slugMaximizing Network Lifetime of Wireless Sensor Network-A Review

Abstract

Wireless sensor networks are becoming increasingly important in recent years due to their ability to detect and convey realtime information for many civilian and military applications. Wireless sensor network deployed thousand of nodes in not easily accessible places that operate with batteries. It can be difficult or impossible to replace or recharge the batteries of the sensor nodes. So to maximize the network lifetime has become a big challenge in the Wireless network. This paper presents a brief survey on various techniques employed for maximizing network lifetime of a wireless sensor networks. We also address some other challenges related to network lifetime of wireless sensor networks that need to be considered in future designs.

Authors and Affiliations

Deepika Thakral

Keywords

Related Articles

Seismic Analysis & Design of Multistorey Steel Building

Steel is one of the most widely used material for building construction in the world .The inherent strength, toughness and high ductility of steel are characteristics that are ideal for seismic design. To utilize these...

Design and Implementation of Dc-Dc Buck Boost Converter by using 8051 Microcontroller

This paper presents design and implementation of DC-DC Buck Boost converter by using 8051 microcontroller. The switched mode dc-dc converters are most widely used electronic circuits for its high conversion efficiency a...

slugFuzzy Logic Controller based Shunt Active Filter

In this analysis Shunt Active Power Filter (APF) is proposed for the compensation of harmonic currents and reactive power. For this purpose, a fuzzy logic controller is developed to adjust the energy storage of the dc v...

Analysis on Security Evaluation of Pattern Classifiers under Attack

Analysis on security evaluation of pattern classifiers under attack describes pattern classification systems that are security evaluation problems because of different attacks. Pattern Classification commonly used in ad...

Image Steganography and Cryptography Using Three Level Password Security

Image steganography and cryptography using three level password security is used for transferring sensitive data from one user to other user. The main aim of the project is to provide the users a secure way that helps t...

Download PDF file
  • EP ID EP17721
  • DOI -
  • Views 442
  • Downloads 11

How To Cite

Deepika Thakral (2013). slugMaximizing Network Lifetime of Wireless Sensor Network-A Review. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 1(4), -. https://europub.co.uk/articles/-A-17721