Survey on Leach Protocols

In: Computers and Technology

Submitted By Bhavya9
Words 2569
Pages 11
A Survey on LEACH and its Variant in Wireless Sensor Network 1st Bhavya R Patel, 2nd Jignesh patel 1st PG Student, 2nd Asst.Prof. 1st Computer Engineering, 2nd Computer Engineering S.R.Patel Engineering College, Unjha, Mehsana,India 1bhavyapatel9@gmail.com, 2 jigneshpatel.er@gmail.com __________________________________________________________________________________________________________
Abstract-Sensor webs consisting of nodes with limited battery power and wireless communications are deployed to collect useful information from the field. Gathering sensed information in an energy efficient manner is critical to operate the sensor network for a long period of time. A data collection problem is defined where, in a round of communication, each sensor node has a packet to be sent to the distant base station. If each node transmits its sensed data directly to the base station then it will deplete its power quickly. Since wireless communications consume significant amounts of battery power, sensor nodes should spend as little energy as possible receiving and transmitting data. It is necessary for communication protocols to maximize nodes' lifetimes, reduce bandwidth consumption by using local collaboration among the nodes, and tolerate node failures. Most of the work in energy efficient data gathering application is motivated by LEACH by allowing rotation of cluster head for load distribution. In this paper, we have presented several existing methods for energy efficient cluster head selection in wireless sensor network.
I. INTRODUCTION
Modern wireless sensor networks are made up of a large number of inexpensive devices that are networked via low power wireless communications. It is the networking capability that fundamentally differentiates a sensor network from a mere collection of sensors, by enabling cooperation, coordination, and collaboration among…...

Similar Documents

Internet Protocols

...How Internet Protocols Work Kyra Pettit CIT/278 April 18, 2013 Richard Sleeper How Internet Protocols Work In the 1970s Internet Protocols were developed. Before this computer networks did not have a way to communicate with other networks. Protocols allowed computers on different networks to communicate or talk to each other. This let computers to communicate and exchange packets of data with each other. This essay will explain the different protocols and the responsibility of each protocol. Transfer Control Protocol\Internet Protocols (TCP\IP) Transfer Control Protocol/Internet Protocol (TCP/IP) was established. The TCP\IP enables packets to be routed by containing address information and control information. This protocol is the primary and heart of the Internet protocols. It makes sure all the information sent is transferred reliably and quickly. If any packet is lost the information is not re-routed back through again. It only sends what is missing out of the packet back again. File Retrieval Protocols This was an earlier Protocol for retrieving information from the Internet. This protocol had no type of graphics or no description of the file. The person putting in the info had to keep files on paper about the information are it would have been lost. File Transfer Protocol (FTP) The FTP helped move files from one computer to another. Using this user can log on to a computer, and look through the files, download or upload the files (usg). No......

Words: 554 - Pages: 3

Protocols

...LAB 3.1-3.4 3.1.1 – WHAT WOULD HAPPEN IF WIRELESS DEVICES WERE NOT GOVERNED BY THE WI-FI ALLIANCE AND EACH VENDOR HAD ITS OWN STANDARDS AND PROTOCOLS? A. WIRELESS DEVICES WOULD HAVE DIFFICULTY COMMUNICATING. WHAT IS OKAY WITH ONE VENDOR MAY NOT BE OKAY WITH ANOTHER VENDOR. PRICES OF DEVICES AND CONNECTIONS WOULD ALSO CHANGE. 3.1.2 – GIVE AN EXAMPLE OF A MODEL THAT IS USED TO VISUALIZE SOMETHING THAT IS DIFFICULT TO OBSERVE OR PERCEIVE. A. CONNECTIONS REQUIRING ROUTER EQUIPMENT – HUBS, SWITCHES AND ROUTERS. 3.1.3 – WHAT ARE THE DIFFERENT LAYERS YOU THINK WOULD BE NECESSARY FOR COMMUNICATION TO BE MAPPED TO A MODEL? A. APPLICATION LAYER, PRESENTATION LAYER, SESSION LAYER, TRANSPORT LAYER, DATA LINK LAYER AND PHYSICAL LAYER. 3.1.4 – WHAT WILL HAPPEN IF A MODEL IS TOO GENERAL? TOO GRANULAR? A. THE MODEL WOULD NOT BE FLEXIBLE IF TOO GENERAL; IF TOO GRANULAR, A LOAD IMBALANCE WOULD OCCUR. 3.1 REVIEW – 1. WHY WOULD A 3-LAYER MODEL OF COMMUNICATION THAT HAS THE LAYERS PHYSICAL, NETWORK AND APPLICATIONS BE INSUFFICIENT TO ADEQUATELY DESCRIBE NETWORK COMMUNICATIONS? A. THE 7-LAYER COMMUNICATION MODEL WAS TESTED AND SUCCESSFULLY PROVEN TO WORK. IF A LAYER IS MISSING THE MODEL WILL NOT WORK PROPERLY. 2. WHAT IS THE HISTORY OF THE OSI REFERENCE MODEL? A. TO SERVE AS THE FOUNDATION OF THE ESTABLISHED WIDELY ADOPTED SUITE OF PROTOCOLS THAT ARE USED BY INTERNATIONAL INTERNETWORKS. 3. WHAT IS THE HISTORY OF THE TCP/IP MODEL? A. BOTH DEVELOPED TOGETHER (INTERNET AND TCP/IP)...

Words: 996 - Pages: 4

Survey

...A Survey on Energy Efficient Routing Protocols for Wireless Sensor Networks Muhammad Asad Department of Computer Science COMSATS INSTITUTE OF INFORMATION TECHNOLOGY, WAH CANT Abstract: To tackle the limited life-time issue of Wireless Sensor Networks (WSNs) is a very key research domain in order to design, development and implementation of energy effective algorithms. So, the major concern of researcher is energy efficiency in wireless sensor networks. WSNs acknowledged magnificent consideration from both industry and academic because of assure numerous latent applications in military and civilian areas. WSN consists of sensor nodes sensing the data, communication capabilities and data processing. Network can be deployed in the area of interest and collaborate to complete a task. WSN has multiple exclusive characteristics, such as memory constraints, computation, stern power, asymmetric data transmission, higher unreliability of sensor nodes and denser node deployment and presents several new challenges for the ultimate application and development of WSNs. In exacting, sensor nodes are operates without attendance and battery powered for a long period of time. In order to recharge or change these batteries of sensor nodes are quite difficult or impossible in most of the cases. In this regard, energy efficient routing protocols in wireless sensor networks are essential for exceeding the network lifetime of sensors. In this paper I present a comparatively survey of few......

Words: 3472 - Pages: 14

Protocols

...A protocol is a set of invisible compute rules that govern how an Internet document will be transmitted onto the screen. For two computers to communicate with one another, they must be able to understand one another through the same language. In order for computers to exchange information there must be a preexisting agreement as to how the information will be structured and how the sides will send and be received. The most important that defines the common networking protocols is the OSI known as Open Systems Interconnection. Introducing the TCP and the IP are two different protocols that are often linked together. The linking of several protocols is fairly common since the functions of different protocols may be complementary so that together they carry out particular tasks that are bases of operation layers. These suits of protocols are often used with many local area networks and carries out the basic operations of the Internet. Emailing also has its own set of protocols that has a variety of both for sending and receiving mail. The most common protocol for sending mail is the SMTP that is known for as Simple Mail Transfer Protocol. Then for receiving emails, the protocol being most commonly used is the Post Office Protocol, POP for short. Both the SMTP and the POP is used for managing the transmission for delivery of mail across the Internet. Web pages that are constructed to a standard method are called Hypertext Markup Language known as HTMO. The HTMP......

Words: 413 - Pages: 2

Protocols

...Protocols Just like wired and TCP/IP communications, wireless communications has its own set of protocols. These protocols exist to govern wireless communications for mobile phones, pagers, and other wireless devices (Protocols.com). Protocols that exist for wireless communications such as wireless session protocol, wireless transaction protocol, wireless transport layer security, and wireless datagram protocol each covering different aspects of the communications model (Protocols.com). Just like wired and TCP/IP communications, wired communication protocols exist in a wireless communications OSI model (Protocols.com). The wireless communications OSI model is divided into the following layers; application layer, session layer, transaction layer, security layer, transport layer (Protocols.com). Each layer of the wireless communications OSI model has is associated protocols. The necessity for different protocols for wireless communications comes from this “WAP Stack” which is the model for wireless data transfer (Protocols.com). Each layer of the model is governed by different protocols, and are divided as follows. * Application Layer Protocols * WAE or Wireless Application Environment * WTA or Wireless Telephony Application (Protocols.com) * Session Layer Protocols * WSP or Wireless Session Protocol (Protocols.com) * Transaction Layer Protocols * WTP or Wireless Transaction Protocol (Protocols.com) * Security Layer Protocols * WTLS or Wireless Transport Layer......

Words: 278 - Pages: 2

Protocols

...The four major protocols for circuit switching and packet switching are as follows: • X.25 • Frame Relay • ATM or Asynchronous Transfer Mode protocol • TCP/IP X.25 is probably one of the very first of packet switching protocols. It performs really well, especially considering how long it has been around. X.25 uses a virtual circuit approach, mainly using POTS or plain old telephone service lines, which are different from lines such as ISDN. The POTS lines are analog copper lines, so they can experience a lot of errors. But, once the lines have been connected, X.25 connections are really reliable. It's quite an efficient way to send packets across various data networks, with the X.25 protocol redundant error checking at each of the nodes. Frame relay is different because it doesn't require the need for analog wires or overhead wires like X.25 does. But this means that Frame Relay doesn't have the added framing and processing that X.25 has that provide guaranteed data transfers. It also doesn't have link to link reliability. So if a frame is corrupted, it is discarded, which is different than TCP as it detects and recovers any and all discarded frames. Asynchronous Transfer Mode protocol is used with either a coaxial cable, twisted pair, or fiber. ATM also takes advantage of a 53-btye cell, having 48 application bytes and 5 bytes are allocated for the ATM headers. ATM shows a lot more enhancements over Frame......

Words: 487 - Pages: 2

Survey

...3 reasons to pretest a survey: 1 verify an accurate ‘time to complete’ estimate; 2 input on flow; 3. Input on clarity of wording; 4.input on whether the questions and scales are understandable. 5 check the flow 6. Verify the skip logic; and 7 identify possible unanticipated responses 3 question response formats: Open –ended; scaled; categorical A decision on which scale to use will depend on Previous: scales used on Previous surveys (data trends are NB for awareness, customer service ratings, etc) Ability of Responder; Nature of The Property; Level of Detail desired; Medium of the survey (web, onlocation, phone; text; mail; etc) 4 Factors that determine maximum survey length: 1_Medium 2_ Respondent Involvement/Interest 3_Control Over Distractions 4_ Flow; 5_ Ease of Comprehension 6_scale uniformity 7-Levelof Ability of Responder (eg experienced survey panel members) also 8 presence of a fieldworker to coax / coach a respondent through; 9. presence of a compelling incentive N.O.I.R. refers to: Nominal; Ordinal; Interval; Ratio the scale that captures the greatest detail is Ratio. a respondent experiences from spending too much mental effort: Survey Fatigue To measure mood, this kind of scale is often used: Semantic Differential Mentioning a brand in a survey list too early can result in this type of error: Order Bias Some Principals of survey flow: 1 Screening or Qualification questions up front; 2 General to Specific overall; 3 Easy to Difficult ...

Words: 283 - Pages: 2

A Survey of Existing Qos Issues of Current Existing Transport Level Protocols

...A Survey of existing QoS issues of current existing transport level protocols Challenges to Enable Quality of Service (QoS) in TCP Student Name: Fung Yin Man (13120129d) Yu Hui CheungYu (13001663d) Date: 17/10/2014 Contents 1. Introduction - the brief view of p4 2. Overview - the p4-8 1. p5 2. p6-7 3. p7-8 3. Description of main challenging issues and technologies    P9-10 4. Review of existing ____________ and developments P11 5. Future develop direction of p12 6. Conclusion p13 7. Reference p13 7. ABSTRACT Nowadays, TCP is a widely used transport protocol at Layer 4 in the World Wide Web for internet connection because it provides flow control and traffic retransmission in case of packet loss. In order to fulfill the highly demand of the traffic and there has been a dramatic increase in the processing power of workstation together with bandwidth of high speed network, additional advanced control mechanism/technologies should be applied to govern and provide rules to guarantee the service level of different kind of application running in the internet. This paper will simply introduce the importance and provide overview of Quality of Service (QoS) for transport level protocol especially in the area of TCP. Also, we will discuss the challenge of implementing the QoS in TCP which include but not limit to the fairness of sharing the bottle neck, how to......

Words: 2727 - Pages: 11

Survey

...Survey of Open Source Integrated Library System in Thai University Libraries in Bangkok and Pathumthani by Pranee Kiriyanant The Center for Southeast Asian Studies (CSEAS) Kyoto University 2012 Survey of Open Source Integrated Library System in Thai University Libraries in Bangkok and Pathumthani by Pranee Kiriyanant Survey of Open Source Integrated Library System in Thai University Libraries in Bangkok and Pathumthani / Pranee Kiriyanant. Kyoto : The Library of Center for Southeast Asian Studies, Kyoto University, 2012 CSEAS Bibliographical Series No. 10 ISBN 978-4-906332-07-6 Published by The Center for Southeast Asian Studies Library Kyoto University 46 Shimoadachi-cho, Yoshida Sakyo-ku, Kyoto 606-8501, Japan Copyright © 2012 Pranee Kiriyanant Contents Acknowledgments Abstract Abstract (in Thai language) Chapter 1 Introduction Chapter 2 Literature Review Open source software Integrated library system History of open source software Origin of open source software Adoption of open source software in libraries Open source software use in Thailand Descriptions of open source software Brief descriptions of integrated library system products Advantages and Disadvantages of open source software Chapter 3 Research method Chapter 4 Results Chapter 5 Conclusion References Appendix Appendix A: Request letter for participation (in Thai language) Appendix B: Request letter for participation (translation copy in......

Words: 19644 - Pages: 79

Protocols

...LAYER PROTOCOLS • IP (Internet Protocol) • ICMP (Internet Control Message Protocol) • ARP (Address Resolution Protocol) • RARP (Reverse Address Resolution Protocol) 4.7.1 The IP PROTOCOL • IP represents the heart of the Internet Protocol suite • Provides the main service of the layer: data transmission in connectionless mode – datagram IP Header Format IP Header Format (Including user data, this makes an IP packet) IP Header fields: • Version - Indicates the version of IP currently used (now 4); • IP Header Length - Indicates the datagram header length in 32-bit words (value = 5); • Type-of-service - Specifies how a particular upper-layer protocol would like the current datagram to be handled. Datagrams can be assigned various levels of importance through this field; • Total length - Specifies the length of the entire IP packet, including data and header, in bytes. • Identification - Contains an integer that identifies the current datagram (sequence number). This field is used for re-assembling the datagram fragments; • Flags - A 3-bit field for fragmentation control:  000 - last fragment;  001 - not last fragment;  010 - the fragmentation not allowed. • Fragment offset - measured in double-words (offset from main datagram); • Time-to-live - Maintains a counter that gradually decrements down to zero, at which point the datagram is discarded. This keeps packets from looping endlessly; • Protocol - Indicates which upper-layer protocol......

Words: 1379 - Pages: 6

Internet Protocols

...INTERNET PROTOCOLS & APPLICATIONS * TCP/IP: The TCP/IP suite of protocols has become the dominant standard for internetworking. TCP/IP represents a set of public standards that specify how packets of information are exchanged between computers over one or more networks. * IPX/SPX: Internetwork Packet Exchange/Sequenced Packet Exchange is the protocol suite originally employed by Novell Corporation’s network operating system, NetWare. It delivers functions similar to those included in TCP/IP. Novell in its current releases supports the TCP/IP suite. A large installed base of NetWare networks continue to use IPX/SPX. * NetBEUI: NetBIOS Extended User Interface is a protocol used primarily on small Windows NT networks. NetBEUI cannot be routed or used by routers to talk to each other on a large network. NetBEUI is suitable for small peer-to-peer networks, involving a few computers directly connected to each other. It can be used in conjunction with another routable protocol such as TCP/IP. This gives the network administrator the advantages of the high performance of NetBEUI within the local network and the ability to communicate beyond the LAN over TCP/IP. * AppleTalk: AppleTalk is a protocol suite to network Macintosh computers. It is composed of a comprehensive set of protocols that span the seven layers of the Open Systems Interconnection (OSI) reference model. The AppleTalk protocol was designed to run over LocalTalk, which is the Apple LAN physical topology...

Words: 1711 - Pages: 7

Cartagena Protocol

...Proto/ang 11/13/2000 3:39 PM Page 181 CARTAGENA PROTOCOL ON BIOSAFETY TO THE CONVENTION ON BIOLOGICAL DIVERSITY TEXT AND ANNEXES Proto/ang 11/13/2000 3:39 PM Page 182 Cartagena Protocol on Biosafety CARTAGENA PROTOCOL ON BIOSAFETY TO THE CONVENTION ON BIOLOGICAL DIVERSITY TEXT AND ANNEXES Montreal, 2000 Proto/ang 11/13/2000 3:39 PM Page 184 Cartagena Protocol on Biosafety Cartagena Protocol on Biosafety Introduction Montreal, 2000 Copyright © 2000, Secretariat of the Convention on Biological Diversity ISBN: 92-807-1924-6 This publication may be reproduced for educational or non-profit purposes without special permission from the copyright holders, provided acknowledgement of the source is made. The Secretariat of the Convention would appreciate receiving a copy of any publications that uses this publication as a source. For bibliographic and reference purpose this publication should be referred to as: Secretariat of the Convention on Biological Diversity (2000). Cartagena Protocol on Biosafety to the Convention on Biological Diversity: text and annexes. Montreal: Secretariat of the Convention on Biological Diversity. This booklet contains the text of the Cartagena Protocol on Biosafety to the Convention on Biological Diversity, which starts on page 2. Published by the Secretariat of the Convention on Biological Diversity For further information, please contact: The Secretariat of the Convention on Biological Diversity World Trade Centre 393 St. Jacques, Suite......

Words: 9898 - Pages: 40

Product Protocol

...PROTOCOL APPROVAL PAGE PROTOCOL # | PRC TBD | REVISION: | A | DATE: | Dec 2009 | COMPLETION REPORT # | PRC TBD | MASTER VALIDATION PLAN # | NA | | | | | TITLE: Houdini/ACE Packaging Inquiry Transfer | | TYPE: Product Inquiry Transfer | | PROJECT NAME: Houdini | | PROJECT LEADER: TBD | | Product Code: TBD Product Number: Batch Number: NA ORIGINATOR NAME: | TBD | EXTENSION: | TBD | TITLE: | Quality Engineer | SITE: | | APPROVAL STATUS: Review & Approval Status (Priority or Normal): | | | Status | Approval Due Date: | | | Due Date | APPROVAL LIST: FUNCTION | NAME (PRINT) | SIGNATURE | DATE | DISPOSITION (ACCEPT/REJECT) | Independencia QS Manager | | | | | Albuquerque QS Manager | | | | | Customer Complaint Manager | | | | | Energy BU Manager | | | | | Regulatory Reporting Specialist | | | | | Customer Quality Packaging Engineer | | | | | DISTRIBUTION LIST: (create as necessary) 1 Note: For Sedation Systems approvals, an electronic approval page will be generated in place of the hardcopy signature page (reference WE001186 and WE001187) 0 **Note 2 (Juarez Only): Planners must sign for notification only. REVISION | Change Description | A | Original Issue | | | 1.0 1.0 PURPOSE 2.1 The purpose of this protocol is to establish the......

Words: 1356 - Pages: 6

Essential Protocol

...Essential Network Protocols Modern computer networking leverages many components to enable computers on one network (or opposite side of the world) to communicate with a computer on a different network (or other side of the world). Of the components that enable network communication, there are several in the TCP/IP suite of protocols that work in the background to provide reliable Internet connection and data transport every day for millions of computers worldwide. Internet protocol or IP is an essential component of modern internetwork communication. IP is a connectionless protocol that provides neither fault tolerance nor error correction. It is also not responsible for the setup or teardown of network communications. The primary job assigned to IP is logical addressing and routing as it resides at layer 3 (the Network layer) of the OSI model. While every host on the network has a hardware address (also called a MAC address), hosts can only communicate with other hosts in the same broadcast domain using MAC addressing. For internetwork communication, a logical, unique network address is required so that the devices forwarding network traffic (primarily routers), can determine the source and destination and best route to forward data packets. The ARP or Address Resolution Protocol enables devices on a single network, in a single broadcast domain, to find the hardware or MAC address of a device on the network given the IP......

Words: 1258 - Pages: 6

Network and Protocols

...Section 11-2 1. List two advantages of wireless networking.      1. User mobility in the workplace.      2. A cost-effective networking media for use in areas that is difficult or too costly to wire. 2. What are the three areas defined for the IEEE 802.11 standard?      1. Physical Layer (PHY)           The method of transmitting the data, which may be either RF or infrared (although infrared is rarely used.)     2. Medium Access Control (MAC)           I. The reliability of the data service.           II. Access control to the shared wireless medium.           III. Protecting the privacy of the transmitted data.     3. MAC management protocols and services           I. Authentication, association, data delivery, and privacy. 3. What is an ad hoc network?      1. In this network, the wireless clients (stations) communicate directly with each other. This means the clients have recognized the other stations in the WLAN and have established a wireless data link.      2. The fundamental topology of the WLAN is the Basic Service Set (BSS). This is also called the independent Basic Service Set, or ad hoc network. 4. What is the purpose of an Extended Service Set?      1. By adding multiple access points to the network, the range of mobility of a wireless client in the LAN is extended.      2. Definition - The use of multiple access points to extend user mobility Hand-off. 5. What are the four physical layer technologies being......

Words: 1687 - Pages: 7