CLUSTER–ID ROUTING SCHEME IN WIRELESS SENSOR NETWORKS
Journal Title: Indian Journal of Computer Science and Engineering - Year 2011, Vol 2, Issue 1
Abstract
One of the major issues in wireless sensor network is developing an energy-efficient routing protocol. Since the sensor nodes have limited available power, energy conservation is a critical issue in wireless sensor network for nodes and network life. There are several existing routing protocols to solve this problem. LEACH (Low-Energy Adaptive Clustering Hierarchy), a clustering-based protocol that utilizes randomized rotation of local cluster base stations (cluster-heads) to evenly distribute the energy load among the sensors in the network. LEACH has a drawback that the cluster is not evenly distributed due to its randomized rotation of local clusterhead. A new routing protocol has been proposed known as CIDRSN (Cluster ID based Routing in Sensor Networks). CIDRSN takes the cluster-ID as next hop address in routing table and eliminate the cluster formation phase and routing phase in each round. Both cluster formation phase and routing phase are only executed during the initialization of network. CIDRSN constructs clusters based on the number of cluster members. The cluster topology in the network is distributed more equally through our cluster constructing. And cluster heads for the next round will be elected based on the remaining battery level of the nodes. All routes are based on cluster-ID rather than cluster head ID. This reduces the energy consumption and increases network life time.
Authors and Affiliations
Y. Srinivas , J. Vijayasekhar , Dr. R. Satya Prasad , N. Vamsi Krishna
DATA MINING: A ‘RIM’ ALGORITHM FOR SPYWARE DETECTION WITH PRUNING
The aim of this paper is to employ the principles of data mining and classify a new algorithm. In this method, we have proposed a new anti-spyware system (Spyware Detection), which is capable for classifying spyware file...
REGRESSION TESTING : TABU SEARCH TECHNIQUE FOR CODE COVERAGE
Software testing is one of the most expensive and critical activities which carries out every time in order to give a best quality of a software product. Here the regression testing which is based on testing mechanism is...
Implementation of Calendar Chart in CICS Mainframes for Business Analysis
This paper provides a business solution to implement Calendar Chart in Mainframes for analysing the progress of a Bank by giving detailed report of number of new accounts created for the bank. A calendar chart is a visua...
ANALYSING THE ACCEPTANCE CRITERIA AMONG THE CONCEPTS FOR GENERATING AUTOMATED ONTOLOGIES
The semantic search yields fruitful results while searching the concepts. Ontologies play a crucial role in searching the concepts in a semantic way. It is otherwise said that, wherever search is needed, ontology search...
WEB SERVICE DISCOVERY BASED ON COMPUTION OF SEMANTIC SIMILARITY DISTANCE AND QOS NORMALIZATION
Service discovery is an important activity in services computing paradigm. Omnipresent of internet and proliferation of web services paves unrestricted opportunity to many service providers to create, locate and access t...