Review Study of Leach Protocol

Abstract

WSN is a wireless Sensor Network which is a power constrained system. In WSN nodes have limited power batteries which depend upon energy efficiency. In WSN there is major issue of energy efficiency. Energy can be consumed by various protocols in WSN. LEACH is one of them. It works on clustering technique. Now a day’s so many versions of LEACH occur. From these versions a few latest versions are discussed in this which are A-LEACH, K-LEACH, O-LEACH and V-LEACH, EELBCRP are discussed. All the three are performed best to reduce the consumption of energy. Also helps in increasing the network life time. This paper gives the review study of the latest versions of leach protocol. These are discussed below in different sections of paper.

Authors and Affiliations

Sarbpreet Kaur, Er. Harinderpal Singh

Keywords

Related Articles

Power Management of Solar Photovoltaic Based Microgrid with Demand Side Management

The use of modern solar photovoltaic system combined with efficient electrical appliances as load, storage battery, and demand side management strategies in the domestic sector, can significantly increase the PV value f...

Online Marketing Services

On-line marketing is a recent phenomenon in the field of E-Business and is definitely going to be the future of selling and buying in the world. This study looks into the various aspects about how markets are being affe...

slugOffline Handwritten Sanskrit Character Recognition

In this paper, we describe the procedure of developing dataset for offline handwritten Sanskrit character recognition. There is no standard dataset available for handwritten characters. Researcher has to develop own cha...

A Rule Based Punjabi Dialect Conversion System

Recently there is dramatically increase in availability of informal dialectal language on web. People are sharing their ideas, thoughts and emotions, usually in the form of blogs and partially informal articles across t...

Physical Layer Reliability Enhancement based on Deterministic Multicast Algorithm

Wireless transmission has a major loophole of security. Wireless transmission can be readily overheard by unauthorized users for interception purposes and is thus highly vulnerable to eavesdropping attacks. Physical-lay...

Download PDF file
  • EP ID EP21027
  • DOI -
  • Views 252
  • Downloads 5

How To Cite

Sarbpreet Kaur, Er. Harinderpal Singh (2015). Review Study of Leach Protocol. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(6), -. https://europub.co.uk./articles/-A-21027