TEEN And CH Protocols

Improved Essays
TEEN and LEACH Protocols
LEACH and TEENfollow self-organizing and adaptive CH selection criteria. In setup phase, CH is elected on the bases of following threshold equation1 [32]; Fig.3 and Fig.4.
T(n)={■(p/(1-p(rmod 1/p) )&ifn∈G@0&otherwise)┤ (1) wherep is the desired number of CHs, r is the current round and G is the set of nodes that have not been CH in the current epoch. Epoch is the number of rounds for a CH, after which again it become eligible to become a CH. Each node generates a random number between 0 and 1, if the number is less than the node’s threshold, then this sensor node becomes a CH. After the election of CHs, each CH advertises its status using CSMA MAC protocol. Node selects its CH, on the bases of RSSI and link quality
…show more content…
DEEC Protocol
DEEC [32-35] is another enhancement of LEACH for multi-level heterogeneous environment with respect to level of energies in WSNs. In SEP, energy distribution for two levels, advance nodes and normal nodes, whereas, DEEC introduces multi-level heterogeneity for maximizing K. The nodes having greater residual energy have more right to become a CH. Therefore, CH formation in DEEC is based on residual energy of entire network and residual energy of the node that wants to become a CH. SEP calculates optimum number of CHs from equation 4 and 6 for advance and normal nodes, respectively. While, in DEEC, for multilevel heterogeneous node energy environment, nodes with higher residual energy attains more chances to become a CH, Fig.6. Therefore, DEEC calculate optimum number of CHs for each round from the two
…show more content…
To evade that each node needs to have the global knowledge of the networks, DDEEC like DEEC estimate the ideal value of network lifetime, which is used to compute the reference energy that each node should expend during each round. In the scheme, the network is organized into a clustering hierarchy, and the cluster heads collect measurements information from cluster nodes and transmit the aggregated data to the base station directly. Moreover, the authors have supposed that the network topology is fixed and no-varying on time, Fig.7. The difference between DDEEC and DEEC is localized in the expression which define the probability to be a cluster head for normal and advanced nodes. Simulation results show that the protocol performs better than the SEP and DEEC in terms of network lifetime and first node

Related Documents

  • Decent Essays

    Nt1310 Unit 1 Exercise 1

    • 551 Words
    • 3 Pages

    In Reno, when the sender receives a non-duplicate ACK it sets congestion window(cwnd) to slow-start threshold(ssthresh), terminates fast-recovery, and resumes normal congestion avoidance phase.…

    • 551 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    As such it will provide a 60 GHz installment in the successful 802.11 / Wi-Fi family. The key advantage of IEEE 802.11ad over the other standardization activities in the 60 GHz arena is that it builds on the already existing strong market presence of Wi-Fi in the 2.4/5 GHz bands. The 802.11ad task group also initially developed a functional requirements document , evaluation methodology document , and channel model document .…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 5 Lab Report

    • 362 Words
    • 2 Pages

    To perform the Radio access network using two methods: a) Using Wireless Insite (commonly known as built in post processing). b) Using MATLAB (commonly known as the post-processing). c) Cell association and cell dominance formation using wireless Insite to get UE to be associated(served) with single femtocell eNB(preferred to be robust signal) and viewing it (UE). Fig2. Cell association for the UEs 4.…

    • 362 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Additional wellbeing has been incorporated into this outline by making a "loopbacks" to the zero tally, with a yield of zero if the information state to the counter is inconceivable for the present number that it is on (for instance, a data condition of 010—NS, when the present check is 101—5, the NS tally ought to have as of now circled back). By circling back to zero, this will give the framework's movement express a more drawn out time to determine an "undetermined" state. Test Strategy: With a specific end goal to test the counter outline, we have chosen to test just a predetermined number of cases and test to see whether the configuration a) tallies accurately, and b) sends the yield T high at the right times. To do this, we will pick two or three states to…

    • 869 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    GUI (Graphical User Interface), Wireshark allows a live view of the network traffic on the network card it is listening to. 2.9 Our approach to improving the throughput of QoS with SDN: 2.9.1 Setup and run Mininet and controller The first step installs Mininet in Ubuntu operation system, we are don't using a virtual machine and then install Ryu controller in OS. 2.9.2 Create custom network…

    • 464 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 6 Essay

    • 565 Words
    • 3 Pages

    802.7 IEEE 802.7 is a sub-standard of the IEEE 802 which covers broadband local area networks with a coaxial cable. This standard was developed for cable internet companies. e. 802.11 (a, b, g, n) – Wireless Network Standards 802.11 is the collection of standards setup for wireless networking. They include four different standards including; 802.11a, 802.b, 802.11g and the most recent standard 802.11n. Each standard uses a frequency to connect to the network and has a defined upper limit for data transfer speeds.…

    • 565 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 6 Blockchain

    • 520 Words
    • 3 Pages

    Let’s assume for example that a node only has the genesis block. It will then receive an inv message from its peers containing the hashes of the next 500 blocks in the chain. It will start requesting blocks from all of its connected peers. It requests for spreading the load and en‐ suring that it doesn’t overwhelm any peer with requests. The node keeps track of how many blocks are ‘in transit’ per peer connection, meaning blocks that it has requested but not received, checking that it does not exceed a limit (MAX_BLOCKS_IN_TRANS‐…

    • 520 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3

    • 408 Words
    • 2 Pages

    1) Cluster size is inversely proportional to channel capacity,larger the cluster size the smaller the number of users. Cluster size is also inversely proportional to co-channel interference i.e higher the cluster size less is co-channel interference. When capacity of the channel is increased the co-channel interference also increases. 2) The possible solutions to increase the capacity of cellular system are: a) Cell Sectorization b) Cell Splitting c…

    • 408 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Pm3110 Unit 4 Test Paper

    • 1148 Words
    • 5 Pages

    Each virtual way is dispensed an altered measure of transfer speed. Virtual ways don't powerfully change their data transfer capacities past what has been assigned. 4. What are the three layers of IEEE 802 reference models? What are their major functions?…

    • 1148 Words
    • 5 Pages
    Great Essays
  • Great Essays

    Data Communication and Net-Centric Computing (COSC 2061) Assignment 2 Student Name: Weibin Zhong Number: s3503887 Introduction This report is identifying what are FDMA, TDMA and CDMA and how to maintain the communication seamlessly and the roaming service as well as the cost of roaming service. Furthermore, the 1G, 2G, 3G and 4G generations will be discussed.…

    • 1458 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Furthermore, guidelines considering the selection of algorithms and input parameters for the MHNSGA algorithm are resulted from the analysis of real-world databases. When it comes to solving the controller placement problem with tens of millions placements for which performing the exhaustive evaluation requires a considerable amount of time and memory budget, our proposed heuristic approach is an appropriate choice. As described before, for such these large-scale instances, it is only possible to calculate an upper bound for evaluated placements and nothing can be expressed about the obtained accuracy of the heuristic algorithm. This is due to not existing the actual Pareto optimal solutions and hence, the absence of reference data to compare.…

    • 404 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Paxos is theoretical achievement but not necessarily suited to build practical distributed systems. Log management is simplified in Raft while Paxos do not care about log replication. Paxos algorithm does not guarantee the progress but Raft in fact is more promising when it comes to progress. Though raft protocol is complex but it is prescriptive about the timeouts in electing a…

    • 959 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    For this section of the report I will explain the management tools and technologies used for communicating through network to network, I will also give example on how these tools are used especially in business. Operating systems are simple software which will enable the user to be able to access function to the computer itself, the process is an input and output process where the user will input a function, e.g. through keyboard, and the output will be shown through the monitor. There are many different types of operating systems and depending on your hardware (computer), you can have a different operating systems, in different electronic devices, from computers to mobile phones and tablets. Here are the most common computer operating system:…

    • 2216 Words
    • 9 Pages
    Improved Essays
  • Great Essays

    Our Wi-Fi network is based on the IEEE 802.11 b/g standards, which is the most commonly used…

    • 884 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    The purpose of this paper is to describe the network configuration, explaining the role of each component and connection of the scenario provided. Specifically, I will discuss the functions of the components and describe how they contribute to the network. Along with this I will modify the appropriate components of the provided database with the information regarding the employees’ computers and the upgrade. Network Configuration Network configuration allows a system admin to set up a network to use to communicate. Per Techopedia, “Network configuration is the process of setting a network 's controls, flow and operation to support the network communication of an organization and/or network owner.”…

    • 923 Words
    • 4 Pages
    Improved Essays