s consumption [3]. So how to design an energy-efficient routing protocol becomes the main goal for the wireless sensor network.Therefore, wireless sensor networks are used in many civilian applications including environmental and home monitoring, health-care applications etc. This network enclose a large number of nodes which sense data from an desperately inaccessible area and send their data toward a processing center which is called “sink”. Since sensor nodes are power constrained devices, frequent and long-distance transmissions should be kept to minimum in order to prolong the network lifetime [1] Thus, communication between the sensor nodes and the base station is expensive, and there are no “high-energy” nodes through which communication can proceed. WSN are a widely applicable, major metalise technology. They bring a whole host of novel research challenges refer to energy efficiency, robustness, scalability, self-configuration, etc. These challenges must be take up at multiple levels through different protocols and mechanisms. Present partial solutions offer much hope for the future, but much work remains to be done. The use of clusters for transmitting data to the base station the advantages of small transmit distances for most nodes,compelling only a few nodes to transmit far distances to the base station. However, LEACH show better clustering algorithms by using adaptive clusters and rotating cluster-heads, among all the sensors. In addition, we show LEACH is able to perform local computation in each cluster to reduce the amount of data that must be transmitted to the base station. Clustering routing algorithms are now an active part of routing technology in WSNs due to various advantages, such as more scalable, less load, less energy consumption and more robustness [1][4]. The rest of the paper is organized as follows: Section II provides an overview of the LEACH,LEACH-C, ER-LEACH, PEGASIS, LEACH -SM TL LEACH AND V - LEACH Protocols.In section III, we simulate and compare the protocols. Finally, Section IV concludes this paper. II. Literature Survey The report on a Energy Efficient Clustering Protocols for Wireless Sensor Network by analysing the advantages and disadvantages of conventional routing protocols using our model of sensor networks, then developed LEACH (Low-Energy Adaptive Clustering Hierarchy), a clustering-based protocol that minimizes energy dissipation in sensor network. Different LEACH parameters are studied. Firstly, Allen et al. [17] presented that sensor networks with the ability to have small devices physically distributed near the objects being sensed brings new opportunities to observe and act on the world, for example with micro-habitat monitoring, structural monitoring, and wide-area
  • 2. Energy-Efficient Routing Cluster Protocols for Wireless Sensor Network DOI: 10.9790/1676-10332935 www.iosrjournals.org 30 | Page environmental systems. After that Effen et .al [16] presented that wireless sensor networks with thousands of tiny sensor nodes and expected to find wide applicability and increasing deployment in coming years as they enabled reliable monitoring and analysis of the environment. This paper proposed a modification to a well- known protocol for sensor called Low Energy Adaptive Clustering Hierarchy ). Akyildiz et .al [13], further analyzed that energy conservation have a main priority in all technology and engineering field. Most current applications that consume energy could be customized or optimized in a process resulting less energy consumption. Heinemann et al. [11] presented in underwater sensor networks and highlighted potential applications to off-shore oilseeds for constant monitoring, equipment monitoring, and underwater robotics. Then, Heinemann et al. [10] analyzed networking of hundreds or thousands of cheap micro sensor nodes and allowed users to accurately monitor a remote environment by intelligently combining the data from the individual nodes. Heinzelman et al. [9] proposed that the Hybrid Energy Efficient Distributed protocol for the heterogeneous wireless sensor network W. Heinzelman et al.[8] presented wireless sensor networks with thousands of tiny sensor nodes that expected to find wide applicability and increasing deployment in coming years, as they enable reliable monitoring and analysis of the environment.Balakrishna et al. [7] presented a growing interest in wireless sensor networks. The hot point in these algorithms was the cluster head selection. Rabiner et al. presented [6] that the energy conservation had a main order in all technology and engineering field. Handy et al. [5] presented wireless distributed micro sensor systems which invest the reliable monitoring of a variety of environments for both civil and military applications. V.Mhatre et al. [4] focused on reducing the power consumption of wireless micro sensor networks.Manjeshwar et al. [3] presented a formal classification of sensor networks, based on their mode of functioning, as proactive and reactive networks. Reactive networks, as opposed to passive data collecting proactive networks. Hssane et al. [2] presented wireless sensor network (WSN) which was a power constrained system, since nodes run on limited power batteries which shorten its lifespan. Kumar et al. [1] presented hybrid energy efficient distributed protocol for the homogeneous wireless sensor network. The main requirements of wireless sensor network were to prolong the network lifetime and energy efficiency. III. Leach Protocols A. Brief Description LEACH, an application-specific protocol develop. The application that normal micro sensor networks mean the monitoring of a remote environment. Since living nodes’ data are related in a sensor network, the end user does not require all the redundant data; rather, the end user needs a high-level purpose of the data that show the events appearing in the environment. Because the correlation is capable between data signals from nodes located close to each other, we chose to use a clustering infrastructure as the basis for LEACH. This confess all data from nodes within the cluster to be processe locally, reducing the data set that needs to be transmitted to the end user. In particular, data aggregation methods can be used to combine several related data signals into a smaller set of information that maintains the compelling data (i.e., the information content) of the original signals. Therefore, much less actual data needs to be transmitted from the cluster to the base station (BS). LEACH may be better when these assumptions do not hold. In LEACH, the nodes classify themselves into local clusters, with one node acting as the cluster head. All non-cluster head nodes transmit their data to the cluster head, while the cluster head node receives data from all the cluster members, performs signal processing part on the data (e.g., data aggregation), and transmits data to the remote BS. LEACH Low-Energy Adaptive Clustering Hierarchy (LEACH) was proposed by Heinzelman [5] and is one of the first clustering routing algorithms proposed for WSNs. LEACH was originally for wireless micro-sensor networks. LEACH is based on a clustering infrastructures, as all the data is handled in the cluster locally and only limited data is sent to the end user B. LEACH-C LEACH-Centralized [6] is an advancement of LEACH, it uses the variable steady state protocol as of LEACH but, uses a consolidate clustering algorithm for cluster formation. During the set up phase all the nodes transmits its area and energy level to the BS and then the BS decides which nodes should be CH and which nodes should combine to which CH. After this the BS broadcasts a message containing the CH ID for each node, if it accept its own ID it knows it is the CH. LEACH-C and LEACH have the same steady state phase. C. TL-LEACH The cluster formation protocol is a local process that recognise, a two-level hierarchy .In this way each node can decide to result in a good cluster. The use of two-levels of clusters for transmitting data to the base stations leverages the advantages of small transmit distances for more nodes more than in the beginning LEACH. In this way less nodes are required to transmit far distances to the base station and it is especially true in networks where the density of nodes is high. The use of clusters for transmitting data to the base station
  • 3. Energy-Efficient Routing Cluster Protocols for Wireless Sensor Network DOI: 10.9790/1676-10332935 www.iosrjournals.org 31 | Page advantages of small transmit distances for most nodes, involving only a few nodes to transmit far distances to the base station. Fig 2 Token Passing Scheme D. V-Leach V-LEACH protocol, the cluster contains; CH (responsible only for sending data that is received from the cluster members to the BS), vice-CH (the node that will become a CH of the cluster in case of CH dies), cluster nodes (gathering data from environment and send it to the CH .In the newest LEACH, the CH is always on receiving data from cluster members, combined these data and then send it to the BS that might be located far away from it. The CH will die previous than the other nodes in the cluster because of its operation of receiving, sending and overhearing. When the CH die, the cluster will become worthless because the data gathered by cluster nodes will never reach the base station. In V-LEACH protocol,likewise having a CH in the cluster, there is a vice-CH that takes the role of the CH when the CH dies because the reasons we show above by doing this, cluster nodes data will always reach the BS; no need to elect a new CH each time the CH dies.me. Fig.3 V -LEACH PROTOCOL The main issue with LEACH protocol lies in the random selection of cluster heads. There exists a probability that the cluster heads formed are unbalanced and may remain in one part of the network making some part of the network unreachable. This problem is resolved by using the concept of V-Leach. V Leach uses the concept of alternate Cluster Head called Vice Cluster Head and finally the network dies completely. E. PEGASIS Power-Efficient Gathering in Sensor Information Systems (PEGASIS) [7] is an improved version of LEACH. The goal of PEGASIS is that the node discourse to the other nodes in its organise and the nodes take turns to become a CH. It only selects one node as a CH to send data to the BS in each round. Each node compare with its close next door neighbors and takes turns to correspond with the BS. • Phase 1: Chain Construction: Starting from the node furthest from the BS the chain is constructed using a greedy algorithm, the chain formation can be adept by the sink or the nodes itself. • Phase 2: Data gathering and Transmission to BS: One node is selected as the CH randomly that communicates with the BS. When a node dies in the network a new chain is formed by passing the dead node. The CH receives all the fused data from the Sensor Node (SN) and sends it to the Base Station (BS). Data transmission in PEGASIS.
  • 4. Energy-Efficient Routing Cluster Protocols for Wireless Sensor Network DOI: 10.9790/1676-10332935 www.iosrjournals.org 32 | Page FIG. 4 LEACH NETWORK F. Efficient-Routing Leach (ER-LEACH) Efficient Routing LEACH (ER-LEACH) [3] which is a modified version of the well-known LEACH protocol.There are three contributions in this protocol which are upgrading the selection of the cluster head during setup phase by taking into account the residual energy of any sensor node which intends to become a CH to prolong the network lifetime. The second contribution is trying to reduce the overhead of dynamic clusters generation by using alternative CH which is expected to take the role of the CH in case that the underlying CH died which will prolong the lifetime of each cluster, and finally for the sake of load balancing the zone routing protocol is used which attempts to balance the load over CHs evenly by permitting the CH to discover the optimal route to the BS with less cost messages update and then sends the fused data to the BS through many other CHs instead of direct sending to the BS. ER-LEACH is normal to perform well especially when the mobility is very high and will prolong the overall network lifetime through load balancing G. Leach – Spare Management (LEACH-SM) LEACH-SM protocol [5] modifies LEACH by enhancing it with an efficient management of spares. It is also designed for static sensor nodes and static targets. LEACH-SM contract with both energy-consumption in efficiencies of LEACH. LEACH-SM adds a phase, called the spare selection phase. IV. Comparison Of Leach,Leach-C, Er-Leach, Pegasis, Leach -Sm Tl Leach And V - Leach There are many techniques available for data evaluation such as real-life measurements, analytic modeling and software simulations. For real-life measurements we will require hardware to set up a wireless sensor network. This is not a feasible method for data evaluation as we usually want to acquire data for hundreds of nodes and to setup such a large network can be a time and money consuming task. The second method which involves formulating mathematical equations for the network. This also is a very heavy task as it will involve a lot of time consuming and clear calculations. So we will use simulation using Network Simulator-2 (NS-2) [8] to imitate the behavior of a WSN. A.Throughput To represent the throughput of each protocol we use data received at the BS with respect to time and energy dissipation. LEACH-C performs 20% better than LEACH due to the built up computation by the BS to find better clusters. LEACH-C successfully delivers more data to the BS than LEACH with respect to both time and energy. Hence proving that LEACH-C has a higher throughput than LEACH..PEGASIS performs better than both LEACH and LEACH-C. PEGASIS performs 260% better than LEACH and 200% better than LEACH-C.TL LEACH performs better than LEACH, LEACH-C and PEGASIS..In TL LEACH throughput (data signals received at the BS) . B.Network Lifetime To represent network lifetime we will compare the nodes alive of each protocol to time and data received at BS. PEGASIS sends multifold data to the BS in comparison to LEACH or LEACH-C.PEGASIS
  • 5. Energy-Efficient Routing Cluster Protocols for Wireless Sensor Network DOI: 10.9790/1676-10332935 www.iosrjournals.org 33 | Page deliver the most data per unit energy followed by LEACH-C and then than LEACH, hence PEGASIS achieves both energy efficiency and latency efficiency but TL LEACH achieve density of nodes is high . LEACH is not as efficient as LEACH-C or PEGASIS (LEACH-C delivers about 20% and PEGASIS delivers more than 250% data per unit energy than LEACH respectively). The reason for this is that in LEACH- C the BS has global information of the position and energy of the other nodes, due to it can create enhanced clusters that need lesser energy for transmission. PEGASIS outperforms LEACH and LEACH-C as it removes the overhead of dynamic cluster information, PEGASIS also minimizes the sum of distances and restrict the number of transmissions, but TL LEACH require less nodes to transmit far distances to the base station ,network lifetime of TL LEACH (number of nodes alive over time). C.Energy Consumption As LEACH-C is able to send more data packets per unit energy consumed which confirm that LEACH- C performs better than LEACH in terms of energy consumption. PEGASIS consumes the least energy to per data packet sent to the BS and behave the best and hence is the most energy efficient. In TL LEACH we do not assume any constant energy dissipating nor do we remove energy during carrier-sense operations. D. CH Selection In clustering head selection of LEACH and V -LEACH is arbitrary,C - LEACH CH Selection done by BS based on energy.T-L LEACH is also based on energy.In ER-LEACH CH Selection based on Energy decided with in the cluster and at last LEACH -SM , during the cluster setup phase ,each node decided in lateral whether should become in active primary node or passive spare node.In PEGASIS data gathering and Transmission done by BS on each node correspond with its close next door neighbors and takes turns to correspond with the BS. E. Data Transmission In LEACH and C LEACH both are all CH sends directly to BS.In V - LEACH Vice CH takes over CH in case CH dies,ER-LEACH if the base station is not within range of CH ,it routed the CH in case of deadhead and LEACH SM the passive spare nodes goes to asleep where the data is transmitted through the primary active node. F. Mobility The mobility of LEACH ,C LEACH and V LEACH is stationary but ER-LEACH refers to mobile and SM-LEACH designed for static sensor nodes and static targets. V. Routing Challenges And Design Issue In Wsns The design of routing protocols in WSNs is formed by many demanding factors. These factors must be efficient communication can be achieved in WSNs. A. Node deployment Node deployment in WSNs is application debased and modify the performance of the routing protocol. The performance can be either deterministic or randomized. In deterministic deployment, the sensors are annually placed and data is routed through pre-determined paths. However, in odd node deployment, the sensor nodes are dispersed randomly creating an infrastructure in an ad hoc manners. Therefore, it is most likely that a route will consist of multiple wireless hop. B. Energy consumption without losing accuracy Sensor nodes can use up their limited supply of energy operating computations and transmitting information in a wireless environment. As such, energy sustain forms of communication. In a multihop WSN, each node show a dual role as data sender and data router. C. Data Reporting Model Data sensing and reporting in WSNs is a based on the application and the time essential of the data reporting. Data reporting can be classified as either time-driven ,event-driven, query-driven, and hybrid.The time-driven require periodic data monitoring. Sensor nodes will periodically switch on their sensors and transmitters, sense the environment and transmit the data of relevance at steady periodic time intervals. D. Fault Tolerance Some sensor nodes may fail or be blocked due to lack of power or environmental interference etc. The deficit of sensor nodes should not affect the overall task of the sensor network. If various nodes fail, MAC and
  • 6. Energy-Efficient Routing Cluster Protocols for Wireless Sensor Network DOI: 10.9790/1676-10332935 www.iosrjournals.org 34 | Page routing protocols must involve formation of new links and routes to the data collection base stations and require adjusting transmit powers and signaling rates on the existing links to reduce energy consumption. Therefore, various levels of redundancy may be needed in a fault-tolerant sensor network. E. Scalability The number of sensor nodes deployed in the sensing area may be in order of hundreds or thousands or many Any routing scheme must be able to work with this large number of sensor nodes. In addition, sensor network routing protocols should be expansible to respond to events in the environment. Until most of the sensors can remain in the sleep state with data from the few remaining sensors providing a quality. F. Network Dynamics Most of the network architectures assume that sensor nodes are static. However, mobility of both BS’s or sensor nodes is sometimes need in many applications.Routing messages from or to moving nodes is more impose. Since route stability becomes a important to energy, bandwidth etc. VI. Conclusions In this paper,Wireless sensor networks consists of thousands of tiny, low cost, low power and multifunctional sensor nodes where each sensor node has very low battery life. Various energy efficient algorithms have been designed for this. LEACH uses distributed cluster formation & randomized rotation of the cluster head to minimize the network energy consumption. This paper proposes a new version of LEACH protocol called V LEACH protocol,there is less number of dead nodes,Number of alive nodes is enhanced, Based on our MATLAB simulations described above, we are confident that LEACH will outperform conventional communication protocols, in terms of energy dissipation, ease of configuration, and system lifetime / quality of the network.The proposed work improvement over the V-Leach; in this proposed work we are trying to improve the network life., initially when the cluster heads are selected based on the energy and the distance parameters; we also select the Vice Cluster Head. LEACH show better clustering algorithms by using adaptive clusters and rotating cluster-heads, among all the sensors. In addition, we show LEACH is able to perform local computation in each cluster to reduce the amount of data that must be transmitted to the base station.,routing technology show in WSNs due to various advantages, such as more scalable, less load, less energy consumption and more robustness References [1]. SasikumarM,Dr.R.Anitha,February2014.“Performance Evaluation of Heterogeneous HEED Protocol for Wireless Sensor Networks”, International Journal of Advanced Research in Computer and Communication Engineering Volume 3, Issue 2. [2]. Abderrahim BENI HSSANE , Mosley Lahcen HASNAOUI ,2010. “Improved and Balanced LEACH for heterogeneous s wireless sensor networks”, Ben Alla Said et al. / (IJCSE) International Journal on Computer Science and Engineering Volume. 02, Number 08. [3]. V.Mhatre and C. Rosenberg, “Homogeneous vs. heterogeneous clustered sensor networks: A comparative study,” in Proceedingsof 2004IEEE International Conference on Communications (ICC 2004) June 2000. [4]. Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan, January 2000.”Energy-Efficient CommunicatioProtocol for Wireless Microsensor Networks”Copyright 2000 IEEE. Published in the Proceedings of the Hawaii International Conference on System Sciences, January 4-7, 2000, Maui, Hawa [5]. W. Heinzelman, A. Chandrakasan, and H. Balakrishnan. “uAMPS ns Code Extensions”. http://wwwmtl.mit.edu/research/icsystems/uamps/ leach. [6]. W. R. Heinzelman, “Application-Specific Protocol Architectures for Wireless Networks,” Ph.D. thesis, Massachusetts Institute of Technology, 2000. [7]. Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari “Energy-Efficient Communication Protocol for Wireless Microsensor Networks” Copyright 2005 IEEE. Published in the Proceedings of the Hawaii International Conference on System Sciences, January 4- 7, 2000, Maui, Hawaii. [8]. Wendi B. Heinzelman February “An Application-Specific Protocol Architecture for Wireless Microsensor Networks” IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 1,NO. 4, february 2000 [9]. M. Bani Yassein, A. Al-zou'bi, Y. Khamayseh, W. Mardini “ Improvement on LEACH Protocol of Wireless Sensor Network (VLEACH)” [10]. Bluetooth Project. http://www.bluetooth.com, 2011. [11]. I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E.Cayirci, “A Survey on Sensor Networks”, IEEE Communications Magazine 40 (8) (2002)104-112,pp. 234 [12]. G. Simon, M. Maroti, A. Ledeczi, G. Balogh, B. Kusy, A. Nadas, G. Pap, J. Sallai, K. Frampton, , 2004. “Sensor Network-Based Counters Niper System”, In Proceedings of the Second International Conference on Embedded Networked Sensor Systems (Sensys), Baltimore, MD,pp. 984 [13]. J. Yick, B. Mukherjee, D. Ghosal, 2002“Analysis of a Prediction-Base Mobility Adaptive Tracking Algorithm”, the IEEE Second International Conference on Broadband Networks,pp. 541-545 [14]. M. Castillo-Effen, D.H. Quintela, R. Jordan, W. Westhoff, W. Moreno, 2004 "Wireless Sensor Networks for Flash-Flood Alerting”, in Proceedings of the Fifth IEEE International Caracas Conference on Devices, Circuits and Systems, Dominican Republic,pp. 231 [15]. G. Wener-Allen, K. Lorincz, M. Ruiz, O. Marcillo, J. Johnson, J. Lees, M. Walsh, 2006. “A Wireless Sensor Network on an Active Volcano, Data-Driven Applications in Sensor Networks”,IEEE Internet Computing, March/April. Volume 2, Issue Number 5, pp. 765
  • 7. Energy-Efficient Routing Cluster Protocols for Wireless Sensor Network DOI: 10.9790/1676-10332935 www.iosrjournals.org 35 | Page [16]. V. Raghunathan, A. Kansai, J. Hse, J. Friedman, M. Srivastava, 2005,"Design Considerations for Solar Energy Harvesting Wireless Embedded Systems", in Proceedings of the IPSN ,Volume 1, Issue Number 5,pp. 897 [17]. P. Zhang, C.M. Sadler, S.A. Lyon, M. Martonosi, 2004, "Hardware Design Experiences in Zebranet", Proceedings of the SenSys’04, Baltimore, MD, Volume 2, Issue Number 5,pp.765 [18]. S. Roundy, J.M. Rabaey, P.K. Wright, 2004,"Energy Scavenging for Wireless Sensor Networks" ,Volume 41, Issue Number 5,pp. 762. [19]. M. Rahimi, H. Shah, G.S. Sukhatme, J. Heideman, D. Estrin, 2003, "Studying the Feasibility of Energy Harvesting in Mobile Sensor Network " the IEEE ICRA, Volume 41, Issue Number 5, pp. 19–24. [20]. Akyildiz, I.F.; Su, W.; Sankarasubramaniam, Y.; Cayirci, E. Wireless sensor networks. 2002, 38, 393–422.