Trending

How does LEACH protocol work?

How does LEACH protocol work?

Protocol. LEACH is a hierarchical protocol in which most nodes transmit to cluster heads, and the cluster heads aggregate and compress the data and forward it to the base station (sink). Each node uses a stochastic algorithm at each round to determine whether it will become a cluster head in this round.

Where is LEACH protocol used?

LEACH protocol is one of the widely used clustering techniques in WSN. So, in this paper, an energy efficient LEACH protocol is designed with network coding for WSN. Initially, the clusters are formed with the LEACH protocol, where it uses the residual energy metric and drain rate to select the cluster heads.

What is LEACH protocol?

Low Energy Adaptive Clustering Hierarchy (LEACH) protocol is a TDMA based MAC protocol. The principal aim of this protocol is to improve the lifespan of wireless sensor networks by lowering the energy consumption required to create and maintain Cluster Heads.

Which is not a advantages of LEACH protocol?

LEACH is a MAC protocol, it contains many advantages like it does not need any control information, it saves energy, it is completely distributed and also contain many disadvantages like if cluster head dies then cluster become useless, clusters are divided randomly etc.

Which is not a protocol of spin family?

The SPIN family of protocol is made of four protocols, SPIN-PP, SPIN-BC, SPIN-RL, SPIN-EC and a modified SPIN (M-SPIN) [1]. its neighbor list has changed, it can spontaneously re advertise all of its data [1].

What is the benefit of clustering?

Clustering Intelligence Servers provides the following benefits: Increased resource availability: If one Intelligence Server in a cluster fails, the other Intelligence Servers in the cluster can pick up the workload. This prevents the loss of valuable time and information if a server fails.

What is the early sleeping problem and how does T MAC address this problem?

The major problem of T-MAC [4] is the early sleeping problem, which occurs when a node goes to sleep while a neighbor still has messages. To overcome this problem the protocol uses Future Request-To-Send (FRTS) as a solution.

What is the advantages of DSDV protocol?

Advantages. The availability of paths to all destinations in network always shows that less delay is required in the path set up process. The method of incremental update with sequence number labels, marks the existing wired network protocols adaptable to Ad-hoc wireless networks.

Why do companies cluster?

Clusters are geographic concentrations of interconnected companies or institutions that manufacture products or deliver services to a particular field or industry. Clusters arise because they increase the productivity with which companies within their sphere can compete.