SlideShare uma empresa Scribd logo
1 de 9
Baixar para ler offline
Network and Complex Systems
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.7, 2013

www.iiste.org

Energy Efficient Protocol with Static Clustering (EEPSC)
Comparing with Low Energy Adaptive Clustering Hierarchy
(LEACH) Protocol
1*.Vinidha roc-Research scholar-Sathyabama university
Vinidha.eee@gmail.com- (corresponding author)
2.Dr.Ajay D.Vimalraj-Guide-Pondicherry engineering college
3.C.Maria Antoine Pushparaj-Research scholar-SRM university
Abstract
A wireless sensor network with a large number of tiny sensor nodes can be used as an effective tool for gathering
data in various situations. One of the major issues in wireless sensor networks is developing an energy-efficient
routing protocol which has a significant impact on the overall lifetime of the sensor network. In this paper, we
propose a novel hierarchical with static clustering routing protocol called Energy-Efficient Protocol with Static
Clustering (EEPSC). EEPSC, partitions the network into static clusters, eliminates the overhead of dynamic
clustering and utilizes temporary-cluster-heads to distribute the energy load among high power sensor nodes;
thus extends network lifetime. We have conducted simulation-based evaluations to compare the performance of
EEPSC against Low-Energy Adaptive Clustering Hierarchy (LEACH). Our experiment results show that EEPSC
outperforms LEACH in terms of network lifetime and power consumption minimization.
Keywords: Clustering methods, energy efficiency, routing protocol, wireless sensor networks
I. INTRODUCTION:Wireless sensor network is a collection of sensor nodes interconnected by wireless communication channels.
Each sensor node is a small device that can collect data from its surrounding area, carry out simple
computations, and communicate with other sensors or with the base station (BS). Such networks have been
realized due to recent advances in micro electromechanical systems and are expected to be widely used for
applications such as environment monitoring, home security, and earthquake warning. Despite the infinite scopes
of wireless sensor networks, they are limited by the node battery lifetime. Once they are deployed, the network
can keep operating while the battery power is adequate. This is critical point to be considered as it is almost
impossible to replace the node battery once deployed over an inaccessible area. Such constraints combined with
a typical deployment of large number of sensor nodes, have posed many challenges to the design and
management of
Sensor networks and necessitate energy-awareness at all layers of networking protocol stack In this paper we
assume a sensor network model, similar to those used in, with the following properties:
• All sensor nodes are immobile and homogeneous with a limited stored energy.
• The nodes are equipped with power control capabilities to vary their transmitted power.
• None of the nodes know their location in the network.
• Each node senses the environment at a fixed rate and always has data to send to the base station.
• Base station is fixed and not located between sensor nodes.
In this paper, we propose EEPSC (Energy-Efficient Protocol with Static Clustering), a hierarchical static
clustering based protocol, which eliminates the overhead of dynamic clustering and engages high power sensor
nodes for power consuming tasks and as a result prolongs the network lifetime. In each cluster, EEPSC chooses
the sensor node with maximum energy as the cluster-head (CH); thus, not only there is always one CH for each
cluster, but also the overhead of dynamic clustering is removed. EEPSC is a modified version of the Low-Energy
Adaptive Clustering Hierarchy (LEACH) protocol presented in LEACH uses the paradigm of data fusion to
reduce the amount of data transmitted between sensor nodes and the base station. Data fusion combines one or
more data packets from different sensors in a cluster to produce a single packet. It selects a small number of CHs
by a random scheme which collects and fuses data from sensor nodes and transmits the result to the base station.
LEACH uses randomization to rotate the CHs and achieves a factor of 8 improvement compared to the direct
approach before the first node dies The main difference between EEPSC and LEACH are described below:
• EEPSC benefits a new idea of using temporary-CHs and utilizes a new setup and responsible node selection
phase.
• EEPSC utilizes static clustering scheme, therefore eliminates the overhead of dynamic clustering.
The rest of the paper is organized as follows. Section II describes the proposed method.

30
Network and Complex Systems
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.7, 2013

www.iiste.org

2. EEPSC PROTOCOL ARCHITECTURE
EEPSC is a self-organizing, static clustering method that forms clusters only once during the network action.
The operation of EEPSC is broken up into rounds, where each round consists set-up phase, responsible node
selection phase and steady-state phase.
In the following sub-sections we discuss each of these phases in details.
A. Setup Phase
According to the static clustering scheme which is used in EEPSC, cluster formation is performed only once at
the beginning of network operation. For this aim, base station broadcasts k-1 different messages with different
transmission powers, which k is the desired number of clusters (specified a priori). By broadcasting the k=1
message all the sensor nodes which hear this message (are in the radio range of this message) set their cluster ID
to k and inform the base station that they are member of the cluster k via transmitting a join request message
(Join-REQ) back to the base station. Similarly, by broadcasting the k=k-1 message, all the sensor nodes which
are not joined to any clusters yet and hear this message set their cluster ID to k-1 and inform base station with a
Join-REQ message. Later, all sensor nodes which are not joined to any clusters set their cluster ID to k and
inform base station.
Fig. 1 shows how the network area is divided into k=4 clusters with broadcasting k-1=3 different messages from
base station. Fig. 1 Network area is divided into 4 clusters with broadcasting 3 different messages from base
station. These messages are small messages containing node’s Ids and a header that distinguishes them as
announcement messages. Like LEACH, in order to reduce the probability of collision among joint-REQ
messages during the setup phase, CSMA (Carrier Sense Multiple Access) is utilized as the MAC layer protocol
Afterward, the base station selects randomly one temporary-CH for each cluster and advertises these rules to the
whole network. In addition, base station (based on the number of each cluster) sets up a TDMA (time-division
multiple-access) schedule and transmits this schedule to the nodes in each cluster. Once the TDMA schedule is
known by all nodes in the cluster, the set-up phase is complete and the next phase can begin.
B. Responsible Node Selection Phase
After the clusters are established, network starts its normal operation and responsible nodes (temporary-CH and
CH) selection phase begins. At the beginning of each round, every node sends its energy level to the temporaryCH in it’s time slot. Afterward, temporary-CH choose the sensor node with utmost energy level as CH for
current round to collect the data of sensor nodes of that cluster, perform local data aggregation, and communicate
with the base station; and the node with lowest energy level as temporary-CH for next round and sends a roundstart packet including the new responsible sensor IDs for the current round. This packet also indicates the
beginning of round to other sensor nodes. Since every sensor node has a pre-specified time slot, changing the
CHs has no effect on the schedule of the cluster operation.
C. Steady-State Phase
The steady-state phase is broken into frames where nodes send their data to the CH during pre-allocated time
slots. These data contain node ID and the measure of sensed parameter. We show in the next section that the
total energy expended in the system is greater using multi-hop routing than direct transmission to the base
station; thus, we use direct transmission approach among CH and base station. The duration of each slot in which
a node transmits data is constant, so the time to send a frame of data depends on the number of nodes in the
cluster. To reduce energy dissipation, the radio of each non-cluster head node is turned off until its allocated
transmission time, but the CHs must be awake to receive all the data from nodes in the cluster.
3.The assumptions for the working scenarios are shown as following:
1. All sensors rarely move.
2. All sensors are homogeneous and energy restricted.
3. Energy consumption is variable for different types of sensors.
4. The base station is fixed with energy supply, and located outside the wireless sensor network.
5. Network stability is highly requested.
6. Once certain percent of the sensors fail, the full wireless sensor network fails.
In such scenarios, wireless sensor network must lower down energy consumption of each sensor, distribute
energy consumption equally throughout the sensors and keep high
stability of the whole network. The running stages of LESCS can be divided into three
phases, centralist network clustering calculation phase, cluster formation phase, and intra-cluster scheduling
phase. The centralist network clustering calculation phase and the
cluster formation phase, only run one time during the network initialization. Once the network cluster is formed,
the wireless sensor network enters the third phase, a loop
procedure, until the entire network fails. Figure 1. Network data transmission
First phase is centralist network clustering calculation.Because the data information is always attached with

31
Network and Complex Systems
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.7, 2013

www.iiste.org

position information [5, 6], it is easy to employ a base station that locates outside to calculate the optimal
network topology, which means how to divide the entire network to several clusters. Also, the base station
selects cluster head for each cluster. The cluster and their heads are decided only once and never changed. Then,
the base station broadcasts the results to the whole network. An example of clustering calculation results is given
as Figure 1. In the example, the network is divided to 9 clusters.
Second phase is cluster formation phase. Based on the broadcast message from the base station, each sensor
selects to join the cluster whose center is the nearest from itself.
The cluster head answers for recording the position and energy information of all sensors in the cluster. Then,
cluster head will assign a sequence number, from 0 to k-1 (k means
the amount of sensors in the cluster), to each sensor in the cluster. The sequence number is used for later
scheduling. The cluster head also records the available energy
information of each sensor. Before the description of the third phase, it must be made clear how the static
clustering protocols work. Figure 1 also illustrates an example of how to transmit data from source sensor to the
base station in LESCS. The sensors in the upper-left corner cluster of Figure 1 transmit the data to their gateway.
The gateway fuses the data and transmits the data to the gateway of the adjacent cluster [7, 8, 9, 10, 11]. Through
such multi hops, the fused data can be finally transmitted to the base station.During the multi hops, the gateways
take charge of collecting data, fusing data and transmitting data. Obviously, gateways consume energy much
faster than other sensors. If a sensor is always serving as gateway, it will fail much earlier than others. Such
phenomenon is called hotspot problem, which inherently exists in the static clustering protocols. To solve this,
LESCS carries out the third phase to assign gateway dynamically.The third phase is a loop procedure. Each loop
is a fixed time span, named time step or round, same as that concept of LEACH. In each round, cluster head
assigns the most energy remained sensor as the gateway.

4.For example
Figure 2 shows the gateway assignment and data transmission between two adjacent clusters, in some round.
The sensor of (C1, 3), serves as the gateway of cluster
All data from sensors in cluster 1, will be transmitted to (C1, 3). Then, (C1, 3) will fuse the data and transmit the
data to the gateway of cluster 2, (C2, 2). Observing the energy level shown in Figure 2, the sensor For example,
Figure 2 shows the gateway assignment and data transmission between two adjacent clusters, in some round. The
sensor of (C1, 3), serves as the gateway of cluster 1. All data from sensors in cluster 1, will be transmitted to
(C1, 3). Then, (C1, 3) will fuse the data and transmit the data to the gateway of cluster 2, (C2, 2). Observing the
energy level shown in Figure 2, the sensor For example, Figure 2 shows the gateway assignment and data
transmission between two adjacent clusters, in some round. The sensor of (C1, 3), serves as the gateway of

32
Network and Complex Systems
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.7, 2013

www.iiste.org

cluster 1. All data from sensors in cluster 1, will be transmitted to (C1, 3). Then, (C1, 3) will fuse the data and
transmit the data to the gateway of cluster 2, (C2, 2). Observing the energy level shown in Figure 2, the sensor
(C1, 3) consumes energy faster than cluster head (C1, 0) and other sensors in the cluster, for example, the sensor
of (C1,2). If no adaptation was performed, it’s obvious that (C1, 3) would fail faster than other sensors. Figure 3
shows the situation after a round. Now, (C1, 2) is assigned to serve as the gateway of cluster 1. Serving as the
gateway, (C1, 2) also consume more energy than other sensors of cluster 1. However, the available energy of
(C1, 2) is almost equal to that of (C1, 3). Through assigning the gateway dynamically, the energy consumption
of each sensor can be balanced.Such scheduling can distribute the large energy consumption for serving as
gateway, to all sensors. It can solve the hotspot problem and lengthen the lifetime of the entire wireless sensor
network. The detailed procedure of the gateway assignment is following: First step, the cluster head predicts the
available energy of each sensor in the cluster. Then, the cluster head selects the most energy remained sensor as
the gateway, following the prediction. After that, cluster head broadcasts the selection to all sensors in the
cluster. If any sensor has more available energy than the selected sensor, the cluster head will correct the
selection and the new one is assigned as the gateway. Otherwise, the predicted most available energy sensor will
be assigned as the gateway. It’s also possible that the cluster head itself is assigned as gateway sometimes,
because, the additional energy consumption for serving as a cluster head can be marginally ignored, comparing it
with the large energy consumption for serving as the gateway.

5.Energy Analysis and Simulation
To analyze the energy consumption, assumptions are made about the radio characteristics, including energy
consumption in the transmit and receive modes. In our research, a simple model is assumed that the radio
dissipates
Eelec = 50 nJ/bit to run the transmitter or receiver circuitry and ƒÃamp = 100 pJ/bit/m2 for the transmit
amplifier [4]. Thus, it is calculated that, to transmit a k-bit message over a distance d, the energy consumption
ET is
Et= Eelec x K+e amp X K d2 .................................................(1)
and to receive the message, the energy consumption ER is
Er= Eelec x K ..........................................................................(2)
It fs also assumed that there are three types of sensors with different data send-out rates of 1000 bit/round, 2000
bit/round and 3000 bit/round, named type 1, type 2 and type 3 respectively. According to equation (1) and (2), it
is calculated that, E1, E2 and E3, energy consumptions for the three types in each round while not serving as
gateway, are
E1 = 50ƒÊJ +100nJ x d 2.........................................................(3)
E2 =100ƒÊJ + 200nJ x d2........................................................(4)
E3 =150ƒÊJ + 300nJ xd2.........................................................(5)

33
Network and Complex Systems
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.7, 2013

www.iiste.org

And E gateway, energy consumption while serving as gateway, is

In the equations, d is the distance between sensors and gateway inside cluster, D is the distance between
gateways in different clusters, m1 is the total data rate inside each cluster and m2 is the total data rate after data
fusion and
transmitted to the base station through multi-hop.A 100 sensors network is randomly generated for the
simulation. The locations of 100 sensors are randomly generated in a square of 100 ~100m2, with 50 type 1
sensors (1000 bit/round), 30 type 2 sensors (2000 bit/round) and 20 type 3 sensors (3000 bit/round). Each sensor
has the initial energy of 1.0 J.Two evaluation parameters are taken into account. The first one is the round when
the initial failure of sensor occurs .The second one is the average lifetime of sensors.

The simulation result for LESCS and LEACH, with 1.0J/node in a square of 100×100 m2. X-axis is the round of
the simulation and y-axis is the number of the sensors that keep active. Observing Figure 4, it’s found that
LESCS performs better than LEACH, not only on the initial failure of sensor, but also on the average lifetime of
sensors. The initial failure of sensor occurs much later than LEACH, and the final failure of sensor occurs almost
the same round as LEACH. LESCS keeps the entire network working normally longer
than LEACH.
6. Energy and Simulation of Leach;-

If 100 nodes of the LEACH are dissipates per round as the number of cluster varies between 1 to 100 is the most
energy efficient method when there are between 3 and 5 cluster in the 100-node network as predicted by by the
analysis.

34
Network and Complex Systems
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.7, 2013

www.iiste.org

Number of cluster Vs average energy dissipation per round (J)
Fig. shows that LEACH is not as efficient as EEPSC
(LEACH-C delivers about 40% more data per unit energy than LEACH). This is because the BS has global
knowledge of the location and energy of all the nodes in the network, so it can
produce better clusters that require less energy for data transmission.
In addition, the BS formation algorithm ensures that there are clusters during each round of operation. As there
are only 100 nodes in the simulation, even though the expected
number of clusters per round is in LEACH, each round does not always have five clusters.
Energy distribution:- EEPCA shows the energy distribution across the boundary of the base station where the
three vector coincidence occurs at the level of the distribution rounds.Inthe the distribution chamber has been
consider to convert the medium into energy transformation across the cluster.These energy system shows the
formation of the cluster from the equation (1). This distribution curve shows the leading legend in the energy
shows is the eeca forms the symbol in the corner formation of the energy level simulation.
The energy distribution is seen from the plot chamber that EECA forwars in the surface plot level that the energy
conservation is greater in the base station of the secure transformation of the consumption.The queue formation
of the legend has been in the sector to show the distribution of the plot where the segment is Distributed

.

35
Network and Complex Systems
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.7, 2013

www.iiste.org

7.Expiereimental analysis plot
In these experiments, each node begins with only 2 J of energy and an unlimited amount of data to send to the
BS. Each node uses the probabilities in (3) to determine its cluster head status at the beginning of each round,
and each round lasts for 20 s.6 We tracked the rate at which the data packets are transfered to the BS and the
amount of energy required to get the data to the BS. When the nodes use up their limited energy during the
course of the simulation, they can no longer transmit or receive data. For these simulations, energy is consumed
whenever a node transmits or receives data or performs data aggregation. Using
spread-spectrum increases the number of bits transmitted, thereby increasing the amount of energy dissipated in
the electronics of the radio. We do not assume any static energy
dissipation nor do we assume energy is consumed during carrier-sense operations; hence, the results here do not
account for the potential energy benefits of using TDMA in LEACH
compared with CSMA in MTE.
8. Conclusion
When designing protocol architectures for wireless microsensor networks, it is important to consider the function
of the application, the need for ease of deployment, and the
severe energy constraints of the nodes. These features led us to design LEACH, a protocol architecture where
computation is performed locally to reduce the amount of transmitted
data, network configuration and operation is done using local control, and media access control (MAC) and
routing protocols enable low-energy networking. Results from our experiments show that EECA provides the
high performance needed under
the tight constraints of the wireless channel.
REFERENCES
[1] P. Agarwal and C. Procopiuc, “Exact and approximation algorithms for clustering,” in Proc. 9th Annu. ACMSIAM Symp. Discrete Algorithms, Baltimore, MD, Jan. 1999, pp. 658–667.
[2] J. Agre and L. Clare, “An integrated architecture for cooperative sensing networks,” IEEE Computer, vol. 33,
pp. 106–108, May 2000.
[3] D. Baker, A. Ephremides, and J. Flynn, “The design and simulation of a mobile radio network with
distributed control,” IEEE J. Select. Areas Commun., vol. SAC–2, pp. 226–237, Jan. 1984.
[4] A. Chandrakasan, R. Amirtharajah, S.-H. Cho, J. Goodman, G. Konduri, J. Kulik, W. Rabiner, and A. Wang,
“Design considerations for
distributed microsensor systems,” in Proc. IEEE Custom Integrated CircuitsConf. (CICC), San Diego, CA, May
1999, pp. 279–286.
[5] L. Clare, G. Pottie, and J. Agre, “Self-organizing distributed sensor networks,” in Proc. SPIE Conf.
Unattended Ground Sensor Technologies and Applications, vol. 3713, Orlando, FL, Apr. 1999, pp. 229–237.
[6] M. Dong, K. Yung, and W. Kaiser, “Low power signal processing architectures for network microsensors,”
in Proc. Int. Symp. Low Power Electronics and Design, Monterey, CA, Aug. 1997, pp. 173–177.
[7] D. Estrin, R. Govindan, J. Heidemann, and S. Kumar, “Next century challenges: Scalable coordination in
sensor networks,” in Proc. 5th

36
Network and Complex Systems
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.7, 2013

www.iiste.org

Annual ACM Int. Confe. Mobile Computing Networking (MobiCom), Seattle, WA, Aug. 1999, pp. 263–270.
[8] M. Ettus, “System capacity, latency, and power consumption in multihop- routed SS-CDMA wireless
networks,” in Proc. Radio and Wireless Conf. (RAWCON), Colorado Springs, CO, Aug. 1998, pp. 55–58.
[9] D. Hall, Mathematical Techniques in Multisensor Data Fusion. Boston, MA: Artech House, 1992.
[10] W. Heinzelman, “Application-specific protocol architectures for wireless networks,” Ph.D. dissertstion,
Mass. Inst. Technol., Cambridge, 2000.
[11] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient routing protocols for wireless
microsensor networks,” in Proc.33rd Hawaii Int. Conf. System Sciences (HICSS), Maui, HI, Jan. 2000.
[12] L. Hu, “Distributed code assignments for CDMA packet radio networks,” IEEE/ACM Trans. Networking,
vol. 1, pp. 668–677, Dec. 1993.
[13] C. Intanagonwiwat, R. Govindan, and D. Estrin, “Directed diffusion: A scalable and robust communication
paradigm for sensor networks,” in Proc. Fourth Annu. ACM Int. Conf. Mobile Computing and Networking
(MobiCom), Boston, MA, Aug. 2000, pp. 56–67.
[14] T. Kwon and M. Gerla, “Clutering with power control,” in Proc. MILCOM, vol. 2, Atlantic City, NJ, Nov.
1999.
[15] C. Lin and M. Gerla, “Adaptive clustering for mobile wireless networks,” IEEE J. Select. Areas Commun.,
vol. 15, pp. 1265–1275, Sept.1997.
[16] T. Murata and H. Ishibuchi, “Performance evaluation of genetic algorithms for flowshop scheduling
problems,” Proc. 1st IEEE Conf. Evolutionary Computation, vol. 2, pp. 812–817, June 1994.
[17] UCB/LBNL/VINT Network Simulator – ns (2000). [Online]. Available: http://www.isi.edu/vint/ nsnam/
[18] K. Pahlavan and A. Levesque, Wireless Information Networks. New York: Wiley, 1995.
[19] S. Park and M. Srivastava, “Power aware routing in sensor networks using dynamic source routing,” ACM
MONET Special Issue on Energy Conserving Protocols in Wireless Networks, 1999

37
This academic article was published by The International Institute for Science,
Technology and Education (IISTE). The IISTE is a pioneer in the Open Access
Publishing service based in the U.S. and Europe. The aim of the institute is
Accelerating Global Knowledge Sharing.
More information about the publisher can be found in the IISTE’s homepage:
http://www.iiste.org
CALL FOR JOURNAL PAPERS
The IISTE is currently hosting more than 30 peer-reviewed academic journals and
collaborating with academic institutions around the world. There’s no deadline for
submission. Prospective authors of IISTE journals can find the submission
instruction on the following page: http://www.iiste.org/journals/
The IISTE
editorial team promises to the review and publish all the qualified submissions in a
fast manner. All the journals articles are available online to the readers all over the
world without financial, legal, or technical barriers other than those inseparable from
gaining access to the internet itself. Printed version of the journals is also available
upon request of readers and authors.
MORE RESOURCES
Book publication information: http://www.iiste.org/book/
Recent conferences: http://www.iiste.org/conference/
IISTE Knowledge Sharing Partners
EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar

Mais conteúdo relacionado

Mais procurados

Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...ijsrd.com
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocolijceronline
 
Power Optimization Technique for Sensor Network
Power Optimization Technique for Sensor NetworkPower Optimization Technique for Sensor Network
Power Optimization Technique for Sensor NetworkEditor IJCATR
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...acijjournal
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...csijjournal
 
Data gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodesData gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodesIJCNCJournal
 
De31486489
De31486489De31486489
De31486489IJMER
 
Mobile data gathering with load balanced
Mobile data gathering with load balancedMobile data gathering with load balanced
Mobile data gathering with load balancedjpstudcorner
 
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...ijassn
 
Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyIAEME Publication
 
K-means clustering-based WSN protocol for energy efficiency improvement
K-means clustering-based WSN protocol for energy efficiency improvement K-means clustering-based WSN protocol for energy efficiency improvement
K-means clustering-based WSN protocol for energy efficiency improvement IJECEIAES
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHijsrd.com
 
Power Measurement of chain based routing protocol in wireless sensor network
Power Measurement of chain based routing protocol in wireless sensor networkPower Measurement of chain based routing protocol in wireless sensor network
Power Measurement of chain based routing protocol in wireless sensor networkBADALKUMAR56
 
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...IJCNCJournal
 
Survey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocolSurvey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocoleSAT Journals
 

Mais procurados (19)

Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
 
Bn36386389
Bn36386389Bn36386389
Bn36386389
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocol
 
Power Optimization Technique for Sensor Network
Power Optimization Technique for Sensor NetworkPower Optimization Technique for Sensor Network
Power Optimization Technique for Sensor Network
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
 
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
Energy Efficient Zone Divided and Energy Balanced Clustering Routing Protocol...
 
Data gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodesData gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodes
 
D031202018023
D031202018023D031202018023
D031202018023
 
SEP in WSN
SEP in WSNSEP in WSN
SEP in WSN
 
De31486489
De31486489De31486489
De31486489
 
G010214954
G010214954G010214954
G010214954
 
Mobile data gathering with load balanced
Mobile data gathering with load balancedMobile data gathering with load balanced
Mobile data gathering with load balanced
 
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
THRESHOLD SENSITIVE HETEROGENOUS ROUTING PROTOCOL FOR BETTER ENERGY UTILIZATI...
 
Modified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a surveyModified leach protocol in wireless sensor network a survey
Modified leach protocol in wireless sensor network a survey
 
K-means clustering-based WSN protocol for energy efficiency improvement
K-means clustering-based WSN protocol for energy efficiency improvement K-means clustering-based WSN protocol for energy efficiency improvement
K-means clustering-based WSN protocol for energy efficiency improvement
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
 
Power Measurement of chain based routing protocol in wireless sensor network
Power Measurement of chain based routing protocol in wireless sensor networkPower Measurement of chain based routing protocol in wireless sensor network
Power Measurement of chain based routing protocol in wireless sensor network
 
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
ENERGY CONSUMPTION IMPROVEMENT OF TRADITIONAL CLUSTERING METHOD IN WIRELESS S...
 
Survey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocolSurvey on sensor protocol for information via negotiation (spin) protocol
Survey on sensor protocol for information via negotiation (spin) protocol
 

Semelhante a Energy efficient protocol with static clustering (eepsc) comparing with low energy adaptive clustering hierarchy (leach) protocol

Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)ijsrd.com
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Editor IJCATR
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...Editor IJCATR
 
9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...Chính Cao
 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolIJTET Journal
 
Flow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networksFlow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networkseSAT Publishing House
 
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH ProtocolUniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH Protocolidescitation
 
International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)ijcseit
 
Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...
Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...
Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...IRJET Journal
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...ijsrd.com
 
Cluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor NetworksCluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor Networkseditor1knowledgecuddle
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Surveyijsrd.com
 
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...IJCSEA Journal
 
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORKIMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORKIAEME Publication
 

Semelhante a Energy efficient protocol with static clustering (eepsc) comparing with low energy adaptive clustering hierarchy (leach) protocol (20)

Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
An Improved Energy Efficient Wireless Sensor Networks Through Clustering In C...
 
9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...9.distributive energy efficient adaptive clustering protocol for wireless sen...
9.distributive energy efficient adaptive clustering protocol for wireless sen...
 
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH ProtocolAnalysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
Analysis of Packet Loss Rate in Wireless Sensor Network using LEACH Protocol
 
Flow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networksFlow balanced routing in wireless sensor networks
Flow balanced routing in wireless sensor networks
 
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH ProtocolUniform Distribution Technique of Cluster Heads in LEACH Protocol
Uniform Distribution Technique of Cluster Heads in LEACH Protocol
 
International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)International Journal of Advanced Smart Sensor Network Systems (IJASSN)
International Journal of Advanced Smart Sensor Network Systems (IJASSN)
 
Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...
Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...
Energy Efficient Optimized LEACH-C Protocol using PBO Algorithm For Wireless ...
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
 
Cluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor NetworksCluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor Networks
 
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A SurveyEnergy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
Energy Efficient Data Aggregation in Wireless Sensor Networks: A Survey
 
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
 
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORKIMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
 

Mais de Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

Mais de Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Último

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 

Último (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 

Energy efficient protocol with static clustering (eepsc) comparing with low energy adaptive clustering hierarchy (leach) protocol

  • 1. Network and Complex Systems ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.7, 2013 www.iiste.org Energy Efficient Protocol with Static Clustering (EEPSC) Comparing with Low Energy Adaptive Clustering Hierarchy (LEACH) Protocol 1*.Vinidha roc-Research scholar-Sathyabama university Vinidha.eee@gmail.com- (corresponding author) 2.Dr.Ajay D.Vimalraj-Guide-Pondicherry engineering college 3.C.Maria Antoine Pushparaj-Research scholar-SRM university Abstract A wireless sensor network with a large number of tiny sensor nodes can be used as an effective tool for gathering data in various situations. One of the major issues in wireless sensor networks is developing an energy-efficient routing protocol which has a significant impact on the overall lifetime of the sensor network. In this paper, we propose a novel hierarchical with static clustering routing protocol called Energy-Efficient Protocol with Static Clustering (EEPSC). EEPSC, partitions the network into static clusters, eliminates the overhead of dynamic clustering and utilizes temporary-cluster-heads to distribute the energy load among high power sensor nodes; thus extends network lifetime. We have conducted simulation-based evaluations to compare the performance of EEPSC against Low-Energy Adaptive Clustering Hierarchy (LEACH). Our experiment results show that EEPSC outperforms LEACH in terms of network lifetime and power consumption minimization. Keywords: Clustering methods, energy efficiency, routing protocol, wireless sensor networks I. INTRODUCTION:Wireless sensor network is a collection of sensor nodes interconnected by wireless communication channels. Each sensor node is a small device that can collect data from its surrounding area, carry out simple computations, and communicate with other sensors or with the base station (BS). Such networks have been realized due to recent advances in micro electromechanical systems and are expected to be widely used for applications such as environment monitoring, home security, and earthquake warning. Despite the infinite scopes of wireless sensor networks, they are limited by the node battery lifetime. Once they are deployed, the network can keep operating while the battery power is adequate. This is critical point to be considered as it is almost impossible to replace the node battery once deployed over an inaccessible area. Such constraints combined with a typical deployment of large number of sensor nodes, have posed many challenges to the design and management of Sensor networks and necessitate energy-awareness at all layers of networking protocol stack In this paper we assume a sensor network model, similar to those used in, with the following properties: • All sensor nodes are immobile and homogeneous with a limited stored energy. • The nodes are equipped with power control capabilities to vary their transmitted power. • None of the nodes know their location in the network. • Each node senses the environment at a fixed rate and always has data to send to the base station. • Base station is fixed and not located between sensor nodes. In this paper, we propose EEPSC (Energy-Efficient Protocol with Static Clustering), a hierarchical static clustering based protocol, which eliminates the overhead of dynamic clustering and engages high power sensor nodes for power consuming tasks and as a result prolongs the network lifetime. In each cluster, EEPSC chooses the sensor node with maximum energy as the cluster-head (CH); thus, not only there is always one CH for each cluster, but also the overhead of dynamic clustering is removed. EEPSC is a modified version of the Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol presented in LEACH uses the paradigm of data fusion to reduce the amount of data transmitted between sensor nodes and the base station. Data fusion combines one or more data packets from different sensors in a cluster to produce a single packet. It selects a small number of CHs by a random scheme which collects and fuses data from sensor nodes and transmits the result to the base station. LEACH uses randomization to rotate the CHs and achieves a factor of 8 improvement compared to the direct approach before the first node dies The main difference between EEPSC and LEACH are described below: • EEPSC benefits a new idea of using temporary-CHs and utilizes a new setup and responsible node selection phase. • EEPSC utilizes static clustering scheme, therefore eliminates the overhead of dynamic clustering. The rest of the paper is organized as follows. Section II describes the proposed method. 30
  • 2. Network and Complex Systems ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.7, 2013 www.iiste.org 2. EEPSC PROTOCOL ARCHITECTURE EEPSC is a self-organizing, static clustering method that forms clusters only once during the network action. The operation of EEPSC is broken up into rounds, where each round consists set-up phase, responsible node selection phase and steady-state phase. In the following sub-sections we discuss each of these phases in details. A. Setup Phase According to the static clustering scheme which is used in EEPSC, cluster formation is performed only once at the beginning of network operation. For this aim, base station broadcasts k-1 different messages with different transmission powers, which k is the desired number of clusters (specified a priori). By broadcasting the k=1 message all the sensor nodes which hear this message (are in the radio range of this message) set their cluster ID to k and inform the base station that they are member of the cluster k via transmitting a join request message (Join-REQ) back to the base station. Similarly, by broadcasting the k=k-1 message, all the sensor nodes which are not joined to any clusters yet and hear this message set their cluster ID to k-1 and inform base station with a Join-REQ message. Later, all sensor nodes which are not joined to any clusters set their cluster ID to k and inform base station. Fig. 1 shows how the network area is divided into k=4 clusters with broadcasting k-1=3 different messages from base station. Fig. 1 Network area is divided into 4 clusters with broadcasting 3 different messages from base station. These messages are small messages containing node’s Ids and a header that distinguishes them as announcement messages. Like LEACH, in order to reduce the probability of collision among joint-REQ messages during the setup phase, CSMA (Carrier Sense Multiple Access) is utilized as the MAC layer protocol Afterward, the base station selects randomly one temporary-CH for each cluster and advertises these rules to the whole network. In addition, base station (based on the number of each cluster) sets up a TDMA (time-division multiple-access) schedule and transmits this schedule to the nodes in each cluster. Once the TDMA schedule is known by all nodes in the cluster, the set-up phase is complete and the next phase can begin. B. Responsible Node Selection Phase After the clusters are established, network starts its normal operation and responsible nodes (temporary-CH and CH) selection phase begins. At the beginning of each round, every node sends its energy level to the temporaryCH in it’s time slot. Afterward, temporary-CH choose the sensor node with utmost energy level as CH for current round to collect the data of sensor nodes of that cluster, perform local data aggregation, and communicate with the base station; and the node with lowest energy level as temporary-CH for next round and sends a roundstart packet including the new responsible sensor IDs for the current round. This packet also indicates the beginning of round to other sensor nodes. Since every sensor node has a pre-specified time slot, changing the CHs has no effect on the schedule of the cluster operation. C. Steady-State Phase The steady-state phase is broken into frames where nodes send their data to the CH during pre-allocated time slots. These data contain node ID and the measure of sensed parameter. We show in the next section that the total energy expended in the system is greater using multi-hop routing than direct transmission to the base station; thus, we use direct transmission approach among CH and base station. The duration of each slot in which a node transmits data is constant, so the time to send a frame of data depends on the number of nodes in the cluster. To reduce energy dissipation, the radio of each non-cluster head node is turned off until its allocated transmission time, but the CHs must be awake to receive all the data from nodes in the cluster. 3.The assumptions for the working scenarios are shown as following: 1. All sensors rarely move. 2. All sensors are homogeneous and energy restricted. 3. Energy consumption is variable for different types of sensors. 4. The base station is fixed with energy supply, and located outside the wireless sensor network. 5. Network stability is highly requested. 6. Once certain percent of the sensors fail, the full wireless sensor network fails. In such scenarios, wireless sensor network must lower down energy consumption of each sensor, distribute energy consumption equally throughout the sensors and keep high stability of the whole network. The running stages of LESCS can be divided into three phases, centralist network clustering calculation phase, cluster formation phase, and intra-cluster scheduling phase. The centralist network clustering calculation phase and the cluster formation phase, only run one time during the network initialization. Once the network cluster is formed, the wireless sensor network enters the third phase, a loop procedure, until the entire network fails. Figure 1. Network data transmission First phase is centralist network clustering calculation.Because the data information is always attached with 31
  • 3. Network and Complex Systems ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.7, 2013 www.iiste.org position information [5, 6], it is easy to employ a base station that locates outside to calculate the optimal network topology, which means how to divide the entire network to several clusters. Also, the base station selects cluster head for each cluster. The cluster and their heads are decided only once and never changed. Then, the base station broadcasts the results to the whole network. An example of clustering calculation results is given as Figure 1. In the example, the network is divided to 9 clusters. Second phase is cluster formation phase. Based on the broadcast message from the base station, each sensor selects to join the cluster whose center is the nearest from itself. The cluster head answers for recording the position and energy information of all sensors in the cluster. Then, cluster head will assign a sequence number, from 0 to k-1 (k means the amount of sensors in the cluster), to each sensor in the cluster. The sequence number is used for later scheduling. The cluster head also records the available energy information of each sensor. Before the description of the third phase, it must be made clear how the static clustering protocols work. Figure 1 also illustrates an example of how to transmit data from source sensor to the base station in LESCS. The sensors in the upper-left corner cluster of Figure 1 transmit the data to their gateway. The gateway fuses the data and transmits the data to the gateway of the adjacent cluster [7, 8, 9, 10, 11]. Through such multi hops, the fused data can be finally transmitted to the base station.During the multi hops, the gateways take charge of collecting data, fusing data and transmitting data. Obviously, gateways consume energy much faster than other sensors. If a sensor is always serving as gateway, it will fail much earlier than others. Such phenomenon is called hotspot problem, which inherently exists in the static clustering protocols. To solve this, LESCS carries out the third phase to assign gateway dynamically.The third phase is a loop procedure. Each loop is a fixed time span, named time step or round, same as that concept of LEACH. In each round, cluster head assigns the most energy remained sensor as the gateway. 4.For example Figure 2 shows the gateway assignment and data transmission between two adjacent clusters, in some round. The sensor of (C1, 3), serves as the gateway of cluster All data from sensors in cluster 1, will be transmitted to (C1, 3). Then, (C1, 3) will fuse the data and transmit the data to the gateway of cluster 2, (C2, 2). Observing the energy level shown in Figure 2, the sensor For example, Figure 2 shows the gateway assignment and data transmission between two adjacent clusters, in some round. The sensor of (C1, 3), serves as the gateway of cluster 1. All data from sensors in cluster 1, will be transmitted to (C1, 3). Then, (C1, 3) will fuse the data and transmit the data to the gateway of cluster 2, (C2, 2). Observing the energy level shown in Figure 2, the sensor For example, Figure 2 shows the gateway assignment and data transmission between two adjacent clusters, in some round. The sensor of (C1, 3), serves as the gateway of 32
  • 4. Network and Complex Systems ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.7, 2013 www.iiste.org cluster 1. All data from sensors in cluster 1, will be transmitted to (C1, 3). Then, (C1, 3) will fuse the data and transmit the data to the gateway of cluster 2, (C2, 2). Observing the energy level shown in Figure 2, the sensor (C1, 3) consumes energy faster than cluster head (C1, 0) and other sensors in the cluster, for example, the sensor of (C1,2). If no adaptation was performed, it’s obvious that (C1, 3) would fail faster than other sensors. Figure 3 shows the situation after a round. Now, (C1, 2) is assigned to serve as the gateway of cluster 1. Serving as the gateway, (C1, 2) also consume more energy than other sensors of cluster 1. However, the available energy of (C1, 2) is almost equal to that of (C1, 3). Through assigning the gateway dynamically, the energy consumption of each sensor can be balanced.Such scheduling can distribute the large energy consumption for serving as gateway, to all sensors. It can solve the hotspot problem and lengthen the lifetime of the entire wireless sensor network. The detailed procedure of the gateway assignment is following: First step, the cluster head predicts the available energy of each sensor in the cluster. Then, the cluster head selects the most energy remained sensor as the gateway, following the prediction. After that, cluster head broadcasts the selection to all sensors in the cluster. If any sensor has more available energy than the selected sensor, the cluster head will correct the selection and the new one is assigned as the gateway. Otherwise, the predicted most available energy sensor will be assigned as the gateway. It’s also possible that the cluster head itself is assigned as gateway sometimes, because, the additional energy consumption for serving as a cluster head can be marginally ignored, comparing it with the large energy consumption for serving as the gateway. 5.Energy Analysis and Simulation To analyze the energy consumption, assumptions are made about the radio characteristics, including energy consumption in the transmit and receive modes. In our research, a simple model is assumed that the radio dissipates Eelec = 50 nJ/bit to run the transmitter or receiver circuitry and ƒÃamp = 100 pJ/bit/m2 for the transmit amplifier [4]. Thus, it is calculated that, to transmit a k-bit message over a distance d, the energy consumption ET is Et= Eelec x K+e amp X K d2 .................................................(1) and to receive the message, the energy consumption ER is Er= Eelec x K ..........................................................................(2) It fs also assumed that there are three types of sensors with different data send-out rates of 1000 bit/round, 2000 bit/round and 3000 bit/round, named type 1, type 2 and type 3 respectively. According to equation (1) and (2), it is calculated that, E1, E2 and E3, energy consumptions for the three types in each round while not serving as gateway, are E1 = 50ƒÊJ +100nJ x d 2.........................................................(3) E2 =100ƒÊJ + 200nJ x d2........................................................(4) E3 =150ƒÊJ + 300nJ xd2.........................................................(5) 33
  • 5. Network and Complex Systems ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.7, 2013 www.iiste.org And E gateway, energy consumption while serving as gateway, is In the equations, d is the distance between sensors and gateway inside cluster, D is the distance between gateways in different clusters, m1 is the total data rate inside each cluster and m2 is the total data rate after data fusion and transmitted to the base station through multi-hop.A 100 sensors network is randomly generated for the simulation. The locations of 100 sensors are randomly generated in a square of 100 ~100m2, with 50 type 1 sensors (1000 bit/round), 30 type 2 sensors (2000 bit/round) and 20 type 3 sensors (3000 bit/round). Each sensor has the initial energy of 1.0 J.Two evaluation parameters are taken into account. The first one is the round when the initial failure of sensor occurs .The second one is the average lifetime of sensors. The simulation result for LESCS and LEACH, with 1.0J/node in a square of 100×100 m2. X-axis is the round of the simulation and y-axis is the number of the sensors that keep active. Observing Figure 4, it’s found that LESCS performs better than LEACH, not only on the initial failure of sensor, but also on the average lifetime of sensors. The initial failure of sensor occurs much later than LEACH, and the final failure of sensor occurs almost the same round as LEACH. LESCS keeps the entire network working normally longer than LEACH. 6. Energy and Simulation of Leach;- If 100 nodes of the LEACH are dissipates per round as the number of cluster varies between 1 to 100 is the most energy efficient method when there are between 3 and 5 cluster in the 100-node network as predicted by by the analysis. 34
  • 6. Network and Complex Systems ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.7, 2013 www.iiste.org Number of cluster Vs average energy dissipation per round (J) Fig. shows that LEACH is not as efficient as EEPSC (LEACH-C delivers about 40% more data per unit energy than LEACH). This is because the BS has global knowledge of the location and energy of all the nodes in the network, so it can produce better clusters that require less energy for data transmission. In addition, the BS formation algorithm ensures that there are clusters during each round of operation. As there are only 100 nodes in the simulation, even though the expected number of clusters per round is in LEACH, each round does not always have five clusters. Energy distribution:- EEPCA shows the energy distribution across the boundary of the base station where the three vector coincidence occurs at the level of the distribution rounds.Inthe the distribution chamber has been consider to convert the medium into energy transformation across the cluster.These energy system shows the formation of the cluster from the equation (1). This distribution curve shows the leading legend in the energy shows is the eeca forms the symbol in the corner formation of the energy level simulation. The energy distribution is seen from the plot chamber that EECA forwars in the surface plot level that the energy conservation is greater in the base station of the secure transformation of the consumption.The queue formation of the legend has been in the sector to show the distribution of the plot where the segment is Distributed . 35
  • 7. Network and Complex Systems ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.7, 2013 www.iiste.org 7.Expiereimental analysis plot In these experiments, each node begins with only 2 J of energy and an unlimited amount of data to send to the BS. Each node uses the probabilities in (3) to determine its cluster head status at the beginning of each round, and each round lasts for 20 s.6 We tracked the rate at which the data packets are transfered to the BS and the amount of energy required to get the data to the BS. When the nodes use up their limited energy during the course of the simulation, they can no longer transmit or receive data. For these simulations, energy is consumed whenever a node transmits or receives data or performs data aggregation. Using spread-spectrum increases the number of bits transmitted, thereby increasing the amount of energy dissipated in the electronics of the radio. We do not assume any static energy dissipation nor do we assume energy is consumed during carrier-sense operations; hence, the results here do not account for the potential energy benefits of using TDMA in LEACH compared with CSMA in MTE. 8. Conclusion When designing protocol architectures for wireless microsensor networks, it is important to consider the function of the application, the need for ease of deployment, and the severe energy constraints of the nodes. These features led us to design LEACH, a protocol architecture where computation is performed locally to reduce the amount of transmitted data, network configuration and operation is done using local control, and media access control (MAC) and routing protocols enable low-energy networking. Results from our experiments show that EECA provides the high performance needed under the tight constraints of the wireless channel. REFERENCES [1] P. Agarwal and C. Procopiuc, “Exact and approximation algorithms for clustering,” in Proc. 9th Annu. ACMSIAM Symp. Discrete Algorithms, Baltimore, MD, Jan. 1999, pp. 658–667. [2] J. Agre and L. Clare, “An integrated architecture for cooperative sensing networks,” IEEE Computer, vol. 33, pp. 106–108, May 2000. [3] D. Baker, A. Ephremides, and J. Flynn, “The design and simulation of a mobile radio network with distributed control,” IEEE J. Select. Areas Commun., vol. SAC–2, pp. 226–237, Jan. 1984. [4] A. Chandrakasan, R. Amirtharajah, S.-H. Cho, J. Goodman, G. Konduri, J. Kulik, W. Rabiner, and A. Wang, “Design considerations for distributed microsensor systems,” in Proc. IEEE Custom Integrated CircuitsConf. (CICC), San Diego, CA, May 1999, pp. 279–286. [5] L. Clare, G. Pottie, and J. Agre, “Self-organizing distributed sensor networks,” in Proc. SPIE Conf. Unattended Ground Sensor Technologies and Applications, vol. 3713, Orlando, FL, Apr. 1999, pp. 229–237. [6] M. Dong, K. Yung, and W. Kaiser, “Low power signal processing architectures for network microsensors,” in Proc. Int. Symp. Low Power Electronics and Design, Monterey, CA, Aug. 1997, pp. 173–177. [7] D. Estrin, R. Govindan, J. Heidemann, and S. Kumar, “Next century challenges: Scalable coordination in sensor networks,” in Proc. 5th 36
  • 8. Network and Complex Systems ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol.3, No.7, 2013 www.iiste.org Annual ACM Int. Confe. Mobile Computing Networking (MobiCom), Seattle, WA, Aug. 1999, pp. 263–270. [8] M. Ettus, “System capacity, latency, and power consumption in multihop- routed SS-CDMA wireless networks,” in Proc. Radio and Wireless Conf. (RAWCON), Colorado Springs, CO, Aug. 1998, pp. 55–58. [9] D. Hall, Mathematical Techniques in Multisensor Data Fusion. Boston, MA: Artech House, 1992. [10] W. Heinzelman, “Application-specific protocol architectures for wireless networks,” Ph.D. dissertstion, Mass. Inst. Technol., Cambridge, 2000. [11] W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient routing protocols for wireless microsensor networks,” in Proc.33rd Hawaii Int. Conf. System Sciences (HICSS), Maui, HI, Jan. 2000. [12] L. Hu, “Distributed code assignments for CDMA packet radio networks,” IEEE/ACM Trans. Networking, vol. 1, pp. 668–677, Dec. 1993. [13] C. Intanagonwiwat, R. Govindan, and D. Estrin, “Directed diffusion: A scalable and robust communication paradigm for sensor networks,” in Proc. Fourth Annu. ACM Int. Conf. Mobile Computing and Networking (MobiCom), Boston, MA, Aug. 2000, pp. 56–67. [14] T. Kwon and M. Gerla, “Clutering with power control,” in Proc. MILCOM, vol. 2, Atlantic City, NJ, Nov. 1999. [15] C. Lin and M. Gerla, “Adaptive clustering for mobile wireless networks,” IEEE J. Select. Areas Commun., vol. 15, pp. 1265–1275, Sept.1997. [16] T. Murata and H. Ishibuchi, “Performance evaluation of genetic algorithms for flowshop scheduling problems,” Proc. 1st IEEE Conf. Evolutionary Computation, vol. 2, pp. 812–817, June 1994. [17] UCB/LBNL/VINT Network Simulator – ns (2000). [Online]. Available: http://www.isi.edu/vint/ nsnam/ [18] K. Pahlavan and A. Levesque, Wireless Information Networks. New York: Wiley, 1995. [19] S. Park and M. Srivastava, “Power aware routing in sensor networks using dynamic source routing,” ACM MONET Special Issue on Energy Conserving Protocols in Wireless Networks, 1999 37
  • 9. This academic article was published by The International Institute for Science, Technology and Education (IISTE). The IISTE is a pioneer in the Open Access Publishing service based in the U.S. and Europe. The aim of the institute is Accelerating Global Knowledge Sharing. More information about the publisher can be found in the IISTE’s homepage: http://www.iiste.org CALL FOR JOURNAL PAPERS The IISTE is currently hosting more than 30 peer-reviewed academic journals and collaborating with academic institutions around the world. There’s no deadline for submission. Prospective authors of IISTE journals can find the submission instruction on the following page: http://www.iiste.org/journals/ The IISTE editorial team promises to the review and publish all the qualified submissions in a fast manner. All the journals articles are available online to the readers all over the world without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. Printed version of the journals is also available upon request of readers and authors. MORE RESOURCES Book publication information: http://www.iiste.org/book/ Recent conferences: http://www.iiste.org/conference/ IISTE Knowledge Sharing Partners EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library , NewJour, Google Scholar