SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 616
ANALYSIS OF DIFFERENT HIERARCHICAL ROUTING PROTOCOLS
OF WIRELESS SENSOR NETWORK
Dipti Balkrushna Ram1
, Grishma Shaileshkumar Shah2
1,2
Master of engineering, Electronics and Communication, SAL Institute of technology and engineering research,
Gujarat, India
, Abstarct
Wireless sensored network is nowadays very popular in the field of research because world is now switching faster from wired
communication to the wireless communication. It is used in environment monitoring, habitat monitoring, battlefield etc. WSN is
made up of tiny sensor nodes which senses the data and communicate to the base station via other nodes.WSN networks are data-
centric rather than node centric. So, main issues in WSN networks are energy consumption of network, lifetime of a network,
delay, latency, quality of service etc.WSN has defined many routing protocols for the network. The main challenge in WSN is to
design a routing protocol which gives the maximum energy efficient routing because nodes in sensored network are equipped with
the battery. So, as time passes the battery of nodes will decrease so in turn network lifetime will decreases. There are many
routing protocols which are classified as their working and their application to different conditions. This paper describes a brief
information about routing protocols. The main focus of this paper is to give the comparison of different hierarchical routing
protocols.
Keywords: Leach, Pegasis,Teen/Apteen, WSN
-------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
Designing of a wireless sensored network having increased
energy efficiency is the hot research area nowadays. In
recent years sensored network has reach the most of fields
like medical monitoring, environment monitoring, habitat
monitoring, home security system etc. The future is not for
any when the wireless sensor network will be spreaded over
the large area of the world. Because it is an emerging
technology, at present there are lots of things in WSN which
needs the attention by the researchers. There are many
models which have been introduced and applied to wireless
sensored network for better energy efficiency, network
lifetime, delay, latency, etc. WSN have data centric
architecture compared to ad-hoc network which consist of
node centric architecture. In WSN there is no IP address
scheme for each node because it has densely deployed
sensor nodes in its large area. Due to these unique features
of WSN protocol design is very important parameter in
WSN. By designing proper routing protocol one can utilize
the limited resources of the network.
There are many types of routing protocols in wireless sensor
network, which are classified as follows:
1. Flooding and gossiping
Flooding and gossiping is the basic routing protocols of
WSN. In flooding each node broadcast the receiving packets
to all its neighbour and this process is continued until the
packets has been reached to its destination.
2. Directed diffusionIt uses the attribute value pairs of the
data and queries the sensors in an on demand basis. It
diffuses data through sensor nodes by using a scheme of
naming to the data.
3. Rumour routing
It is similar to the directed diffusion but it is mostly
applicable where geographic routing conditions are not
preferred.
4. Gradient based routing
It is also a changed version of directed diffusion.
In GBR the number of hopes when node is diffused in the
network is recorded. So, each node will discover the
minimum number of hops to the sink which is known as the
height of that node.
“The difference between node’s height and that of its
neighbour is called gradient on that link.”[2]
And the packet is forwarded on a link which has largest
gradient.
5. Energy aware routing
Energy aware routing is based on the stochastic model.
In this scheme the set of sub optimal path is used to increase
the lifetime of a network.
It says that using minimum energy path every time will
dissipate the energy of nodes on that path. Instead, we can
use multiple paths with some probability which in turn
increase the lifetime of the network.
6. Hierarchical protocols
Network scalability is the major issue in designing a
wireless sensor network.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 617
As the network area and nodes density increases there may
be overload in single tire network. This overload causes
latency and unnecessary tracking of events. Other thing is
that single tire network is not scalable for a large set of
sensors in large area and there is a problem of service
degradation. To overcome all these problems the
hierarchical routing approach is used in some of the
protocols of WSN. It maintains the energy consumption of
the nodes using multi hop communication forming a cluster
of nodes. LEACH (lower energy adaptive clustering
hierarchy) is the first routing protocol invented for the
hierarchical routing.
This routing protocol has inspired many other hierarchical
routing protocols like PEGASIS, TEEN, APTEEN, etc. In
the next section we will explore the different hierarchical
routing protocols.
2. HIERARCHICAL ROUTING PROTOCOLS
2.1 Leach
LEACH is the first hierarchical routing protocol used for
wireless sensored network. LEACH uses adaptive clustering
scheme for the communication between nodes. It uses
TDMA scheme for the timeline operation LEACH can
prolong the network lifetime with a proportion of 15%.
LEACH forms the clusters head. The nodes which want to
communicate with other nodes will not directly
communicate but it will be communicated via cluster heads.
In each TDMA frame in each round the cluster head nodes
will be changed. The selection of cluster heads will be done
by the following equation:
𝑇 𝑛 =
p
1 − p. rmod
1
p
, n ∈ G
Where P= percentage of cluster heads
R=the current round
G= set of nodes that haven’t been cluster heads in the last
1/P rounds.
Here, T(n) is the threshold value of the selection of cluster
heads in each round. Cluster heads are produced according
to this equation the sensor node generate a random number
between 0 and 1, if the number is smaller than the threshold
T(n), then the node is selected as cluster head
Fig-1: Flow chart for CH selection
As shown in figure the node will become cluster head when
its energy is higher than the energy of other nodes. The CH
node will send the joining request message to all common
nodes in its cluster. The common nodes will decide to join
or not the CH. After getting acknowledgement from
common nodes CH will assign TDMA scheme to all nodes.
In this way the LEACH protocol will work using clustering
scheme. Some features of LEACH protocol is as follows.
1. LEACH protocol randomly selects cluster heads in each
round. So, to become CH using quickly some nodes will
dissipate energy very fast to be selected as a cluster head
more times.
2. In LEACH cluster heads directly communicate with sink.
So, the energy consumption between CH and sink in greater
than the energy consumption of communication between
CH’s.
3. LEACH has great improvement in energy consumption
great improvement in energy consumption of direct
communication because it uses clustering hierarchy and also
it is not a single tire communication as direct diffusion
scheme or gossiping and flooding scheme.
4. Though LEACH has improved the energy consumption,
further improvement is needed as the unbalanced energy
load and large unnecessary energy dissipation. It is caused
by the randomicity in electing cluster-head nodes.
5. There is an extra energy dissipation, because in each
round nodes acting as CH will consume a lot of energy to
transmit data to far distance base station.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 618
Fig-2: architecture of LEACH protocol
2.2 Pegasis
The improvement of LEACH protocol is PEGASIS (power
efficient gathering in sensor information system). It makes
the chain of nodes instead of making clusters of it. The
farther node will transmit the data via its neighbour node
and in this way chain is created. The last node in the chain is
called the leader node which will transmit all the data to sink
(base station).
LEADER NODE
a0 a1 a2 a3 a4 a5 a6
BASE STATION
Fig-3: PEGASIS protocol
As shown in figure the nodes a0 to a6 are the chain partners
for data transmission. Here a3 is the leader node which will
transfer all the data to base station (sink).
Features of PEGASIS
1. PEGASIS uses multihop routing by forming chains and
use only one node to transmit to the Base station.
2. Compare to LEACH protocol PRGASIS has been shown
performance of about 100-300% for different network
topologies of WSN.
3. Compare to LEACH protocol the lifetime of a PEGASIS
is long.
4. In PEGASIS there is only one node which does the data
aggregation and data fusion. So, compared to LEACH where
each cluster head is taking part in communication with base
station. So, in turn the energy will also be dissipated by each
cluster head, PEGASIS will dissipate less energy because
only leader node in chain will actively take part in data
aggregation and data fusion.
5. In PEGASIS each node should be aware of the remaining
energy status of its neighbours.
6. Compare to LEACH, PEGASIS removes the energy
dissipated by the reformation of cluster in each round.
7. In PEGASIS, if node death occurs, the chain must be
rebuilt which increases the energy consumption.
8. Node far away from the leader node will forward the data
many times by the chain which causes the long time delay.
So, there is a problem of time delay in PEGASIS protocol
which should be improved.
2.3 TEEN and APTEEN (Threshold sensitive
energy efficient sensor network)
These protocols are bit different from LEACH and
PEGASIS protocols because it uses the sensored attributes
such as temporary for communication. These protocols are
very useful in time critical applications, where wireless
network is reactive. In LEACH and PEGASIS the network
is proactive where there is no event driven things occur
where as in reactive network the things which are event
driven which are sensitive to nodes sensitivity like
temperature, weather or any other environmental conditions.
TEEN uses hierarchical network architecture with data
centric mechanism. The figure shows the mechanism of
cluster forming in TEEN and APTEEN. As shown in figure
clusters are formed and this process of formation of cluster
is continued to the second level till the base station (sink) is
reached. There are two types of thresholds: hard and soft.
After formation of cluster head’s the cluster head will
broadcast the threshold to the common nodes in its clusters.
The first threshold sent to all nodes by cluster head is hard
threshold which is the minimum value of sensory attributes
to trigger node for switching on its transmitter. So,
transmission occurs only when the node’s sensed attribute in
turn lower the number of transmissions. Once, the node had
sensed a value beyond hard threshold, it only transmits a
data when value of sensed attribute changes by an amount
equal or greater than the soft threshold. So, soft threshold
will also decreases the number of transmissions.
Fig-4:TEEN/APTEEN protocol architecture
APTEENC Adaptive threshold sensitive energy efficient
sensor network protocol is extension of TEEN.
Features of TEEN and APTEEN
1. TEEN is not applicable where periodic reports are needed
because it is based on thresholds.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 619
2. The APTEEN gives the facilities which TEEN does not
gives as follows:
 Analysing past data values
 Taking snapshot view of the network.
 To monitor an event for a period of time.
3. In APTEEN cluster head’s broadcast the attributes the
threshold values and schedule of transmission of all nodes.
4. TEEN and APTEEN gives better performance than
LEACH. Energy dissipation of APTEEN is in between of
LEACH and TEEN.
5. Compared to LEACH, TEEN/APTEEN has overhead and
complexity of cluster formation and problem of giving
threshold based functions.
3. CONCLUSION AND FUTURE SCOPE
From the analysis of the different routing protocols we have
shown that there is further need of improvement in LEACH
protocol as compared to PEGASIS and TEEN/APTEEN
protocols. The table shown below gives the comparison of
these four protocols.
Table-1: Protols and their Parameters
LEACH PEGASI
S
TEEN/APTEE
N
DATA
DELIVERY
MODEL
CLUSTE
R HEAD
CHAIN
BASED
ACTIVE
THRESHOLD
DATA
AGGREGATIO
N
YES NO YES
POWER
USAGE
HIGH MAX HIGH
SCALABILITY GOOD GOOD GOOD
QUALITY OF
SERVICE
NO NO GOOD
NETWORK
LIFETIME
GOOD VERY
GOOD
VERY GOOD
RESOURCE
AWARENESS
YES YES YES
From chart-1 shown below we can see that when first node
dies the energy dissipation of LEACH is very much poor, so
in terms of energy dissipation and network lifetime there is a
lot more to do research work. Also researchers can futher
make improvements in PEGASIA in terms of time delay.
There are many open issues in WSN for improving the
routing algorithms of LEACH, PEGASIS, TEEN/APTEEN.
Chart-1:Dead nodes VS Lifetime of nodes
REFERENCES
[1] Kemal Akkaya, Mohamed Younis, “A survey on routing
protocols for wireless sensor networks”, 26 November 2003.
[2] Tintu Devasia, Gopika S, “Statistical Analysis of Energy
Efficient Hierarchical Routing Protocols in WSN”,
International Journal of Advanced Research in Computer
and Communication Engineering, Vol. 2, Issue 5, May
2013.
[3] Fan Xiangning, Song Yulin, “Improvement on LEACH
Protocol of Wireless Sensor Network”, 2007 International
Conference on Sensor Technologies and Applications,
IEEE.
[4] Mu Tong, Minghao Tang, “LEACH-B:An Improved
LEACH Protocol for Wireless Sensor Network”, 978-1-
4244-3709, 2010 IEEE.
[5]Jindal V, Verma AK And Bawa S, “How The Two
Adhoc Networks Can Be Different: Manet & WSNs”,
International Journal Of Computer Science & Technology,
2011, 2(4), 122-126.
[6]Wang J, yang G and Chen S,“Secure Leach Routing
Protocol Based On Low-Power Cluster-Head Selection
Algorithm For Wireless Sensor Networks”, International
Symposium On Intelligent Signal Processing And
Communication Systems, 2007, 341-344.
[7]Liu Y, Gao J, Jia Y and Zhu L, “A Cluster Maintenance
Algorithm Based on LEACH-DCHS Protoclol”,
International Conference on Networking, Architecture, and
Storage, 2008, 165-166.
[8]Junping h, Yuhui J and Liang D, “A Time-based Cluster-
Head Selection Algorithm for LEACH”, In Computer and
Communication, 2008.
[9]Zhixiang D and Bensheng Q, “Three-layered routing
protocol for WSN based on LEACH algorithm”, IEEE
Xplore, 2007, 72-75.
[10]Tong M and tang M, “LEACH-B: An Improved
LEACH Protocol for Wireless Sensor Network”, 6th
International Conference on Wireless Communications
Networking and Mobile Computing, 2010.
[11]Heinzelman WB, Chandraskan PA and Blakrisshnan H,
"An Application-Specific Protocol Architecture for Wireless
0%
20%
40%
60%
80%
100%
FND HNA LND
200 450 500
350 700
900
500 800
1200
500 1200 2100
TIME
APTEEN
TEEN
PEGASIS
LEACH
PARAMETER
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 620
Microsensor Networks", IEEE Trans. on Wireless
Communication, 2002, 1(4), 660-670.
[12]Zhi-Jun L and La-Yuan L, “Based on Energy Balance
LEACH-DC Protocol Design”, 6th
IEEE Joint International
Conference on Information Technology and Artificial
Intelligence Conference (ITAIC), 2011.
[13]Kumar N And Kaur J, “Improved LEACH Protocol for
Wireless Sensor Networks”, 7th
International Conference
on Wireless Communications, Networking and Mobile
omputing (WiCOM), 2011.
[14]Tang L and Liu S, “Improvement on LEACH Routing
Algorithm for Wireless Sensor Networks”, International
Conference on Internet Computing and Information
Services, 2011.
[15] Sunita Rani, Tarun Gulati, “ An improved PEGASIS
protocol to enhance energy utilization in wireless sensor
network”, International Journal of Advanced Research in
computer science and software engineering, volume:2, Issue
11. November,2012.

Contenu connexe

Tendances

Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyAli Habeeb
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECYogesh Fulara
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...ijsrd.com
 
clustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHclustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHJimit Rupani
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
 
Performance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksPerformance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksDarpan Dekivadiya
 
Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network dilip pareek
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Routing in Wireless Sensor Network
Routing in Wireless Sensor NetworkRouting in Wireless Sensor Network
Routing in Wireless Sensor NetworkAarthi Raghavendra
 
Qos aware routing protocol for wsn
Qos aware routing protocol for wsnQos aware routing protocol for wsn
Qos aware routing protocol for wsnKamal Patel
 
Leach-Protocol
Leach-ProtocolLeach-Protocol
Leach-Protocolzhendong
 
Review on State-Of-The-Art of PEGASIS Protocol in WSNS
Review on State-Of-The-Art of PEGASIS Protocol in WSNSReview on State-Of-The-Art of PEGASIS Protocol in WSNS
Review on State-Of-The-Art of PEGASIS Protocol in WSNSrahulmonikasharma
 
Energy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolEnergy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolARUNP116
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingHabibur Rahman
 
Energy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksEnergy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksSpandan Spandy
 
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH ProtocolUniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH Protocolidescitation
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 

Tendances (20)

wsn routing protocol
 wsn routing protocol wsn routing protocol
wsn routing protocol
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEEC
 
Leach
LeachLeach
Leach
 
Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1Leach wireless sensor ntwrk aa1
Leach wireless sensor ntwrk aa1
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
 
clustering protocol in WSN:LEACH
clustering protocol in WSN:LEACHclustering protocol in WSN:LEACH
clustering protocol in WSN:LEACH
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
Performance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksPerformance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor Networks
 
Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network Routing protocolsin Wireless sensor network
Routing protocolsin Wireless sensor network
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Routing in Wireless Sensor Network
Routing in Wireless Sensor NetworkRouting in Wireless Sensor Network
Routing in Wireless Sensor Network
 
Qos aware routing protocol for wsn
Qos aware routing protocol for wsnQos aware routing protocol for wsn
Qos aware routing protocol for wsn
 
Leach-Protocol
Leach-ProtocolLeach-Protocol
Leach-Protocol
 
Review on State-Of-The-Art of PEGASIS Protocol in WSNS
Review on State-Of-The-Art of PEGASIS Protocol in WSNSReview on State-Of-The-Art of PEGASIS Protocol in WSNS
Review on State-Of-The-Art of PEGASIS Protocol in WSNS
 
Energy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocolEnergy efficient cluster head selection in LEACH protocol
Energy efficient cluster head selection in LEACH protocol
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
 
Energy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networksEnergy efficient routing in wireless sensor networks
Energy efficient routing in wireless sensor networks
 
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH ProtocolUniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 

En vedette

Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...divya_prabha
 
Behaviour of randomly distributed fiber reinforced
Behaviour of randomly distributed fiber reinforcedBehaviour of randomly distributed fiber reinforced
Behaviour of randomly distributed fiber reinforcedeSAT Publishing House
 
Framework for web personalization using web mining
Framework for web personalization using web miningFramework for web personalization using web mining
Framework for web personalization using web miningeSAT Publishing House
 
A semi circle theorem in magneto-rotatory
A semi circle theorem in magneto-rotatoryA semi circle theorem in magneto-rotatory
A semi circle theorem in magneto-rotatoryeSAT Publishing House
 
Subject distribution using data mining
Subject distribution using data miningSubject distribution using data mining
Subject distribution using data miningeSAT Publishing House
 
Effect of inclined hump on the turbulence intensities
Effect of inclined hump on the turbulence intensitiesEffect of inclined hump on the turbulence intensities
Effect of inclined hump on the turbulence intensitieseSAT Publishing House
 
Cmos active pixel design using 0.6 μm image sensor
Cmos active pixel design using 0.6 μm image sensorCmos active pixel design using 0.6 μm image sensor
Cmos active pixel design using 0.6 μm image sensoreSAT Publishing House
 
A survey on congestion control mechanisms
A survey on congestion control mechanismsA survey on congestion control mechanisms
A survey on congestion control mechanismseSAT Publishing House
 
Microwave assisted eco friendly synthesis of 2 hpyrido
Microwave assisted eco friendly synthesis of 2 hpyridoMicrowave assisted eco friendly synthesis of 2 hpyrido
Microwave assisted eco friendly synthesis of 2 hpyridoeSAT Publishing House
 
A new conceptual algorithm for adaptive route
A new conceptual algorithm for adaptive routeA new conceptual algorithm for adaptive route
A new conceptual algorithm for adaptive routeeSAT Publishing House
 
Combined Defence Services Examination (II) - 2014Performance analysis of swcn...
Combined Defence Services Examination (II) - 2014Performance analysis of swcn...Combined Defence Services Examination (II) - 2014Performance analysis of swcn...
Combined Defence Services Examination (II) - 2014Performance analysis of swcn...eSAT Publishing House
 
Real time reservoir operation (calibration phase) a case study
Real time reservoir operation (calibration phase) a case studyReal time reservoir operation (calibration phase) a case study
Real time reservoir operation (calibration phase) a case studyeSAT Publishing House
 
Study of permeation of gases through ceramic supported polymeric and zeolite ...
Study of permeation of gases through ceramic supported polymeric and zeolite ...Study of permeation of gases through ceramic supported polymeric and zeolite ...
Study of permeation of gases through ceramic supported polymeric and zeolite ...eSAT Publishing House
 
Theoretical flexural behavior of sandwich panel using
Theoretical flexural behavior of sandwich panel usingTheoretical flexural behavior of sandwich panel using
Theoretical flexural behavior of sandwich panel usingeSAT Publishing House
 
Design of air conditioning and ventilation system for a
Design of air conditioning and ventilation system for aDesign of air conditioning and ventilation system for a
Design of air conditioning and ventilation system for aeSAT Publishing House
 
Pca based support vector machine technique for volatility forecasting
Pca based support vector machine technique for volatility forecastingPca based support vector machine technique for volatility forecasting
Pca based support vector machine technique for volatility forecastingeSAT Publishing House
 
Dynamic selection of cluster head in in networks for energy management
Dynamic selection of cluster head in in networks for energy managementDynamic selection of cluster head in in networks for energy management
Dynamic selection of cluster head in in networks for energy managementeSAT Publishing House
 
Performance evaluation of lhr engine using palm
Performance evaluation of lhr engine using palmPerformance evaluation of lhr engine using palm
Performance evaluation of lhr engine using palmeSAT Publishing House
 
Survey of analysis and performance of ofdm signals in time and frequency disp...
Survey of analysis and performance of ofdm signals in time and frequency disp...Survey of analysis and performance of ofdm signals in time and frequency disp...
Survey of analysis and performance of ofdm signals in time and frequency disp...eSAT Publishing House
 
Authentication framework using visual cryptography
Authentication framework using visual cryptographyAuthentication framework using visual cryptography
Authentication framework using visual cryptographyeSAT Publishing House
 

En vedette (20)

Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
Project report on An Energy Efficient Routing Protocol in Wireless Sensor Net...
 
Behaviour of randomly distributed fiber reinforced
Behaviour of randomly distributed fiber reinforcedBehaviour of randomly distributed fiber reinforced
Behaviour of randomly distributed fiber reinforced
 
Framework for web personalization using web mining
Framework for web personalization using web miningFramework for web personalization using web mining
Framework for web personalization using web mining
 
A semi circle theorem in magneto-rotatory
A semi circle theorem in magneto-rotatoryA semi circle theorem in magneto-rotatory
A semi circle theorem in magneto-rotatory
 
Subject distribution using data mining
Subject distribution using data miningSubject distribution using data mining
Subject distribution using data mining
 
Effect of inclined hump on the turbulence intensities
Effect of inclined hump on the turbulence intensitiesEffect of inclined hump on the turbulence intensities
Effect of inclined hump on the turbulence intensities
 
Cmos active pixel design using 0.6 μm image sensor
Cmos active pixel design using 0.6 μm image sensorCmos active pixel design using 0.6 μm image sensor
Cmos active pixel design using 0.6 μm image sensor
 
A survey on congestion control mechanisms
A survey on congestion control mechanismsA survey on congestion control mechanisms
A survey on congestion control mechanisms
 
Microwave assisted eco friendly synthesis of 2 hpyrido
Microwave assisted eco friendly synthesis of 2 hpyridoMicrowave assisted eco friendly synthesis of 2 hpyrido
Microwave assisted eco friendly synthesis of 2 hpyrido
 
A new conceptual algorithm for adaptive route
A new conceptual algorithm for adaptive routeA new conceptual algorithm for adaptive route
A new conceptual algorithm for adaptive route
 
Combined Defence Services Examination (II) - 2014Performance analysis of swcn...
Combined Defence Services Examination (II) - 2014Performance analysis of swcn...Combined Defence Services Examination (II) - 2014Performance analysis of swcn...
Combined Defence Services Examination (II) - 2014Performance analysis of swcn...
 
Real time reservoir operation (calibration phase) a case study
Real time reservoir operation (calibration phase) a case studyReal time reservoir operation (calibration phase) a case study
Real time reservoir operation (calibration phase) a case study
 
Study of permeation of gases through ceramic supported polymeric and zeolite ...
Study of permeation of gases through ceramic supported polymeric and zeolite ...Study of permeation of gases through ceramic supported polymeric and zeolite ...
Study of permeation of gases through ceramic supported polymeric and zeolite ...
 
Theoretical flexural behavior of sandwich panel using
Theoretical flexural behavior of sandwich panel usingTheoretical flexural behavior of sandwich panel using
Theoretical flexural behavior of sandwich panel using
 
Design of air conditioning and ventilation system for a
Design of air conditioning and ventilation system for aDesign of air conditioning and ventilation system for a
Design of air conditioning and ventilation system for a
 
Pca based support vector machine technique for volatility forecasting
Pca based support vector machine technique for volatility forecastingPca based support vector machine technique for volatility forecasting
Pca based support vector machine technique for volatility forecasting
 
Dynamic selection of cluster head in in networks for energy management
Dynamic selection of cluster head in in networks for energy managementDynamic selection of cluster head in in networks for energy management
Dynamic selection of cluster head in in networks for energy management
 
Performance evaluation of lhr engine using palm
Performance evaluation of lhr engine using palmPerformance evaluation of lhr engine using palm
Performance evaluation of lhr engine using palm
 
Survey of analysis and performance of ofdm signals in time and frequency disp...
Survey of analysis and performance of ofdm signals in time and frequency disp...Survey of analysis and performance of ofdm signals in time and frequency disp...
Survey of analysis and performance of ofdm signals in time and frequency disp...
 
Authentication framework using visual cryptography
Authentication framework using visual cryptographyAuthentication framework using visual cryptography
Authentication framework using visual cryptography
 

Similaire à Analysis of different hierarchical routing protocols of wireless sensor network

IRJET- Clustering Protocols in Wireless Sensor Network: A Review
IRJET-  	  Clustering Protocols in Wireless Sensor Network: A ReviewIRJET-  	  Clustering Protocols in Wireless Sensor Network: A Review
IRJET- Clustering Protocols in Wireless Sensor Network: A ReviewIRJET Journal
 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolIJTET Journal
 
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...IJSRED
 
An energy saving algorithm to prolong
An energy saving algorithm to prolongAn energy saving algorithm to prolong
An energy saving algorithm to prolongijwmn
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Editor IJCATR
 
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKSIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKijngnjournal
 
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor NetworkSimulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Networkjosephjonse
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
 
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...IRJET Journal
 
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor NetworksEnergy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor NetworksIRJET Journal
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...ijwmn
 
Cluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor NetworksCluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor Networkseditor1knowledgecuddle
 
Review of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor NetworkReview of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor Networkijsrd.com
 
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...IJCNCJournal
 
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...IJERD Editor
 

Similaire à Analysis of different hierarchical routing protocols of wireless sensor network (20)

F04623943
F04623943F04623943
F04623943
 
IRJET- Clustering Protocols in Wireless Sensor Network: A Review
IRJET-  	  Clustering Protocols in Wireless Sensor Network: A ReviewIRJET-  	  Clustering Protocols in Wireless Sensor Network: A Review
IRJET- Clustering Protocols in Wireless Sensor Network: A Review
 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
 
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
 
An energy saving algorithm to prolong
An energy saving algorithm to prolongAn energy saving algorithm to prolong
An energy saving algorithm to prolong
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
 
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKSIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
 
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor NetworkSimulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
 
B045070510
B045070510B045070510
B045070510
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
 
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor NetworksEnergy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
CUTTING DOWN ENERGY USAGE IN WIRELESS SENSOR NETWORKS USING DUTY CYCLE TECHNI...
 
Cluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor NetworksCluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor Networks
 
Review of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor NetworkReview of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor Network
 
A04560105
A04560105A04560105
A04560105
 
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
ENERGY SAVINGS IN APPLICATIONS FOR WIRELESS SENSOR NETWORKS TIME CRITICAL REQ...
 
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
Performance Evaluation of Ant Colony Optimization Based Rendezvous Leach Usin...
 

Plus de eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

Plus de eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Dernier

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 

Dernier (20)

(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 

Analysis of different hierarchical routing protocols of wireless sensor network

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 616 ANALYSIS OF DIFFERENT HIERARCHICAL ROUTING PROTOCOLS OF WIRELESS SENSOR NETWORK Dipti Balkrushna Ram1 , Grishma Shaileshkumar Shah2 1,2 Master of engineering, Electronics and Communication, SAL Institute of technology and engineering research, Gujarat, India , Abstarct Wireless sensored network is nowadays very popular in the field of research because world is now switching faster from wired communication to the wireless communication. It is used in environment monitoring, habitat monitoring, battlefield etc. WSN is made up of tiny sensor nodes which senses the data and communicate to the base station via other nodes.WSN networks are data- centric rather than node centric. So, main issues in WSN networks are energy consumption of network, lifetime of a network, delay, latency, quality of service etc.WSN has defined many routing protocols for the network. The main challenge in WSN is to design a routing protocol which gives the maximum energy efficient routing because nodes in sensored network are equipped with the battery. So, as time passes the battery of nodes will decrease so in turn network lifetime will decreases. There are many routing protocols which are classified as their working and their application to different conditions. This paper describes a brief information about routing protocols. The main focus of this paper is to give the comparison of different hierarchical routing protocols. Keywords: Leach, Pegasis,Teen/Apteen, WSN -------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION Designing of a wireless sensored network having increased energy efficiency is the hot research area nowadays. In recent years sensored network has reach the most of fields like medical monitoring, environment monitoring, habitat monitoring, home security system etc. The future is not for any when the wireless sensor network will be spreaded over the large area of the world. Because it is an emerging technology, at present there are lots of things in WSN which needs the attention by the researchers. There are many models which have been introduced and applied to wireless sensored network for better energy efficiency, network lifetime, delay, latency, etc. WSN have data centric architecture compared to ad-hoc network which consist of node centric architecture. In WSN there is no IP address scheme for each node because it has densely deployed sensor nodes in its large area. Due to these unique features of WSN protocol design is very important parameter in WSN. By designing proper routing protocol one can utilize the limited resources of the network. There are many types of routing protocols in wireless sensor network, which are classified as follows: 1. Flooding and gossiping Flooding and gossiping is the basic routing protocols of WSN. In flooding each node broadcast the receiving packets to all its neighbour and this process is continued until the packets has been reached to its destination. 2. Directed diffusionIt uses the attribute value pairs of the data and queries the sensors in an on demand basis. It diffuses data through sensor nodes by using a scheme of naming to the data. 3. Rumour routing It is similar to the directed diffusion but it is mostly applicable where geographic routing conditions are not preferred. 4. Gradient based routing It is also a changed version of directed diffusion. In GBR the number of hopes when node is diffused in the network is recorded. So, each node will discover the minimum number of hops to the sink which is known as the height of that node. “The difference between node’s height and that of its neighbour is called gradient on that link.”[2] And the packet is forwarded on a link which has largest gradient. 5. Energy aware routing Energy aware routing is based on the stochastic model. In this scheme the set of sub optimal path is used to increase the lifetime of a network. It says that using minimum energy path every time will dissipate the energy of nodes on that path. Instead, we can use multiple paths with some probability which in turn increase the lifetime of the network. 6. Hierarchical protocols Network scalability is the major issue in designing a wireless sensor network.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 617 As the network area and nodes density increases there may be overload in single tire network. This overload causes latency and unnecessary tracking of events. Other thing is that single tire network is not scalable for a large set of sensors in large area and there is a problem of service degradation. To overcome all these problems the hierarchical routing approach is used in some of the protocols of WSN. It maintains the energy consumption of the nodes using multi hop communication forming a cluster of nodes. LEACH (lower energy adaptive clustering hierarchy) is the first routing protocol invented for the hierarchical routing. This routing protocol has inspired many other hierarchical routing protocols like PEGASIS, TEEN, APTEEN, etc. In the next section we will explore the different hierarchical routing protocols. 2. HIERARCHICAL ROUTING PROTOCOLS 2.1 Leach LEACH is the first hierarchical routing protocol used for wireless sensored network. LEACH uses adaptive clustering scheme for the communication between nodes. It uses TDMA scheme for the timeline operation LEACH can prolong the network lifetime with a proportion of 15%. LEACH forms the clusters head. The nodes which want to communicate with other nodes will not directly communicate but it will be communicated via cluster heads. In each TDMA frame in each round the cluster head nodes will be changed. The selection of cluster heads will be done by the following equation: 𝑇 𝑛 = p 1 − p. rmod 1 p , n ∈ G Where P= percentage of cluster heads R=the current round G= set of nodes that haven’t been cluster heads in the last 1/P rounds. Here, T(n) is the threshold value of the selection of cluster heads in each round. Cluster heads are produced according to this equation the sensor node generate a random number between 0 and 1, if the number is smaller than the threshold T(n), then the node is selected as cluster head Fig-1: Flow chart for CH selection As shown in figure the node will become cluster head when its energy is higher than the energy of other nodes. The CH node will send the joining request message to all common nodes in its cluster. The common nodes will decide to join or not the CH. After getting acknowledgement from common nodes CH will assign TDMA scheme to all nodes. In this way the LEACH protocol will work using clustering scheme. Some features of LEACH protocol is as follows. 1. LEACH protocol randomly selects cluster heads in each round. So, to become CH using quickly some nodes will dissipate energy very fast to be selected as a cluster head more times. 2. In LEACH cluster heads directly communicate with sink. So, the energy consumption between CH and sink in greater than the energy consumption of communication between CH’s. 3. LEACH has great improvement in energy consumption great improvement in energy consumption of direct communication because it uses clustering hierarchy and also it is not a single tire communication as direct diffusion scheme or gossiping and flooding scheme. 4. Though LEACH has improved the energy consumption, further improvement is needed as the unbalanced energy load and large unnecessary energy dissipation. It is caused by the randomicity in electing cluster-head nodes. 5. There is an extra energy dissipation, because in each round nodes acting as CH will consume a lot of energy to transmit data to far distance base station.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 618 Fig-2: architecture of LEACH protocol 2.2 Pegasis The improvement of LEACH protocol is PEGASIS (power efficient gathering in sensor information system). It makes the chain of nodes instead of making clusters of it. The farther node will transmit the data via its neighbour node and in this way chain is created. The last node in the chain is called the leader node which will transmit all the data to sink (base station). LEADER NODE a0 a1 a2 a3 a4 a5 a6 BASE STATION Fig-3: PEGASIS protocol As shown in figure the nodes a0 to a6 are the chain partners for data transmission. Here a3 is the leader node which will transfer all the data to base station (sink). Features of PEGASIS 1. PEGASIS uses multihop routing by forming chains and use only one node to transmit to the Base station. 2. Compare to LEACH protocol PRGASIS has been shown performance of about 100-300% for different network topologies of WSN. 3. Compare to LEACH protocol the lifetime of a PEGASIS is long. 4. In PEGASIS there is only one node which does the data aggregation and data fusion. So, compared to LEACH where each cluster head is taking part in communication with base station. So, in turn the energy will also be dissipated by each cluster head, PEGASIS will dissipate less energy because only leader node in chain will actively take part in data aggregation and data fusion. 5. In PEGASIS each node should be aware of the remaining energy status of its neighbours. 6. Compare to LEACH, PEGASIS removes the energy dissipated by the reformation of cluster in each round. 7. In PEGASIS, if node death occurs, the chain must be rebuilt which increases the energy consumption. 8. Node far away from the leader node will forward the data many times by the chain which causes the long time delay. So, there is a problem of time delay in PEGASIS protocol which should be improved. 2.3 TEEN and APTEEN (Threshold sensitive energy efficient sensor network) These protocols are bit different from LEACH and PEGASIS protocols because it uses the sensored attributes such as temporary for communication. These protocols are very useful in time critical applications, where wireless network is reactive. In LEACH and PEGASIS the network is proactive where there is no event driven things occur where as in reactive network the things which are event driven which are sensitive to nodes sensitivity like temperature, weather or any other environmental conditions. TEEN uses hierarchical network architecture with data centric mechanism. The figure shows the mechanism of cluster forming in TEEN and APTEEN. As shown in figure clusters are formed and this process of formation of cluster is continued to the second level till the base station (sink) is reached. There are two types of thresholds: hard and soft. After formation of cluster head’s the cluster head will broadcast the threshold to the common nodes in its clusters. The first threshold sent to all nodes by cluster head is hard threshold which is the minimum value of sensory attributes to trigger node for switching on its transmitter. So, transmission occurs only when the node’s sensed attribute in turn lower the number of transmissions. Once, the node had sensed a value beyond hard threshold, it only transmits a data when value of sensed attribute changes by an amount equal or greater than the soft threshold. So, soft threshold will also decreases the number of transmissions. Fig-4:TEEN/APTEEN protocol architecture APTEENC Adaptive threshold sensitive energy efficient sensor network protocol is extension of TEEN. Features of TEEN and APTEEN 1. TEEN is not applicable where periodic reports are needed because it is based on thresholds.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 619 2. The APTEEN gives the facilities which TEEN does not gives as follows:  Analysing past data values  Taking snapshot view of the network.  To monitor an event for a period of time. 3. In APTEEN cluster head’s broadcast the attributes the threshold values and schedule of transmission of all nodes. 4. TEEN and APTEEN gives better performance than LEACH. Energy dissipation of APTEEN is in between of LEACH and TEEN. 5. Compared to LEACH, TEEN/APTEEN has overhead and complexity of cluster formation and problem of giving threshold based functions. 3. CONCLUSION AND FUTURE SCOPE From the analysis of the different routing protocols we have shown that there is further need of improvement in LEACH protocol as compared to PEGASIS and TEEN/APTEEN protocols. The table shown below gives the comparison of these four protocols. Table-1: Protols and their Parameters LEACH PEGASI S TEEN/APTEE N DATA DELIVERY MODEL CLUSTE R HEAD CHAIN BASED ACTIVE THRESHOLD DATA AGGREGATIO N YES NO YES POWER USAGE HIGH MAX HIGH SCALABILITY GOOD GOOD GOOD QUALITY OF SERVICE NO NO GOOD NETWORK LIFETIME GOOD VERY GOOD VERY GOOD RESOURCE AWARENESS YES YES YES From chart-1 shown below we can see that when first node dies the energy dissipation of LEACH is very much poor, so in terms of energy dissipation and network lifetime there is a lot more to do research work. Also researchers can futher make improvements in PEGASIA in terms of time delay. There are many open issues in WSN for improving the routing algorithms of LEACH, PEGASIS, TEEN/APTEEN. Chart-1:Dead nodes VS Lifetime of nodes REFERENCES [1] Kemal Akkaya, Mohamed Younis, “A survey on routing protocols for wireless sensor networks”, 26 November 2003. [2] Tintu Devasia, Gopika S, “Statistical Analysis of Energy Efficient Hierarchical Routing Protocols in WSN”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 2, Issue 5, May 2013. [3] Fan Xiangning, Song Yulin, “Improvement on LEACH Protocol of Wireless Sensor Network”, 2007 International Conference on Sensor Technologies and Applications, IEEE. [4] Mu Tong, Minghao Tang, “LEACH-B:An Improved LEACH Protocol for Wireless Sensor Network”, 978-1- 4244-3709, 2010 IEEE. [5]Jindal V, Verma AK And Bawa S, “How The Two Adhoc Networks Can Be Different: Manet & WSNs”, International Journal Of Computer Science & Technology, 2011, 2(4), 122-126. [6]Wang J, yang G and Chen S,“Secure Leach Routing Protocol Based On Low-Power Cluster-Head Selection Algorithm For Wireless Sensor Networks”, International Symposium On Intelligent Signal Processing And Communication Systems, 2007, 341-344. [7]Liu Y, Gao J, Jia Y and Zhu L, “A Cluster Maintenance Algorithm Based on LEACH-DCHS Protoclol”, International Conference on Networking, Architecture, and Storage, 2008, 165-166. [8]Junping h, Yuhui J and Liang D, “A Time-based Cluster- Head Selection Algorithm for LEACH”, In Computer and Communication, 2008. [9]Zhixiang D and Bensheng Q, “Three-layered routing protocol for WSN based on LEACH algorithm”, IEEE Xplore, 2007, 72-75. [10]Tong M and tang M, “LEACH-B: An Improved LEACH Protocol for Wireless Sensor Network”, 6th International Conference on Wireless Communications Networking and Mobile Computing, 2010. [11]Heinzelman WB, Chandraskan PA and Blakrisshnan H, "An Application-Specific Protocol Architecture for Wireless 0% 20% 40% 60% 80% 100% FND HNA LND 200 450 500 350 700 900 500 800 1200 500 1200 2100 TIME APTEEN TEEN PEGASIS LEACH PARAMETER
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 620 Microsensor Networks", IEEE Trans. on Wireless Communication, 2002, 1(4), 660-670. [12]Zhi-Jun L and La-Yuan L, “Based on Energy Balance LEACH-DC Protocol Design”, 6th IEEE Joint International Conference on Information Technology and Artificial Intelligence Conference (ITAIC), 2011. [13]Kumar N And Kaur J, “Improved LEACH Protocol for Wireless Sensor Networks”, 7th International Conference on Wireless Communications, Networking and Mobile omputing (WiCOM), 2011. [14]Tang L and Liu S, “Improvement on LEACH Routing Algorithm for Wireless Sensor Networks”, International Conference on Internet Computing and Information Services, 2011. [15] Sunita Rani, Tarun Gulati, “ An improved PEGASIS protocol to enhance energy utilization in wireless sensor network”, International Journal of Advanced Research in computer science and software engineering, volume:2, Issue 11. November,2012.