An analysis of LEACH Protocol in Wireless Sensor Network: A Survey
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2015, Vol 6, Issue 3
Abstract
Wireless Sensor Network is composed of numbers of tiny sensors (nodes) which have the capability of gathering the data about environmental activities and making certain computations on them so that they can be communicated to the next node & finally to the Base Station. All the sensors work in co-ordination with each other to make communication successful. These sensors have to be continuously in active mode in order to receive and transmit data which increases their energy requirement. As these sensors are battery-powered, this continuous monitoring activity reduces their lifespan. Efficient management of energy is a critical requirement for the optimal design of a wireless sensor network. Thus, a protocol is critically needed that can make the wireless sensor network energy efficient. In this paper a detailed view and analysis of LEACH Protocol will be discussed. LEACH Protocol is a cluster-based hierarchical protocol which creates an energy balance in the network, saves the node energy and hence increases the lifetime of the network.
Authors and Affiliations
Sangita Vishwakarma
A Brief Introduction of Different type of Security Attacks found in Mobile Ad-hoc Network
A structure less network is called the mobile ad-hoc network, where all the nodes are independent. In MANET, there is a collection of mobile nodes that from temporary network. Those nodes are act like a host or like a ro...
BASE STATION DRIVEN ROUTING PROTOCOL EVALUATION USING TOSSIM
Routing protocols play an important role in wireless sensor networks. There are primarily two types of protocols viz. data collection and data dissemination protocols. This paper compares two collection protocols: Base S...
RDF method to improve ontology using RDF algorithm
A Relation description frame work we used semantic based collections using crawlers. The semantic matching and relevancy are made and improved results are obtained. RDF helps us to generate a hierarchy based tree structu...
Implementation of Vehicle License Plate Recognition Using Canny Edge Detection
Vehicle number plate identification based on digital image processing is a vital area of research ongoing in present scenario. It offers various applications expanding through many fields. This technique may be used for...
Classification of Image Steganography Techniques in Spatial Domain: A Study
Steganography is a method of secret communication wherein the very existence of communication is hidden. During the last few decades there have been a tremendous development in digital image steganography and a large num...