TEEN And CH Protocols

Improved Essays
TEEN and LEACH Protocols
LEACH and TEENfollow self-organizing and adaptive CH selection criteria. In setup phase, CH is elected on the bases of following threshold equation1 [32]; Fig.3 and Fig.4.
T(n)={■(p/(1-p(rmod 1/p) )&ifn∈G@0&otherwise)┤ (1) wherep is the desired number of CHs, r is the current round and G is the set of nodes that have not been CH in the current epoch. Epoch is the number of rounds for a CH, after which again it become eligible to become a CH. Each node generates a random number between 0 and 1, if the number is less than the node’s threshold, then this sensor node becomes a CH. After the election of CHs, each CH advertises its status using CSMA MAC protocol. Node selects its CH, on the bases of RSSI and link quality
…show more content…
DEEC Protocol
DEEC [32-35] is another enhancement of LEACH for multi-level heterogeneous environment with respect to level of energies in WSNs. In SEP, energy distribution for two levels, advance nodes and normal nodes, whereas, DEEC introduces multi-level heterogeneity for maximizing K. The nodes having greater residual energy have more right to become a CH. Therefore, CH formation in DEEC is based on residual energy of entire network and residual energy of the node that wants to become a CH. SEP calculates optimum number of CHs from equation 4 and 6 for advance and normal nodes, respectively. While, in DEEC, for multilevel heterogeneous node energy environment, nodes with higher residual energy attains more chances to become a CH, Fig.6. Therefore, DEEC calculate optimum number of CHs for each round from the two
…show more content…
To evade that each node needs to have the global knowledge of the networks, DDEEC like DEEC estimate the ideal value of network lifetime, which is used to compute the reference energy that each node should expend during each round. In the scheme, the network is organized into a clustering hierarchy, and the cluster heads collect measurements information from cluster nodes and transmit the aggregated data to the base station directly. Moreover, the authors have supposed that the network topology is fixed and no-varying on time, Fig.7. The difference between DDEEC and DEEC is localized in the expression which define the probability to be a cluster head for normal and advanced nodes. Simulation results show that the protocol performs better than the SEP and DEEC in terms of network lifetime and first node

Related Documents

  • Improved Essays

    3.2.2 GloMo Sim GloMoSim is a scalable simulation atmosphere for wired and wireless network systems, formulated by PCL (Parallel Calculation Laboratory) of UCLA ( the University of California in Los Angeles). It utilizes Parallel Simulation atmosphere for Complex System (PARSEC) that is a C-based simulation language for parallel and sequential execution of Discrete event simulation model. Glomosim Supports protocol for a purely wireless network. Advantages:- Network model scalability can be increased up to thousands of nodes.…

    • 1180 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    With this, a compromised node running malicious code disguised as a legitimate node continuously seeks to find ways to disrupt communication and paralyze the network. However, node compromise attack is severe when the base node is compromised. Therefore, different activities like stealing secrets from the encrypted data, reporting wrong and misleading information to the network, reporting other legitimate nodes as compromised nodes, launching different routing attacks takes place. The best way to counter node compromise is to utilize code testing schemes which employ an optimal program verification process to verify the memory of a sensor node by calculating the hash values of randomly selected memory regions.…

    • 869 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    GUI (Graphical User Interface), Wireshark allows a live view of the network traffic on the network card it is listening to. 2.9 Our approach to improving the throughput of QoS with SDN: 2.9.1 Setup and run Mininet and controller The first step installs Mininet in Ubuntu operation system, we are don't using a virtual machine and then install Ryu controller in OS. 2.9.2 Create custom network…

    • 464 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Additional wellbeing has been incorporated into this outline by making a "loopbacks" to the zero tally, with a yield of zero if the information state to the counter is inconceivable for the present number that it is on (for instance, a data condition of 010—NS, when the present check is 101—5, the NS tally ought to have as of now circled back). By circling back to zero, this will give the framework's movement express a more drawn out time to determine an "undetermined" state. Test Strategy: With a specific end goal to test the counter outline, we have chosen to test just a predetermined number of cases and test to see whether the configuration a) tallies accurately, and b) sends the yield T high at the right times. To do this, we will pick two or three states to…

    • 869 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    4. rcv() fcn, which will store the passed string argument internally. The fcn will also output the string (message) prefaced by "Node rcvd: ", where is the node object's name. Eg, “ Node B rcvd: 10010”. 5.…

    • 888 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In the next cluster setup phase, the member nodes inform the CH that they become a member of that cluster with "join packet" has their IDs utilizing CSMA. After the cluster-setup sub-phase, the CH knows the no. of member nodes and their IDs. Depending on all messages obtained within the cluster, the CH produces a TDMA schedule, take a CSMA code in a random way, and forward the TDMA table to cluster members. After that steady-state phase starts.…

    • 547 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 9 Final Paper

    • 922 Words
    • 4 Pages

    For instance process might fail and the majority not include in this case when the process restart it uses log to retrieve the last decided value and continue with the protocol. when leader crashes the other process wait for timeout then other process makes itself as a leader and try to coordinate transaction. Here the problem occur when two leaders proposes different value then paxos assigns orders to the leaders to distinguish current and older…

    • 922 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    In data communication, they are always striving to increase throughput, this would include allowing nodes to transmit information over a single broadcast link without interfering with each other. To achieve this, multiple access protocols coordinate the transmission. The three classes of multiple access protocols are, random access, taking-turns and channel partitioning. With random access protocol, each node tries to randomly to use the complete broadcast link, without any regard to the other nodes. Taking-turns protocol uses some type of turning mechanism, which designates which node is allowed to transmit.…

    • 944 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    For this section of the report I will explain the management tools and technologies used for communicating through network to network, I will also give example on how these tools are used especially in business. Operating systems are simple software which will enable the user to be able to access function to the computer itself, the process is an input and output process where the user will input a function, e.g. through keyboard, and the output will be shown through the monitor. There are many different types of operating systems and depending on your hardware (computer), you can have a different operating systems, in different electronic devices, from computers to mobile phones and tablets. Here are the most common computer operating system:…

    • 2216 Words
    • 9 Pages
    Improved Essays
  • Superior Essays

    Nt1330 Unit 7 Exercise 1

    • 756 Words
    • 4 Pages

    As shown in figure 8. – Red: Threshold of the parameters of the calculated result value. – Black: Calculated result value by using the Proactive Algorithm. – Green: Temperature of the individual nodes. – Blue: CPU Utilization of the individual nodes.…

    • 756 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Furthermore, guidelines considering the selection of algorithms and input parameters for the MHNSGA algorithm are resulted from the analysis of real-world databases. When it comes to solving the controller placement problem with tens of millions placements for which performing the exhaustive evaluation requires a considerable amount of time and memory budget, our proposed heuristic approach is an appropriate choice. As described before, for such these large-scale instances, it is only possible to calculate an upper bound for evaluated placements and nothing can be expressed about the obtained accuracy of the heuristic algorithm. This is due to not existing the actual Pareto optimal solutions and hence, the absence of reference data to compare.…

    • 404 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Base station(BS):A Base station is a signal transmitter or receiver that controls the local wireless network and may also be the gateway between external environment and WSN.Base station plays a major role in WSN security. BS will have more communicating information to BS or EA. Eaves Dropping…

    • 637 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Our Wi-Fi network is based on the IEEE 802.11 b/g standards, which is the most commonly used…

    • 884 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Nt1210 Unit 3 Assignment

    • 1204 Words
    • 5 Pages

    But if the central computer (the server) goes down or the hub or switch goes down then the entire network will fail. Still when the central computer goes down it will not affect the data of the other computers, so when the central computer is repaired again the network will start to work again. The main difference between the Star topology and the other two topology is that here when a workstation goes down, other than the server, the network will still be working, where in the other topologies there is no main server so when a workstation goes down it will also take down the whole network with it. This is the main important advantage for which we selected the Star topology. Other than this the Star topology is very high performing as no data collisions can occur.…

    • 1204 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    The purpose of this paper is to describe the network configuration, explaining the role of each component and connection of the scenario provided. Specifically, I will discuss the functions of the components and describe how they contribute to the network. Along with this I will modify the appropriate components of the provided database with the information regarding the employees’ computers and the upgrade. Network Configuration Network configuration allows a system admin to set up a network to use to communicate. Per Techopedia, “Network configuration is the process of setting a network 's controls, flow and operation to support the network communication of an organization and/or network owner.”…

    • 923 Words
    • 4 Pages
    Improved Essays