A survey – Energy Efficient Routing protocol for Homogenous & Heterogeneous Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 5
Abstract
The wireless sensor networks have gained a lot of grasp in the previous years due to various encroachments in this field. One of the major challenges faced by WSNs is the problem of energy efficiency. Various routing protocols have been used for improving the lifetime of WSNs. In this paper, we have discussed various protocols for homogeneous as well as heterogeneous sensor networks. For homogeneous networks, LEACH, LEACH-C and PEGASIS protocols are used. For heterogeneous networks, EDDEEC and BEENISH protocols are used. Theoretical analysis shows that heterogeneous protocols results in better throughput, stability and improved lifetime of network.
Authors and Affiliations
Aakanksha Sharma, Kamaldeep jangra
Power Management Strategy In Hybrid PV-FC And Wind- Power Generation Systems By Using Multi Input Single-Control (MISC) Battery
Global energy consumption is dramatically increasing due to higher standard of living and the increasing world population. The world has limited fossil and oil resources. As a consequence, the need for renewable ener...
An Advanced Anti Phishing Approach Based On Two-Tier Validation
Phishing on the web pages is an attempt by an individual or a group of hackers seeking to retrieve an individual’s personal private information such as passwords, usernames or confidential information, credit card inf...
Hopfield Neural Network as Associated Memory with Monte Carlo- (MC-)Adaptation Rule and Genetic Algorithm for pattern storage
This paper describes the performance analysis of Hopfield neural networks by usinggenetic algorithm and Monte Carlo-(MC-) adaptation learning rule.A set of five objects has been considered as the pattern set. In the...
A Novel Way To Automatically Mine Comparable Entities From Comparative Questions
A comparison activity usually contains search for applicable web pages containing information about the targeted products, find competing products, read reviews and identify pros and cons. In this paper we focus on f...
Intelligent Encoding of Packets Against Jamming Attacks in Wireless Network
Wireless network never has certain limited boundaries that can’t be extended due to this nature security flaws may get developed. When someone breaks into wireless network system that person takes advantage of lapses...