This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

IT

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

 

IT

 

 

 

 

 

 

 

Contents

Introduchttps://essaygroom.com/part-a-3/tion. 3

Motivation. 3

Routing Protocol Analysis. 3

Low-Energy Adaptive Clustering Hierarchy (LEACH). 3

Power-Efficient Gathering in Sensor Information System (PEGASIS). 4

References. 6

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Part A

Introduction

The network is an important part of building communication through digital platforms. Information is usually shared over the network in the form of packets known as an atomic unit of data through nodes. Routing is a process on which data packets are transferred from source to destination node in hops so that the most optimal path could be chosen for faster delivery [1]. For routing to accomplish, networks place router and switches as well as routing protocols and algorithms. The purpose of this report is to discuss and analyze routing protocols over the network.

Motivation

One of the primary motivations for studying routing protocol is understanding their benefits to certain areas. The wireless sensor network is made up of lower cost, lower power, and wireless sensor nodes, as well as wireless communication and computation [2]. It is important to understand which routing protocols in WSN are suitable due to several network constraints, including energy, bandwidth, central processing unit, and storage.

Routing Protocol Analysis

Low-Energy Adaptive Clustering Hierarchy (LEACH)

Routing Mechanism

The aim of this protocol is to save the energy consumption at the time of cluster formation on WSN. LEACH protocol works on the principle arrangement from a hierarchical routing protocol and works as a self-organized routing mechanism. Furthermore, there are two phases, including cluster set stage and steady-state storage stage, so that an unnecessary energy consumption charge could be removed. In the first phase cluster set the stage, sensor nodes without any prior triggers form cluster heads randomly followed by cluster arrangements [3]. While, cluster head representing clusters goes forward by taking data from all nodes and accumulating together so that data to the base station is sent [4]. In the second stage of the steady-state storage stage, data transfer takes place by compression of all gathered information towards the base station.

Source [3]

Advantages in wireless sensor networks

  • Each cluster node has equal energy consumption making remaining energy storage and control power [4].
  • LEACH protocol is a self-organized distributed protocol that does not require control information from the base station as well as the overall wireless sensor network it is working on.
  • It has a single-hop routine, which saves more energy effectively.

Limitations in wireless sensor networks

  • Damage of cluster head makes a cluster of no use for data collection.
  • Cluster division is randomly done, making uneven distribution of cluster frequent [4].

Power-Efficient Gathering in Sensor Information System (PEGASIS)

Routing Mechanism

Rather than a clustered approach, this protocol follows an approach, including chain based mechanisms. As compared to the previous one, routing protocol arrange themselves for the formation of a chain for sensor nodes. There are two important steps that combinedly implement PEGASIS protocol so that it could be implemented for wireless sensor networks. In the first step chain construction, the link is built from base station to form a full node connected with each other; while, in the second step gathering data, leader from each group is randomly selected to create a head node from which other nodes are again connected [6]. Once the leader or head node is selected, data is gathered effectively by-passing token that has smaller size and lack of energy consumption. Hence, this protocol is effective for WSN due to lower energy consumption as well as reconstruction of the chain if a node is failed.

Source [6]

Advantages in wireless sensor networks

  • The transmission distance for a node is less.
  • Energy dissipation for each node is balanced among the sensor node [5].

Limitations in wireless sensor networks

  • In this protocol, only one head node is selected, making data transmission redundant [5].
  • One node head selection creates issues for network delay making information sharing from sensor nodes extremely difficult.

 

 

 

References

[1]J. Kurose and K. Ross, Computer Networking. Harlow, United Kingdom: Pearson Education Limited, 2017.

[2]S. Singh, M. Singh, and D. Singh, “A survey of Energy-Efficient Hierarchical Cluster-based Routing in Wireless Sensor Networks,” International Journal of Advanced Networking and Application (IJANA), vol. 2, no. 2, pp. 570–580, 2010. [Accessed 4 April 2020].

[3]L. Yadav and C. Sunitha, “low energy adaptive clustering hierarchy in wireless sensor network (LEACH).”, international journal of computer science and information technologies, vol. 5, no. 3, pp. 4661-4664., 2014. [Accessed 4 April 2020].

[4]A. Abu Salem and N. Shudifat, “Enhanced LEACH protocol for increasing a lifetime of WSNs”, Personal and Ubiquitous Computing, vol. 23, no. 5-6, pp. 901-907, 2019. Available: 10.1007/s00779-019-01205-4.

[5]Patwant Singh and Satbir Singh, “Power-Efficient Gathering in Sensor Information Systems based on Ant Colony Optimization (ACO) in WSN,” International Journal of Engineering Research and, vol. 4, no. 06, 2015. Available: 10.17577/ijertv4is060830.

[6]Patwant Singh and Satbir Singh, “Power-Efficient Gathering in Sensor Information Systems based on Ant Colony Optimization (ACO) in WSN,” International Journal of Engineering Research and, vol. 4, no. 06, 2015. Available: 10.17577/ijertv4is060830.

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask