SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
Survey on Wireless Sensor Networks Routing
Protocols Based on Energy Efficiency
Ms. S.NIVEDITHA1
, Ms.M.USHA2
1
M.E., Department of Computer Science and Engineering, Velammal Engineering College, Chennai.
2
Assistant Professor, Department of Computer Science and Engineering, Velammal Engineering College,
Chennai.
unique.nive@gmail.com, umahalingam@gmail.com
Abstract-Energy consumption and balancing has always been a
hot research topic in wireless sensor networks, in this survey,
some of the hierarchical routing protocols(LEACH,
HEED,PEGASIS, TBC, TREEPSI) with high energy efficient
were examined based on some strategies such as data aggregation
and clustering, routing and dynamic node allocation methods in
the clustering environment. The routing protocols are compared
with each other based on these strategies and based on the
network life time definitions. Simulation results show which
protocol has better prolonging lifetime than other traditional
protocols by reducing the energy consumption and load
balancing.
Key words: Load balancing, Data aggregation, clustering routing
protocol.
I. INTRODUCTION
Wireless sensor networks periodically collects the information
of the interested unmanned monitoring area independently
through deploying a large number of wireless sensor nodes
and send the data to the remote base
station.Wirelesssensornodesare deployedrandomlyand
denselyina
targetregion,especiallywherethephysicalenvironmentissohars
hthatthesensor counterpartscannotbe
deployed.Afterdeployment,thenetworkcannotworkproperlyun
lessthereissufficientbatterypower.
Wireless sensor nodes have so many important applications,
including military application, disaster prediction and
environment monitoring.
The military application is performed in the rough
environments where the sensor parts cannot deploy due to the
energy consumption.
Clusteringis very effectivetechnique.Itcan greatly contribute
to overall system scalability, lifetime, and energy
efficiencyinwirelesssensornetworks(WSNs).Grouping sensor
nodes into cluster to satisfy the scalability and achieve high
energy efficiency and prolong network lifetime in large scale
WSN environment. The hierarchical routing protocol imply
cluster based organization of the sensor node in order to
perform data fusion and aggregation which leads to energy
saving. In hierarchical network structure each cluster has a
leader, which is called the cluster head (CH) which perform
the data aggregation and data transmission to the base station
by direct or intermediate communication with other CH
nodes.
Energyconsumption ofanodeisduetouseful,
wastefuloperations.The
usefuloperationsincludestransmittingorreceivingdatamessag
es,andprocessingrequests.Thewastefulconsumption
includesconstructingroutingtree,overhearing,
retransmittingbecauseofharshenvironment,
dealingwithredundantover- head messages,andidlelisteningto
the media.Each node sends information directly to the base
station to full fill the basic task of the sensor nodes. If the
base station is located far away from the target area, the
sensor nodes will die quickly due to much energy
consumption. The distance is also very important factor and
the direct transmission leads to the unbalanced energy
consumption.
Proceedings of International Conference on Developments in Engineering Research
ISBN NO : 378 - 26 - 13840 - 9
www.iaetsd.in
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
38
In general WSN produce large amount of data so if data
fusion could be used, the through put could be reduced. Data
fusion reduces the redundant data by combining the redundant
data to reduce the transmission by suppression, min, maxand
average functions. Substantial energy can be saved through
the data aggregation this technique has used to achieve energy
efficiency and traffic optimization in a number of routing
protocols. The data fusion or data aggregation assume that the
length of message transmitted by each relay node should be
constant. That is each transmits the same volume of data.
The distance between the nodes to BS leads to two extreme
cases
1. The length of message transmitted by the parent
node not only depends on the own length also
depends on the length of the message received from
its child nodes.
2. The relay node should transmit the length of the
message which is the sum of its own sensed data
and the received data
Network lifetime has two different definitions: [1]
1. The time from the start of the operation to death of
the first node.
2. The time from the start of the operation to death of
the last node
Energy aware protocols and data gathering protocols offering
high scalability. A common solution for the balancing energy
consumption among all the network nodes, is to periodically
re-elect new CH in each cluster.
The remainder of the paper is presented as follow:Section
IIdiscuss the literature survey. Finally, Section III concludes
the paper.
II. LITERATURE SURVEY
A routingprotocol specifies the routers communicate with
each other, and selects the routes between any two nodes on
a computer network. Routing algorithms determine the
specific choice of route. Each router has knowledge of
networks attached to it directly. A routing protocol shares this
information first among immediate neighbors, and then
throughout the network. Routing strategy is generally based
on the following criteria
1. Achieve minimum cost forwarding, while design of
the most data forwarding protocol is based on the
optimality.
2. Reducing the minimum number of performed
operations
3. Scale to large network size with some constrains
WSN is classified into three categories based on the structure:
Flat, hierarchical, and location based routing.
2.1Hierarchical protocols:
Hierarchical routing is a method of routing in networks that is
based on hierarchical addressing. It imposes the structure on
the network to achieve energy efficiency, stability and
scalability. In hierarchical protocols nodes are organized in
clusters inwhich a node has some responsible takes the role of
cluster head which is responsible for coordinating and
message transmitting activities. Clustering reduces the energy
consumption to prolongs the life time, can balance the load
and increase the scalability.
2.1.1. LEACH: [2][3]
LEACHisthe most energy efficientclusteringalgorithm
forWSNs that forms nodes in clusterbased environment.
Based onthe receivedsignal strengthand uses these
localclusterheadsasrouters tothe BS.
Proceedings of International Conference on Developments in Engineering Research
ISBN NO : 378 - 26 - 13840 - 9
www.iaetsd.in
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
39
Data transferto theBSconsumesmoreenergy,all thesensor
nodeswithina clustertaketurns withthe transmission by
rotatingthe cluster heads. This
leadstobalancedenergyconsumption ofallnodes,and hence a
longerlifetime ofthe network
The basic operations of LEACH was performed in two
phases:
 Setup phase:
 Cluster formation.
 Cluster head was selected and informed to
all other nodes.
 Preparation of transmission schedule.
 Steady phase:
 Data fusion.
 Transmission to destination node
Inthe setup phase, each node n chooses a random number
between 0 and 1. If the number is less than a threshold T (n),
the node becomes a cluster head for the current round. The
threshold is set as:
T (n) = ___P______ if n belongs to G
1-P *(r mod1/P)
Otherwise 0
P = percentage of cluster heads,
r = current round
G = set of nodes
G is not cluster head in the last 1/P rounds. After the cluster
heads are selected, the other nodes organize the local clusters
by choosing the most appropriate cluster head (closest cluster
head).
In the steady-state phase the cluster heads receive data from
the nodes, and transfer the fused data to the base station. And
the communication is performed via the TDMA
Advantages of LEACH:
 It performs most of the communication inside
the clusters, and provides scalability.
 The data fusion leads to a limit on the traffic
generated in the network.
 Single-hop routing from node to cluster head,
hence saving energy.
 It increases network lifetime in three ways:
 Distributing the role of CH to the other
nodes.
 Aggregating the data by the CHs.
 TDMA, which, assigned by the CH to
its members, puts most of the sensor in
sleep mode, in event-based
applications. Itincreases the network
lifetime and achieve a more than 7-fold
reduction in energy dissipation
compared to direct communication
 It is dynamic clustering and well-suited
for applications where constant
monitoring is needed and data
collection occurs periodically to a
centralized location.All thesensor
nodeswithina clustertaketurns withthe
transmission by rotatingthe cluster
heads. This leadstobalancedenergy
consumption ofallnodes,and hence a
longerlifetime ofthe network.
Disadvantages of LEACH:
 Due to the selection of cluster heads. Because
itdon’t consider the energy of the nodes for CH
selection.
 It significantly relies on cluster heads and face
robustness issues.
 Additional overheads due to cluster head
changes leads to the energy inefficiency for
dynamic clustering in large networks.
 It has no inter cluster communication, and this
needs high transmission power.
 It selects the CH in random manner it results that
the low power node can become a cluster head, it
will deplete its energy quickly. And the local
cluster head only by distance between
themselves and it results the formation of
minimum or maximum cluster.
Proceedings of International Conference on Developments in Engineering Research
ISBN NO : 378 - 26 - 13840 - 9
www.iaetsd.in
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
40
 Single hop method.
2.1.2. HEED: [4]
HEED (Hybrid energy efficient distributed clustering)
periodically selects cluster heads according based on the
node residual energy and other parameter like proximity
to node degree. HEED terminates in O (1) iterations, it
incurs low message overhead and achieve uniform cluster
head distribution across the network.
HEED was designed to select different cluster heads in a
field according to the amount of energy that is distributed
in relation to a neighboring node
The basic operations of HEED protocol was performed
by the following steps:
 Defining parameters used in the cluster
formation.
 Protocol operation.
Cluster formation:
Cluster head selection is based on the residual energy of
each node. The parameters are measuring the residual
energy and estimating the intracluster communication
cost. The first parameter select initial set of cluster heads,
the second parameter performing the cluster power level
which increase initial reuse and reserve power for
intercluster communication.
Protocol operation:
At each node, the clustering process requires a number
of iterations, which was referred as Niter. Every step
takes time tc to receive messages from any neighbor
within the cluster range. An initial percentage was
assigned to cluster heads among all n nodes, Cprob.
Cprob is only used to limit the initial cluster head
announcements, and has no direct impact on the final
clusters.
Before a node starts executing HEED, itsets its
probability of becoming a cluster head, CHprob, as
follows:
CHprob = Cprob * Eresidual / Emax
Eresidual = estimated current residual energy in the node.
Emax = reference maximum energy which is typically
identical for all nodes. The CHprob value of a node,
however, is not allowed to fall below a certain threshold
pmin. Every node then doubles its CHprob and moved to
next step.
In HEED energy consumption it extends the lifetime of
all the nodes, which adds to the stability of the neighbor
set. Nodes automatically update their neighbor sets by
periodically sending and receiving heartbeat messages.
If a node elected as a cluster head, it sends an
announcement message cluster_head_msg(Node ID,
selection status, cost), where the selection status is set to
tentative_CH if CHprob<1, or final_CH, if it’s
CHprob = 1. A node considers itself “covered” if it is
heard from either a tentative_CH.
If a node completes HEED execution without selecting a
cluster head that it considers itself uncovered, and
announces itself to be a cluster head.
Advantages:
 HEED distribution of energy extends the lifetime of
the nodes within the network thus stabilizing the
neighboring node.
 Does not require special node capabilities, such as
location-awareness
 Does not make assumptions about node distribution
 Operates correctly even when nodes are not
synchronized.
 The advantages of HEED are that nodes only require
local (neighborhood) information to form the clusters
 The algorithm guarantees that every sensors is part of
just one cluster, and the cluster heads are well-
distributed.
Disadvantages:
Proceedings of International Conference on Developments in Engineering Research
ISBN NO : 378 - 26 - 13840 - 9
www.iaetsd.in
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
41
 The random selection of the cluster heads, may cause
higher communication overhead for:
 The ordinary member nodes in
communicating with their corresponding
cluster head
 Cluster heads in establishing the
communication among them, orBetween a
cluster head and a base station
 The periodic cluster head rotation or election needs
extra energy to rebuild clusters
In HEED Multi level hierarchy cannot be achieved.
Recursive applications cannot be applied.
2.1.3. PEGASIS: [5]
PEGASIS (Power-Efficient Gathering in Sensor
Information Systems), is an optimal. In PEGASIS, each
nodes communicates only with the close neighbor and
transmits the information to the base station, it reduces
the amount of energy spent per round.
It distributes the energy load evenly among the sensor
nodes in the network. The sensor nodes are randomly
placed in the play field. The nodes are organized to form
a chain, which was accomplished by the sensor nodes
using a greedy algorithm starting from some node. On the
other hand the BS can compute this chain and broadcast it
to all the sensor nodes.
Construction of the chain starts with the farthest node
from the BS. The nodes farther from the BS have close
neighbors, as in the greedy algorithm the neighbor
distances will increase gradually. When a node dies, the
chain will be reconstructed and the threshold can be
changed to determine to elect leaders. In it (i mod N) th
node is chosen to be a leader.
Data gathering in each round each node receives data
from neighbor, fuses with its own data, and transmits to
the other node in chain.The leader was selected in each
round of communication in a random manner and random
position on the chain, because of the death of nodes at
random locations. Token passing approach initiated by
the leader to start the data transmission from the ends of
the chain.
It performs data fusion at every node except the end
nodes in the chain. Each node will fuse its neighbor’s data
with its own to generate a single packet of the same
length and then transmit that to its other neighbor (if it
has two neighbors).
Advantages of PEGASIS are
1. Local gathering distance is less than LEACH
2. The amount of data for the leader to receive
3. Limiting the number of transmissions and receives
among all nodes.
4. It eliminates the overhead of dynamic cluster
formation, minimizing the distance non leader-nodes
must transmit.
Disadvantages:
Whenevera node dies the whole chain has to be
reconstructed and the scalability is also an important issue
in PEGASIS.
2.1.4. Tree Based Clustering: [6]
Tree-Based Clustering (TBC) is also have cluster based
environment and each cluster has a cluster-head (CH).
Tree configuration:The cluster construct a routing tree
Proceedings of International Conference on Developments in Engineering Research
ISBN NO : 378 - 26 - 13840 - 9
www.iaetsd.in
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
42
where the cluster-head acts as a root. All sensor in a
routing tree sends data to a single collection point know
as root.
All the nodes arelocation-aware. The distance between
the node and the root is for determining its level in the
cluster. The nearest node is elected asitsparentnode.
Data transmission: Data transmission performed
simultaneously. Data is gathered and each node fuses the
received data and transmits it to its parent. InTBC each
node holds the information of its neighbors. Fast data
collection is main advantage in TBC
2.1.4.1. TREEPSI:[7]
In TREEPSI sensor nodes are deployed randomly node i
(ith
node) is placed at a random location. Compute the
path by BS and broadcast the path information to other
nodes. After the construction of the tree it collects
information from the field.
TREEPSI is a tree based multi-hop routing protocol to
construct a hierarchical path of the nodes. In this nodes
will fuse the received data with their own data and
forward the resultant data to their parent. It will repeat
this process till all the data are received by the root node.
The data are collected at the root and at last root takes
responsibility to transmit the
datatotheBS.Afterthedeathofnode,
anewtreepathisconstructed. Sothe overhead per
communication round is less as compared to the energy
spent in the data collection phase.
Two schemes:
1. After root initiate data gathering process by sending a
small control packet to the children nodes using
standard tree traversal algorithm.it will consume
some negligible amount of energy but with little
more delay.
2. All the leaf nodes send sensed information to their
parent. The parent nodes fuse the received data with
their own data and forward the resultant data to their
parent until data are received by the root node. It has
less delay, but needs to introduce some multiplexing
scheme to avoid collision.
This path is used for several rounds until node i dies.
After the death of node i, a new tree path is constructed
with node i+1 as the root.
The simulation results shows that TREEPSI outperforms
all the existing protocols in terms of energy efficiency.
2.1.5. GSTEB: [1]
In GSTEB (General self-organized tree based energy
balancing routing protocol) the basic tree construction
and communication operation is similar to the TCB.
In each round BS assigns a root node and broadcasts its
ID and its coordinates to all sensor nodes. And data
aggregation takes place.GSTEB changes the root and
reconstruct the routing tree with short delay and low
energy consumption by this betterbalancedloadis
achieved.
The operation of GSTEB is divided into Initial Phase
1. Tree ConstructingPhase
2. Self-OrganizedDataCollecting
3. Transmitting Phase
4. Information Exchanging Phase.
EL(i)=[residual energy(i)/constant reflect the
minimum energy unit]
GSTEBoutperformsLEACH, PE- GASIS,
TREEPSI [9]andTBC.Because GSTEBisaself-
organizedprotocol,itonlyconsumesasmallamountof
energy ineach round
tochangethetopographyforthepurposeofbalancingt
heenergyconsumption.Alltheleafnodescantransmit
datainthesameTDMAtimeslotsothatthetransmitting
delay
isshort.Whenlifetimeisdefinedasthetimefromthestar
tofthe networkoperationto thedeath of thefirstnode
in the network.
Advantages of GSTEB:
 Load balancing
 Self-organizing
 More efficient than other routing protocols.
Proceedings of International Conference on Developments in Engineering Research
ISBN NO : 378 - 26 - 13840 - 9
www.iaetsd.in
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
43
 GSTEB prolongs the life time by balancing
the load.
III. Conclusions:
In this survey paper, routing protocols are compared based on
the network life time and data aggregation and the load
balancing criteria. Then the new GSTEB protocol’s
simulations show that GSTEB outperforms LEACH,
PEGASIS, TREEPSI and TBC. Because GSTEB is a self-
organized protocol, it only consumes a small energy and it
balancing the energy consumption and it have short
transmission. GSTEB prolongs the lifetime by 100% to 300%
compared with PEGASIS [1].
GSTEBprolongsthelifetimeofthenetworkbymorethan100%
compared with HEED.
TABLE 1:
NETWORK LIFE TIME
PROTOCOL ROUND TAKEN TO
A NODE DIE
ROUND TAKEN TO
ALL NODES DEAD
LEACH 118 248
PEGASIS 246 568
TREEPSI 267 611
TBC 328 629
GSTEB 389 677
REFERENCES:
[1] Zhao Han, Jie Wu, Liefeng Liu, Jie Zhang and kaiyunTian “A General
self-organized tree based energy balance routing protocol for wireless sensor
networks”., vol.61 , 0018-9499, 2014
[2] Ankit Solanki,prof.niten b. patel “LEACH-SCH: An innovative routing
protocol for wireless sensor network” 4th
icccnt-2013
[3] “An Integrative Comparison of Energy Efficient Routing Protocols in
Wireless Sensor Network” ,Ali Norouzi1, Abdul Halim Zaim2 1Department
of Computer Engineering, Istanbul University (Avcilar), Istanbul, Turkey
2Department of Computer Engineering, Istanbul Commerce University
(Eminonu), Istanbul, Turkey Email: norouzi@cscrs.itu.edu.tr,
azaim@iticu.edu.tr Received December 8, 2011; revised January 11, 2012;
accepted January 30, 2012
[4] “HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for
Ad Hoc Sensor Networks”, OssamaYounis, Student Member, IEEE, and
Sonia Fahmy, Member, IEEE, IEEE TRANSACTIONS ON MOBILE
COMPUTING, VOL. 3, NO. 4, OCTOBER-DECEMBER 2004
[5] “PEGASIS: Power efficient gathering in sensor information system”
Stephanie Lindsey and Cauligi S. Raghavendra,”IEEE AC paper #242 ,
updated Sept. 29,2001. 0-7803-7231- 2002 IEEE.
[6]O.durmazincel, a.ghosh,b.krishnamachari and k.chintalapudi “Fast data
collection in tree based wireless sensor networks” ieeecs,comsoc.
[7] “TREEPSI: TRee based Energy Efficient Protocol for Sensor
Information”SiddharthaSankarSatapathy, NityanandaSarmaTezpur
University, Napaam-784028, 2006 IEEE
Proceedings of International Conference on Developments in Engineering Research
ISBN NO : 378 - 26 - 13840 - 9
www.iaetsd.in
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
44

Contenu connexe

Tendances

Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocolijceronline
 
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...IJMIT JOURNAL
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
Various Clustering Techniques in Wireless Sensor Network
Various Clustering Techniques in Wireless Sensor NetworkVarious Clustering Techniques in Wireless Sensor Network
Various Clustering Techniques in Wireless Sensor NetworkEditor IJCATR
 
29 ijaprr vol1-4-14-23kishor
29 ijaprr vol1-4-14-23kishor29 ijaprr vol1-4-14-23kishor
29 ijaprr vol1-4-14-23kishorijaprr_editor
 
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...IJCNCJournal
 
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyData Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyCSCJournals
 
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...IJCNCJournal
 
Paper id 28201419
Paper id 28201419Paper id 28201419
Paper id 28201419IJRAT
 
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...IJCNCJournal
 
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...ijcncs
 
Cluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor NetworksCluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor Networkseditor1knowledgecuddle
 

Tendances (15)

Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocol
 
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
WIRELESS SENSOR NETWORK CLUSTERING USING PARTICLES SWARM OPTIMIZATION FOR RED...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
Various Clustering Techniques in Wireless Sensor Network
Various Clustering Techniques in Wireless Sensor NetworkVarious Clustering Techniques in Wireless Sensor Network
Various Clustering Techniques in Wireless Sensor Network
 
D031202018023
D031202018023D031202018023
D031202018023
 
29 ijaprr vol1-4-14-23kishor
29 ijaprr vol1-4-14-23kishor29 ijaprr vol1-4-14-23kishor
29 ijaprr vol1-4-14-23kishor
 
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
 
Thesis-Final-slide
Thesis-Final-slideThesis-Final-slide
Thesis-Final-slide
 
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art SurveyData Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
Data Dissemination in Wireless Sensor Networks: A State-of-the Art Survey
 
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
 
Paper id 28201419
Paper id 28201419Paper id 28201419
Paper id 28201419
 
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
DESIGN AND IMPLEMENTATION OF ADVANCED MULTILEVEL PRIORITY PACKET SCHEDULING S...
 
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...
 
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
Design and Performance Analysis of Energy Aware Routing Protocol for Delay Se...
 
Cluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor NetworksCluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor Networks
 

En vedette

Iaetsd degraded document image enhancing in
Iaetsd degraded document image enhancing inIaetsd degraded document image enhancing in
Iaetsd degraded document image enhancing inIaetsd Iaetsd
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECYogesh Fulara
 
Logiciel libre de simulation a événement discret
Logiciel libre de simulation a événement discret Logiciel libre de simulation a événement discret
Logiciel libre de simulation a événement discret Anis Nouri
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd Iaetsd
 
Iaetsd asynchronous data transactions on so c using fifo
Iaetsd asynchronous data transactions on so c using fifoIaetsd asynchronous data transactions on so c using fifo
Iaetsd asynchronous data transactions on so c using fifoIaetsd Iaetsd
 
Iaetsd load area frequency control for multi area power
Iaetsd load area frequency control for multi area powerIaetsd load area frequency control for multi area power
Iaetsd load area frequency control for multi area powerIaetsd Iaetsd
 
Iaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providingIaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providingIaetsd Iaetsd
 
Iaetsd power capture safe test pattern determination
Iaetsd power capture safe test pattern determinationIaetsd power capture safe test pattern determination
Iaetsd power capture safe test pattern determinationIaetsd Iaetsd
 
Iaetsd early detection of breast cancer
Iaetsd early detection of breast cancerIaetsd early detection of breast cancer
Iaetsd early detection of breast cancerIaetsd Iaetsd
 
Iaetsd fpga implementation of rf technology and biometric authentication
Iaetsd fpga implementation of rf technology and biometric authenticationIaetsd fpga implementation of rf technology and biometric authentication
Iaetsd fpga implementation of rf technology and biometric authenticationIaetsd Iaetsd
 
Iaetsd protecting privacy preserving for cost effective adaptive actions
Iaetsd protecting  privacy preserving for cost effective adaptive actionsIaetsd protecting  privacy preserving for cost effective adaptive actions
Iaetsd protecting privacy preserving for cost effective adaptive actionsIaetsd Iaetsd
 
Iaetsd rtos based electronics industrial
Iaetsd rtos based electronics industrialIaetsd rtos based electronics industrial
Iaetsd rtos based electronics industrialIaetsd Iaetsd
 
Iaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion inIaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion inIaetsd Iaetsd
 
Iaetsd experimental study on properties of ternary blended fibre
Iaetsd experimental study on properties of ternary blended fibreIaetsd experimental study on properties of ternary blended fibre
Iaetsd experimental study on properties of ternary blended fibreIaetsd Iaetsd
 
Iaetsd a novel approach to assess the quality of tone mapped
Iaetsd a novel approach to assess the quality of tone mappedIaetsd a novel approach to assess the quality of tone mapped
Iaetsd a novel approach to assess the quality of tone mappedIaetsd Iaetsd
 
Iaetsd an efficient way of classifying and
Iaetsd an efficient way of classifying andIaetsd an efficient way of classifying and
Iaetsd an efficient way of classifying andIaetsd Iaetsd
 
Iaetsd design and analysis of a novel low actuated voltage
Iaetsd design and analysis of a novel low actuated voltageIaetsd design and analysis of a novel low actuated voltage
Iaetsd design and analysis of a novel low actuated voltageIaetsd Iaetsd
 
Iaetsd an mtcmos technique for optimizing low
Iaetsd an mtcmos technique for optimizing lowIaetsd an mtcmos technique for optimizing low
Iaetsd an mtcmos technique for optimizing lowIaetsd Iaetsd
 
Iaetsd innovative brick material
Iaetsd innovative brick materialIaetsd innovative brick material
Iaetsd innovative brick materialIaetsd Iaetsd
 

En vedette (20)

Iaetsd degraded document image enhancing in
Iaetsd degraded document image enhancing inIaetsd degraded document image enhancing in
Iaetsd degraded document image enhancing in
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEEC
 
Logiciel libre de simulation a événement discret
Logiciel libre de simulation a événement discret Logiciel libre de simulation a événement discret
Logiciel libre de simulation a événement discret
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systems
 
Iaetsd asynchronous data transactions on so c using fifo
Iaetsd asynchronous data transactions on so c using fifoIaetsd asynchronous data transactions on so c using fifo
Iaetsd asynchronous data transactions on so c using fifo
 
Iaetsd load area frequency control for multi area power
Iaetsd load area frequency control for multi area powerIaetsd load area frequency control for multi area power
Iaetsd load area frequency control for multi area power
 
Iaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providingIaetsd enhanced cryptography algorithm for providing
Iaetsd enhanced cryptography algorithm for providing
 
Iaetsd power capture safe test pattern determination
Iaetsd power capture safe test pattern determinationIaetsd power capture safe test pattern determination
Iaetsd power capture safe test pattern determination
 
Iaetsd early detection of breast cancer
Iaetsd early detection of breast cancerIaetsd early detection of breast cancer
Iaetsd early detection of breast cancer
 
Iaetsd fpga implementation of rf technology and biometric authentication
Iaetsd fpga implementation of rf technology and biometric authenticationIaetsd fpga implementation of rf technology and biometric authentication
Iaetsd fpga implementation of rf technology and biometric authentication
 
Iaetsd protecting privacy preserving for cost effective adaptive actions
Iaetsd protecting  privacy preserving for cost effective adaptive actionsIaetsd protecting  privacy preserving for cost effective adaptive actions
Iaetsd protecting privacy preserving for cost effective adaptive actions
 
Iaetsd rtos based electronics industrial
Iaetsd rtos based electronics industrialIaetsd rtos based electronics industrial
Iaetsd rtos based electronics industrial
 
Iaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion inIaetsd quick detection technique to reduce congestion in
Iaetsd quick detection technique to reduce congestion in
 
Iaetsd experimental study on properties of ternary blended fibre
Iaetsd experimental study on properties of ternary blended fibreIaetsd experimental study on properties of ternary blended fibre
Iaetsd experimental study on properties of ternary blended fibre
 
Iaetsd a novel approach to assess the quality of tone mapped
Iaetsd a novel approach to assess the quality of tone mappedIaetsd a novel approach to assess the quality of tone mapped
Iaetsd a novel approach to assess the quality of tone mapped
 
Iaetsd an efficient way of classifying and
Iaetsd an efficient way of classifying andIaetsd an efficient way of classifying and
Iaetsd an efficient way of classifying and
 
Iaetsd design and analysis of a novel low actuated voltage
Iaetsd design and analysis of a novel low actuated voltageIaetsd design and analysis of a novel low actuated voltage
Iaetsd design and analysis of a novel low actuated voltage
 
Iaetsd an mtcmos technique for optimizing low
Iaetsd an mtcmos technique for optimizing lowIaetsd an mtcmos technique for optimizing low
Iaetsd an mtcmos technique for optimizing low
 
Iaetsd innovative brick material
Iaetsd innovative brick materialIaetsd innovative brick material
Iaetsd innovative brick material
 

Similaire à Iaetsd survey on wireless sensor networks routing

Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Surveyijsrd.com
 
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...IJCNCJournal
 
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor NetworkSimulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Networkjosephjonse
 
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKSENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKScscpconf
 
Energy balanced improved leach routing protocol for wireless sensor networks
Energy balanced improved leach routing protocol for wireless sensor networksEnergy balanced improved leach routing protocol for wireless sensor networks
Energy balanced improved leach routing protocol for wireless sensor networkscsandit
 
Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyIAEME Publication
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...IJERD Editor
 
CLUSTER HEAD SELECTION ALGORITHMS FOR ENHANCED ENERGY EFFICIENCY IN WIRELESS ...
CLUSTER HEAD SELECTION ALGORITHMS FOR ENHANCED ENERGY EFFICIENCY IN WIRELESS ...CLUSTER HEAD SELECTION ALGORITHMS FOR ENHANCED ENERGY EFFICIENCY IN WIRELESS ...
CLUSTER HEAD SELECTION ALGORITHMS FOR ENHANCED ENERGY EFFICIENCY IN WIRELESS ...IJCSES Journal
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...ijsrd.com
 
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...IRJET Journal
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
 
An energy saving algorithm to prolong
An energy saving algorithm to prolongAn energy saving algorithm to prolong
An energy saving algorithm to prolongijwmn
 
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...ijsrd.com
 

Similaire à Iaetsd survey on wireless sensor networks routing (20)

Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
 
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Net...
 
B05630814
B05630814B05630814
B05630814
 
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor NetworkSimulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
 
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKSENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
ENERGY-BALANCED IMPROVED LEACH ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS
 
Energy balanced improved leach routing protocol for wireless sensor networks
Energy balanced improved leach routing protocol for wireless sensor networksEnergy balanced improved leach routing protocol for wireless sensor networks
Energy balanced improved leach routing protocol for wireless sensor networks
 
Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a survey
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
 
CLUSTER HEAD SELECTION ALGORITHMS FOR ENHANCED ENERGY EFFICIENCY IN WIRELESS ...
CLUSTER HEAD SELECTION ALGORITHMS FOR ENHANCED ENERGY EFFICIENCY IN WIRELESS ...CLUSTER HEAD SELECTION ALGORITHMS FOR ENHANCED ENERGY EFFICIENCY IN WIRELESS ...
CLUSTER HEAD SELECTION ALGORITHMS FOR ENHANCED ENERGY EFFICIENCY IN WIRELESS ...
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
 
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
An energy saving algorithm to prolong
An energy saving algorithm to prolongAn energy saving algorithm to prolong
An energy saving algorithm to prolong
 
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
Cluster Head Selection Techniques for Energy Efficient Wireless Sensor Networ...
 

Plus de Iaetsd Iaetsd

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissionIaetsd Iaetsd
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdlIaetsd Iaetsd
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmIaetsd Iaetsd
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...Iaetsd Iaetsd
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatIaetsd Iaetsd
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationIaetsd Iaetsd
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSIaetsd Iaetsd
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...Iaetsd Iaetsd
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bikeIaetsd Iaetsd
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technologyIaetsd Iaetsd
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...Iaetsd Iaetsd
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdIaetsd Iaetsd
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid GrowthIaetsd Iaetsd
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT AlgorithmIaetsd Iaetsd
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...Iaetsd Iaetsd
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...Iaetsd Iaetsd
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesIaetsd Iaetsd
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesIaetsd Iaetsd
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolicIaetsd Iaetsd
 

Plus de Iaetsd Iaetsd (20)

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdl
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarm
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seat
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan application
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bike
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technology
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic bird
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolic
 

Iaetsd survey on wireless sensor networks routing

  • 1. Survey on Wireless Sensor Networks Routing Protocols Based on Energy Efficiency Ms. S.NIVEDITHA1 , Ms.M.USHA2 1 M.E., Department of Computer Science and Engineering, Velammal Engineering College, Chennai. 2 Assistant Professor, Department of Computer Science and Engineering, Velammal Engineering College, Chennai. unique.nive@gmail.com, umahalingam@gmail.com Abstract-Energy consumption and balancing has always been a hot research topic in wireless sensor networks, in this survey, some of the hierarchical routing protocols(LEACH, HEED,PEGASIS, TBC, TREEPSI) with high energy efficient were examined based on some strategies such as data aggregation and clustering, routing and dynamic node allocation methods in the clustering environment. The routing protocols are compared with each other based on these strategies and based on the network life time definitions. Simulation results show which protocol has better prolonging lifetime than other traditional protocols by reducing the energy consumption and load balancing. Key words: Load balancing, Data aggregation, clustering routing protocol. I. INTRODUCTION Wireless sensor networks periodically collects the information of the interested unmanned monitoring area independently through deploying a large number of wireless sensor nodes and send the data to the remote base station.Wirelesssensornodesare deployedrandomlyand denselyina targetregion,especiallywherethephysicalenvironmentissohars hthatthesensor counterpartscannotbe deployed.Afterdeployment,thenetworkcannotworkproperlyun lessthereissufficientbatterypower. Wireless sensor nodes have so many important applications, including military application, disaster prediction and environment monitoring. The military application is performed in the rough environments where the sensor parts cannot deploy due to the energy consumption. Clusteringis very effectivetechnique.Itcan greatly contribute to overall system scalability, lifetime, and energy efficiencyinwirelesssensornetworks(WSNs).Grouping sensor nodes into cluster to satisfy the scalability and achieve high energy efficiency and prolong network lifetime in large scale WSN environment. The hierarchical routing protocol imply cluster based organization of the sensor node in order to perform data fusion and aggregation which leads to energy saving. In hierarchical network structure each cluster has a leader, which is called the cluster head (CH) which perform the data aggregation and data transmission to the base station by direct or intermediate communication with other CH nodes. Energyconsumption ofanodeisduetouseful, wastefuloperations.The usefuloperationsincludestransmittingorreceivingdatamessag es,andprocessingrequests.Thewastefulconsumption includesconstructingroutingtree,overhearing, retransmittingbecauseofharshenvironment, dealingwithredundantover- head messages,andidlelisteningto the media.Each node sends information directly to the base station to full fill the basic task of the sensor nodes. If the base station is located far away from the target area, the sensor nodes will die quickly due to much energy consumption. The distance is also very important factor and the direct transmission leads to the unbalanced energy consumption. Proceedings of International Conference on Developments in Engineering Research ISBN NO : 378 - 26 - 13840 - 9 www.iaetsd.in INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT 38
  • 2. In general WSN produce large amount of data so if data fusion could be used, the through put could be reduced. Data fusion reduces the redundant data by combining the redundant data to reduce the transmission by suppression, min, maxand average functions. Substantial energy can be saved through the data aggregation this technique has used to achieve energy efficiency and traffic optimization in a number of routing protocols. The data fusion or data aggregation assume that the length of message transmitted by each relay node should be constant. That is each transmits the same volume of data. The distance between the nodes to BS leads to two extreme cases 1. The length of message transmitted by the parent node not only depends on the own length also depends on the length of the message received from its child nodes. 2. The relay node should transmit the length of the message which is the sum of its own sensed data and the received data Network lifetime has two different definitions: [1] 1. The time from the start of the operation to death of the first node. 2. The time from the start of the operation to death of the last node Energy aware protocols and data gathering protocols offering high scalability. A common solution for the balancing energy consumption among all the network nodes, is to periodically re-elect new CH in each cluster. The remainder of the paper is presented as follow:Section IIdiscuss the literature survey. Finally, Section III concludes the paper. II. LITERATURE SURVEY A routingprotocol specifies the routers communicate with each other, and selects the routes between any two nodes on a computer network. Routing algorithms determine the specific choice of route. Each router has knowledge of networks attached to it directly. A routing protocol shares this information first among immediate neighbors, and then throughout the network. Routing strategy is generally based on the following criteria 1. Achieve minimum cost forwarding, while design of the most data forwarding protocol is based on the optimality. 2. Reducing the minimum number of performed operations 3. Scale to large network size with some constrains WSN is classified into three categories based on the structure: Flat, hierarchical, and location based routing. 2.1Hierarchical protocols: Hierarchical routing is a method of routing in networks that is based on hierarchical addressing. It imposes the structure on the network to achieve energy efficiency, stability and scalability. In hierarchical protocols nodes are organized in clusters inwhich a node has some responsible takes the role of cluster head which is responsible for coordinating and message transmitting activities. Clustering reduces the energy consumption to prolongs the life time, can balance the load and increase the scalability. 2.1.1. LEACH: [2][3] LEACHisthe most energy efficientclusteringalgorithm forWSNs that forms nodes in clusterbased environment. Based onthe receivedsignal strengthand uses these localclusterheadsasrouters tothe BS. Proceedings of International Conference on Developments in Engineering Research ISBN NO : 378 - 26 - 13840 - 9 www.iaetsd.in INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT 39
  • 3. Data transferto theBSconsumesmoreenergy,all thesensor nodeswithina clustertaketurns withthe transmission by rotatingthe cluster heads. This leadstobalancedenergyconsumption ofallnodes,and hence a longerlifetime ofthe network The basic operations of LEACH was performed in two phases:  Setup phase:  Cluster formation.  Cluster head was selected and informed to all other nodes.  Preparation of transmission schedule.  Steady phase:  Data fusion.  Transmission to destination node Inthe setup phase, each node n chooses a random number between 0 and 1. If the number is less than a threshold T (n), the node becomes a cluster head for the current round. The threshold is set as: T (n) = ___P______ if n belongs to G 1-P *(r mod1/P) Otherwise 0 P = percentage of cluster heads, r = current round G = set of nodes G is not cluster head in the last 1/P rounds. After the cluster heads are selected, the other nodes organize the local clusters by choosing the most appropriate cluster head (closest cluster head). In the steady-state phase the cluster heads receive data from the nodes, and transfer the fused data to the base station. And the communication is performed via the TDMA Advantages of LEACH:  It performs most of the communication inside the clusters, and provides scalability.  The data fusion leads to a limit on the traffic generated in the network.  Single-hop routing from node to cluster head, hence saving energy.  It increases network lifetime in three ways:  Distributing the role of CH to the other nodes.  Aggregating the data by the CHs.  TDMA, which, assigned by the CH to its members, puts most of the sensor in sleep mode, in event-based applications. Itincreases the network lifetime and achieve a more than 7-fold reduction in energy dissipation compared to direct communication  It is dynamic clustering and well-suited for applications where constant monitoring is needed and data collection occurs periodically to a centralized location.All thesensor nodeswithina clustertaketurns withthe transmission by rotatingthe cluster heads. This leadstobalancedenergy consumption ofallnodes,and hence a longerlifetime ofthe network. Disadvantages of LEACH:  Due to the selection of cluster heads. Because itdon’t consider the energy of the nodes for CH selection.  It significantly relies on cluster heads and face robustness issues.  Additional overheads due to cluster head changes leads to the energy inefficiency for dynamic clustering in large networks.  It has no inter cluster communication, and this needs high transmission power.  It selects the CH in random manner it results that the low power node can become a cluster head, it will deplete its energy quickly. And the local cluster head only by distance between themselves and it results the formation of minimum or maximum cluster. Proceedings of International Conference on Developments in Engineering Research ISBN NO : 378 - 26 - 13840 - 9 www.iaetsd.in INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT 40
  • 4.  Single hop method. 2.1.2. HEED: [4] HEED (Hybrid energy efficient distributed clustering) periodically selects cluster heads according based on the node residual energy and other parameter like proximity to node degree. HEED terminates in O (1) iterations, it incurs low message overhead and achieve uniform cluster head distribution across the network. HEED was designed to select different cluster heads in a field according to the amount of energy that is distributed in relation to a neighboring node The basic operations of HEED protocol was performed by the following steps:  Defining parameters used in the cluster formation.  Protocol operation. Cluster formation: Cluster head selection is based on the residual energy of each node. The parameters are measuring the residual energy and estimating the intracluster communication cost. The first parameter select initial set of cluster heads, the second parameter performing the cluster power level which increase initial reuse and reserve power for intercluster communication. Protocol operation: At each node, the clustering process requires a number of iterations, which was referred as Niter. Every step takes time tc to receive messages from any neighbor within the cluster range. An initial percentage was assigned to cluster heads among all n nodes, Cprob. Cprob is only used to limit the initial cluster head announcements, and has no direct impact on the final clusters. Before a node starts executing HEED, itsets its probability of becoming a cluster head, CHprob, as follows: CHprob = Cprob * Eresidual / Emax Eresidual = estimated current residual energy in the node. Emax = reference maximum energy which is typically identical for all nodes. The CHprob value of a node, however, is not allowed to fall below a certain threshold pmin. Every node then doubles its CHprob and moved to next step. In HEED energy consumption it extends the lifetime of all the nodes, which adds to the stability of the neighbor set. Nodes automatically update their neighbor sets by periodically sending and receiving heartbeat messages. If a node elected as a cluster head, it sends an announcement message cluster_head_msg(Node ID, selection status, cost), where the selection status is set to tentative_CH if CHprob<1, or final_CH, if it’s CHprob = 1. A node considers itself “covered” if it is heard from either a tentative_CH. If a node completes HEED execution without selecting a cluster head that it considers itself uncovered, and announces itself to be a cluster head. Advantages:  HEED distribution of energy extends the lifetime of the nodes within the network thus stabilizing the neighboring node.  Does not require special node capabilities, such as location-awareness  Does not make assumptions about node distribution  Operates correctly even when nodes are not synchronized.  The advantages of HEED are that nodes only require local (neighborhood) information to form the clusters  The algorithm guarantees that every sensors is part of just one cluster, and the cluster heads are well- distributed. Disadvantages: Proceedings of International Conference on Developments in Engineering Research ISBN NO : 378 - 26 - 13840 - 9 www.iaetsd.in INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT 41
  • 5.  The random selection of the cluster heads, may cause higher communication overhead for:  The ordinary member nodes in communicating with their corresponding cluster head  Cluster heads in establishing the communication among them, orBetween a cluster head and a base station  The periodic cluster head rotation or election needs extra energy to rebuild clusters In HEED Multi level hierarchy cannot be achieved. Recursive applications cannot be applied. 2.1.3. PEGASIS: [5] PEGASIS (Power-Efficient Gathering in Sensor Information Systems), is an optimal. In PEGASIS, each nodes communicates only with the close neighbor and transmits the information to the base station, it reduces the amount of energy spent per round. It distributes the energy load evenly among the sensor nodes in the network. The sensor nodes are randomly placed in the play field. The nodes are organized to form a chain, which was accomplished by the sensor nodes using a greedy algorithm starting from some node. On the other hand the BS can compute this chain and broadcast it to all the sensor nodes. Construction of the chain starts with the farthest node from the BS. The nodes farther from the BS have close neighbors, as in the greedy algorithm the neighbor distances will increase gradually. When a node dies, the chain will be reconstructed and the threshold can be changed to determine to elect leaders. In it (i mod N) th node is chosen to be a leader. Data gathering in each round each node receives data from neighbor, fuses with its own data, and transmits to the other node in chain.The leader was selected in each round of communication in a random manner and random position on the chain, because of the death of nodes at random locations. Token passing approach initiated by the leader to start the data transmission from the ends of the chain. It performs data fusion at every node except the end nodes in the chain. Each node will fuse its neighbor’s data with its own to generate a single packet of the same length and then transmit that to its other neighbor (if it has two neighbors). Advantages of PEGASIS are 1. Local gathering distance is less than LEACH 2. The amount of data for the leader to receive 3. Limiting the number of transmissions and receives among all nodes. 4. It eliminates the overhead of dynamic cluster formation, minimizing the distance non leader-nodes must transmit. Disadvantages: Whenevera node dies the whole chain has to be reconstructed and the scalability is also an important issue in PEGASIS. 2.1.4. Tree Based Clustering: [6] Tree-Based Clustering (TBC) is also have cluster based environment and each cluster has a cluster-head (CH). Tree configuration:The cluster construct a routing tree Proceedings of International Conference on Developments in Engineering Research ISBN NO : 378 - 26 - 13840 - 9 www.iaetsd.in INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT 42
  • 6. where the cluster-head acts as a root. All sensor in a routing tree sends data to a single collection point know as root. All the nodes arelocation-aware. The distance between the node and the root is for determining its level in the cluster. The nearest node is elected asitsparentnode. Data transmission: Data transmission performed simultaneously. Data is gathered and each node fuses the received data and transmits it to its parent. InTBC each node holds the information of its neighbors. Fast data collection is main advantage in TBC 2.1.4.1. TREEPSI:[7] In TREEPSI sensor nodes are deployed randomly node i (ith node) is placed at a random location. Compute the path by BS and broadcast the path information to other nodes. After the construction of the tree it collects information from the field. TREEPSI is a tree based multi-hop routing protocol to construct a hierarchical path of the nodes. In this nodes will fuse the received data with their own data and forward the resultant data to their parent. It will repeat this process till all the data are received by the root node. The data are collected at the root and at last root takes responsibility to transmit the datatotheBS.Afterthedeathofnode, anewtreepathisconstructed. Sothe overhead per communication round is less as compared to the energy spent in the data collection phase. Two schemes: 1. After root initiate data gathering process by sending a small control packet to the children nodes using standard tree traversal algorithm.it will consume some negligible amount of energy but with little more delay. 2. All the leaf nodes send sensed information to their parent. The parent nodes fuse the received data with their own data and forward the resultant data to their parent until data are received by the root node. It has less delay, but needs to introduce some multiplexing scheme to avoid collision. This path is used for several rounds until node i dies. After the death of node i, a new tree path is constructed with node i+1 as the root. The simulation results shows that TREEPSI outperforms all the existing protocols in terms of energy efficiency. 2.1.5. GSTEB: [1] In GSTEB (General self-organized tree based energy balancing routing protocol) the basic tree construction and communication operation is similar to the TCB. In each round BS assigns a root node and broadcasts its ID and its coordinates to all sensor nodes. And data aggregation takes place.GSTEB changes the root and reconstruct the routing tree with short delay and low energy consumption by this betterbalancedloadis achieved. The operation of GSTEB is divided into Initial Phase 1. Tree ConstructingPhase 2. Self-OrganizedDataCollecting 3. Transmitting Phase 4. Information Exchanging Phase. EL(i)=[residual energy(i)/constant reflect the minimum energy unit] GSTEBoutperformsLEACH, PE- GASIS, TREEPSI [9]andTBC.Because GSTEBisaself- organizedprotocol,itonlyconsumesasmallamountof energy ineach round tochangethetopographyforthepurposeofbalancingt heenergyconsumption.Alltheleafnodescantransmit datainthesameTDMAtimeslotsothatthetransmitting delay isshort.Whenlifetimeisdefinedasthetimefromthestar tofthe networkoperationto thedeath of thefirstnode in the network. Advantages of GSTEB:  Load balancing  Self-organizing  More efficient than other routing protocols. Proceedings of International Conference on Developments in Engineering Research ISBN NO : 378 - 26 - 13840 - 9 www.iaetsd.in INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT 43
  • 7.  GSTEB prolongs the life time by balancing the load. III. Conclusions: In this survey paper, routing protocols are compared based on the network life time and data aggregation and the load balancing criteria. Then the new GSTEB protocol’s simulations show that GSTEB outperforms LEACH, PEGASIS, TREEPSI and TBC. Because GSTEB is a self- organized protocol, it only consumes a small energy and it balancing the energy consumption and it have short transmission. GSTEB prolongs the lifetime by 100% to 300% compared with PEGASIS [1]. GSTEBprolongsthelifetimeofthenetworkbymorethan100% compared with HEED. TABLE 1: NETWORK LIFE TIME PROTOCOL ROUND TAKEN TO A NODE DIE ROUND TAKEN TO ALL NODES DEAD LEACH 118 248 PEGASIS 246 568 TREEPSI 267 611 TBC 328 629 GSTEB 389 677 REFERENCES: [1] Zhao Han, Jie Wu, Liefeng Liu, Jie Zhang and kaiyunTian “A General self-organized tree based energy balance routing protocol for wireless sensor networks”., vol.61 , 0018-9499, 2014 [2] Ankit Solanki,prof.niten b. patel “LEACH-SCH: An innovative routing protocol for wireless sensor network” 4th icccnt-2013 [3] “An Integrative Comparison of Energy Efficient Routing Protocols in Wireless Sensor Network” ,Ali Norouzi1, Abdul Halim Zaim2 1Department of Computer Engineering, Istanbul University (Avcilar), Istanbul, Turkey 2Department of Computer Engineering, Istanbul Commerce University (Eminonu), Istanbul, Turkey Email: norouzi@cscrs.itu.edu.tr, azaim@iticu.edu.tr Received December 8, 2011; revised January 11, 2012; accepted January 30, 2012 [4] “HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks”, OssamaYounis, Student Member, IEEE, and Sonia Fahmy, Member, IEEE, IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 3, NO. 4, OCTOBER-DECEMBER 2004 [5] “PEGASIS: Power efficient gathering in sensor information system” Stephanie Lindsey and Cauligi S. Raghavendra,”IEEE AC paper #242 , updated Sept. 29,2001. 0-7803-7231- 2002 IEEE. [6]O.durmazincel, a.ghosh,b.krishnamachari and k.chintalapudi “Fast data collection in tree based wireless sensor networks” ieeecs,comsoc. [7] “TREEPSI: TRee based Energy Efficient Protocol for Sensor Information”SiddharthaSankarSatapathy, NityanandaSarmaTezpur University, Napaam-784028, 2006 IEEE Proceedings of International Conference on Developments in Engineering Research ISBN NO : 378 - 26 - 13840 - 9 www.iaetsd.in INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT 44